

Allow, block, or watch : your rules, your lists
Manage dynamic lists of emails, domains, IPs, and device fingerprints. Use them as conditions in rules, or let the platform populate them automatically.
Multi-type support
Manage emails, domains, IPs, and device fingerprints in the same unified interface.
Auto-population
Rules automatically add entries to lists when they match, building your intelligence over time.
Bulk operations
Import thousands of entries via CSV or API. Export anytime for backup or external use.
Instant propagation
Changes to lists take effect across all rules and validations within milliseconds.
One source of truth for every entity
Allowlists, blocklists, watchlists. Whatever category you need, lists give you a centralized, searchable registry that your entire security stack reads from.
Allowlists, blocklists, watchlists
Create as many lists as you need with distinct actions: allow, block, or flag for review.
Tags and notes per entry
Add context to any entry. Tag by source, add investigation notes, or mark entries for follow-up.
Expiration policies
Set TTLs on entries so temporary blocks or watchlist additions expire automatically.
Rule-triggered additions
When a rule matches, automatically add the flagged IP, email, or device to a list of your choice.
Threshold-based promotion
Move entities from watchlists to blocklists when they cross a risk score threshold you define.
Cross-list deduplication
Prevent conflicts and duplicates across lists. One entity, one status, always consistent.
Lists that build themselves
Manual curation doesn't scale. Let rules and thresholds populate your lists based on live traffic, so your defenses improve with every scored event.
From ten entries to ten million
Lists are backed by the same infrastructure that handles your real-time scoring. They stay fast and responsive no matter how large they grow.
Search and pagination
Find any entry across millions with instant full-text search and cursor-based pagination.
API-first management
Create, update, and delete entries programmatically. Every dashboard action has an API equivalent.
Full audit history
Every addition, removal, and modification is logged with timestamps, actor, and reason.
Team-wide access
Lists are shared across your organization. Everyone works from the same data, with role-based permissions.
Start protecting your platform today
Join thousands of developers who trust Veille to keep their apps safe from fraud, abuse, and automated threats.
Get StartedView Pricing