For security products offering URL Threat filtering service, it may downloads signature files that contain known URL Threat domain names and IP addresses. Your security device may access an external database that has millions of web sites categorized based on content. It may allow, block, warn and/or log access to web sites or hosts based on these signatures and categories.