Injecting malicious IP list to compare against active connections and alert if found - Use case

is this the same as Use Case: Upload to rare external IP or are this two different use cases ?