When doing a nslookup/dig/ping/http to IP or domain that is in the feed file there is only normal traffic log and nothing from anti bot blade. We expected that this would be detected/dropped when doing those tests to the sites in the feed files and would only need AB blade enabled since under Protections section these reputation indicators appear as AB blade. After dealing with TAC have been advised to use IP or Domain reputation based custom feeds you require both AB and AV blades not just AB which was not our understanding. The same test methods to sites from threatcloud are picked up just fine though and behaving how we'd expected but told custom IOC feeds require both blades.
The feed files are simply domain / IP listed one per line with no delimiters (each type in separate file) and configured in smartconsole > indicators with type specified appropriately. I see they have been fetched by the GW under $FWDIR/external_ioc/<feed name> As a test TAC asked to enable the AV blade and started getting the behavior we wanted so that rules out the feed file format
At this stage we are only wanting to do IP and Domain reputation based drops. At this stage we are preferring not to enable AV blade as well as not wanting additional load / scan files, only base on reputation if possible. That's why I'm asking if there's any alternative / easy ways to accomplish this for IP and domains, the fwaccel dos deny may well work via script somehow for IP but not domains.