Convert Figma logo to code with AI

firehol logoblocklist-ipsets

ipsets dynamically updated with firehol's update-ipsets.sh script

3,459
406
3,459
243

Top Related Projects

Malicious traffic detection system

Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.

27,991

🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.

Block spying and tracking on Windows

The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.

Curated and well-maintained hostfile to block ads, tracking, cryptomining, and more! Updated regularly. ⚡🔒

Quick Overview

The firehol/blocklist-ipsets repository is a collection of IP lists for various security purposes. It aggregates and updates IP lists from multiple sources, providing a comprehensive set of IP addresses associated with malicious activities, spam, and other potential threats. The project aims to offer a reliable and up-to-date resource for network administrators and security professionals.

Pros

  • Comprehensive collection of IP lists from various reputable sources
  • Regularly updated to ensure the most current information
  • Easy integration with firewall and security tools
  • Well-documented and maintained project with active community support

Cons

  • Large dataset may require significant processing power and storage
  • Potential for false positives due to the broad nature of the lists
  • Requires careful consideration and filtering for specific use cases
  • May not be suitable for all types of network environments or security needs

Getting Started

To use the firehol/blocklist-ipsets:

  1. Clone the repository:

    git clone https://github.com/firehol/blocklist-ipsets.git
    
  2. Navigate to the cloned directory:

    cd blocklist-ipsets
    
  3. Use the IP lists directly or integrate them into your security tools. For example, to view the content of a specific list:

    cat firehol_level1.netset
    
  4. To update the lists, run the update script (requires root privileges):

    sudo ./update-ipsets.sh
    

Note: Always review and test the IP lists before implementing them in a production environment to avoid unintended blocking of legitimate traffic.

Competitor Comparisons

Malicious traffic detection system

Pros of maltrail

  • More comprehensive threat detection: Includes network traffic monitoring and analysis
  • Active development: Regular updates and new features
  • User-friendly web interface for easy management and visualization

Cons of maltrail

  • Higher system resource requirements due to real-time monitoring
  • More complex setup and configuration process
  • Potential for false positives in certain network environments

Code comparison

maltrail:

def check_sudo():
    if not os.geteuid() == 0:
        exit("[!] please run with sudo/Administrator privileges")

blocklist-ipsets:

if [ "${EUID}" -ne 0 ]; then
   echo "This script must be run as root"
   exit 1
fi

Both projects implement a check for root/sudo privileges, but maltrail uses Python while blocklist-ipsets uses Bash scripting.

Summary

maltrail offers a more comprehensive threat detection solution with real-time monitoring and a user-friendly interface, but requires more resources and setup complexity. blocklist-ipsets focuses primarily on IP blocklists, making it simpler to implement but potentially less effective for advanced threat detection. The choice between the two depends on specific security needs and available resources.

Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.

Pros of Phishing.Database

  • Focuses specifically on phishing URLs, providing a more targeted dataset
  • Includes additional metadata like submission date and status
  • Regularly updated with new phishing URLs

Cons of Phishing.Database

  • Limited to phishing threats, not covering other types of malicious IPs or domains
  • May have a higher false positive rate due to the nature of phishing URLs
  • Requires more processing to extract actionable IP addresses

Code Comparison

Phishing.Database:

with open('phishing_database.csv', 'r') as f:
    reader = csv.reader(f)
    for row in reader:
        url = row[1]
        # Process phishing URL

Blocklist-ipsets:

wget -O - http://list.iblocklist.com/?list=bt_level1 | gunzip | awk '{print $1}'

The Phishing.Database typically requires parsing a CSV file, while Blocklist-ipsets often involves downloading and processing plain text lists of IP addresses or ranges.

27,991

🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.

Pros of hosts

  • Focuses on domain-based blocking, which can be more effective for content filtering
  • Offers various combinations of lists (e.g., fakenews, gambling, porn) for customized blocking
  • Easier to implement on a wide range of devices, including mobile phones and routers

Cons of hosts

  • Limited to domain-based blocking, may miss IP-based threats
  • Updates less frequently compared to blocklist-ipsets
  • Smaller overall list size, potentially offering less comprehensive coverage

Code Comparison

hosts:

0.0.0.0 example.com
0.0.0.0 malware.example.net

blocklist-ipsets:

1.2.3.4
5.6.7.8/24

Key Differences

  • hosts uses a hosts file format, while blocklist-ipsets uses plain IP addresses and CIDR notation
  • hosts is primarily for content filtering, while blocklist-ipsets focuses on network security
  • blocklist-ipsets offers a wider range of specialized lists for different threat types
  • hosts is more user-friendly for non-technical users, while blocklist-ipsets caters to network administrators

Use Cases

  • hosts: Content filtering, ad-blocking, and basic malware protection for end-users
  • blocklist-ipsets: Network security, firewall configuration, and threat intelligence for IT professionals

Block spying and tracking on Windows

Pros of WindowsSpyBlocker

  • Specifically targets Windows telemetry and privacy concerns
  • Includes tools for analyzing and managing Windows connections
  • Provides multiple blocking methods (hosts file, firewall rules, etc.)

Cons of WindowsSpyBlocker

  • Limited to Windows-specific threats and telemetry
  • May require more manual configuration and maintenance
  • Smaller community and less frequent updates compared to blocklist-ipsets

Code Comparison

WindowsSpyBlocker (hosts file format):

0.0.0.0 vortex.data.microsoft.com
0.0.0.0 settings-win.data.microsoft.com
0.0.0.0 watson.telemetry.microsoft.com

blocklist-ipsets (IP list format):

1.0.0.1
1.0.0.2
1.1.1.1
1.1.1.2

While both projects aim to block potentially unwanted connections, they differ in their approach and scope. WindowsSpyBlocker focuses specifically on Windows telemetry and privacy concerns, offering a more targeted solution for Windows users. It provides additional tools for analyzing and managing Windows connections, which can be beneficial for users who want more control over their system's network activity.

On the other hand, blocklist-ipsets offers a broader range of IP blocklists covering various threats and sources, making it more versatile for different platforms and use cases. It benefits from a larger community and more frequent updates, which can lead to more comprehensive and up-to-date protection.

The code comparison shows the difference in format between the two projects, with WindowsSpyBlocker using a hosts file format and blocklist-ipsets using a simple IP list format.

The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.

Pros of Ultimate.Hosts.Blacklist

  • More comprehensive, combining multiple sources for a larger blocklist
  • Regularly updated with automated processes
  • Provides both domain and IP-based blocking options

Cons of Ultimate.Hosts.Blacklist

  • May include more false positives due to its extensive nature
  • Potentially higher resource usage when implemented
  • Less granular control over specific categories of blocked content

Code Comparison

Ultimate.Hosts.Blacklist:

# Example of parsing the blocklist
with open('ultimate.hosts.txt', 'r') as f:
    blocked_domains = [line.split()[1] for line in f if line.startswith('0.0.0.0')]

blocklist-ipsets:

# Example of using an ipset
ipset create blacklist hash:net
for ip in $(cat firehol_level1.netset); do
    ipset add blacklist $ip
done

Both repositories provide valuable tools for network security and content filtering. Ultimate.Hosts.Blacklist offers a more extensive list with broader coverage, while blocklist-ipsets focuses on IP-based blocking with potentially fewer false positives. The choice between them depends on specific use cases and the level of granularity required in blocking.

Curated and well-maintained hostfile to block ads, tracking, cryptomining, and more! Updated regularly. ⚡🔒

Pros of blacklist

  • Focused on ad-blocking and privacy protection for home networks
  • Includes custom hosts files for specific services (e.g., Facebook, Spotify)
  • Easy to implement with popular DNS-based ad-blockers (e.g., Pi-hole)

Cons of blacklist

  • Limited scope compared to blocklist-ipsets' comprehensive threat intelligence
  • Less frequent updates than blocklist-ipsets
  • Primarily targets domains rather than IP addresses

Code comparison

blacklist:

0.0.0.0 ads.example.com
0.0.0.0 tracking.example.com

blocklist-ipsets:

# Malicious IPs from Source X
192.168.1.1
10.0.0.1

Key differences

blocklist-ipsets offers a wider range of IP-based blocklists for various threats, while blacklist focuses on domain-based ad and tracking prevention. blocklist-ipsets is more suitable for network security applications, whereas blacklist is tailored for home users seeking privacy and ad-blocking solutions.

blocklist-ipsets provides more frequent updates and a larger collection of lists from various sources, making it more comprehensive for threat intelligence. However, blacklist's simplicity and focus on specific services make it easier to implement for basic ad-blocking needs.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Due to the amount of data and the frequency of the updates on this repo, github has requested to limit the number of updates. The site https://iplists.firehol.org has direct links to all the files in this repo. This repo is now updated once per day.


Contents


About this repo

This repository includes a list of ipsets dynamically updated with FireHOL's update-ipsets.sh documented in this wiki.

This repo is self maintained. It it updated automatically from the script via a cron job.

This repo has a site: http://iplists.firehol.org.

Why do we need blocklists?

As time passes and the internet matures in our life, cybercrime is becoming increasingly sophisticated. Although there are many tools (detection of malware, viruses, intrusion detection and prevention systems, etc) to help us isolate the bad guys, there are now a lot more than just such attacks.

What is more interesting is that the fraudsters or attackers in many cases are not going to do a direct damage to you or your systems. They will use you and your systems to gain something else, possibly not related or indirectly related to your business. Nowadays the attacks cannot be identified easily. They are distributed and come to our systems from a vast amount of IPs around the world.

To get an idea, check for example the XRumer software. This thing mimics human behavior to post ads, it creates email accounts, responds to emails it receives, bypasses captchas, it goes gently to stay unnoticed, etc.

To increase our effectiveness we need to complement our security solutions with our shared knowledge, our shared experience in this fight.

Hopefully, there are many teams out there that do their best to identify the attacks and pinpoint the attackers. These teams release blocklists. Blocklists of IPs (for use in firewalls), domains & URLs (for use in proxies), etc.

What we are interested here is IPs.

Using IP blocklists at the internet side of your firewall is a key component of internet security. These lists share key knowledge between us, allowing us to learn from each other and effectively isolate fraudsters and attackers from our services.

I decided to upload these lists to a github repo because:

  1. They are freely available on the internet. The intention of their creators is to help internet security. Keep in mind though that a few of these lists may have special licences attached. Before using them, please check their source site for any information regarding proper use.

  2. Github provides (via git pull) a unified way of updating all the lists together. Pulling this repo regularly on your machines, you will update all the IP lists at once.

  3. Github also provides a unified version control. Using it we can have a history of what each list has done, which IPs or subnets were added and which were removed.

DNSBLs

Check also another tool included in FireHOL v3+, called dnsbl-ipset.sh.

This tool is capable of creating an ipset based on your traffic by looking up information on DNSBLs and scoring it according to your preferences.

More information here.


Using these ipsets

Please be very careful what you choose to use and how you use it. If you blacklist traffic using these lists you may end up blocking your users, your customers, even yourself (!) from accessing your services.

  1. Go to to the site of each list and read how each list is maintained. You are going to trust these guys for doing their job right.

  2. Most sites have either a donation system or commercial lists of higher quality. Try to support them.

  3. I have included the TOR network in these lists (bm_tor, dm_tor, et_tor). The TOR network is not necessarily bad and you should not block it if you want to allow your users be anonymous. I have included it because for certain cases, allowing an anonymity network might be a risky thing (such as eCommerce).

  4. Apply any blacklist at the internet side of your firewall. Be very careful. The bogons and fullbogons lists contain private, unrouteable IPs that should not be routed on the internet. If you apply such a blocklist on your DMZ or LAN side, you will be blocked out of your firewall.

  5. Always have a whitelist too, containing the IP addresses or subnets you trust. Try to build the rules in such a way that if an IP is in the whitelist, it should not be blocked by these blocklists.

Which ones to use

Level 1 - Basic

These are the ones I trust. Level 1 provides basic security against the most well-known attackers, with the minimum of false positives.

  1. Abuse.ch lists feodo, palevo, sslbl, zeus, zeus_badips

    These folks are doing a great job tracking crime ware. Their blocklists are very focused. Keep in mind zeus may include some false positives. You can use zeus_badips instead.

  2. DShield.org list dshield

    It contains the top 20 attacking class C (/24) subnets, over the last three days.

  3. Spamhaus.org lists spamhaus_drop, spamhaus_edrop

    DROP (Don't Route Or Peer) and EDROP are advisory "drop all traffic" lists, consisting of netblocks that are "hijacked" or leased by professional spam or cyber-crime operations (used for dissemination of malware, trojan downloaders, botnet controllers). According to Spamhaus.org:

    When implemented at a network or ISP's 'core routers', DROP and EDROP will help protect the network's users from spamming, scanning, harvesting, DNS-hijacking and DDoS attacks originating on rogue netblocks.

    Spamhaus strongly encourages the use of DROP and EDROP by tier-1s and backbones.

Spamhaus is very responsive to adapt these lists when a network owner updates them that the issue has been solved (I had one such incident with one of my users).

  1. Team-Cymru.org list bogons or fullbogons

    These are lists of IPs that should not be routed on the internet. No one should be using them. Be very careful to apply either of the two on the internet side of your network.

Level 2 - Essentials

Level 2 provide protection against current brute force attacks. This level may have a small percentage of false positives, mainly due to dynamic IPs being re-used by other users.

  1. OpenBL.org lists openbl*

    The team of OpenBL tracks brute force attacks on their hosts. They have a very short list for hosts, under their own control, collecting this information, to eliminate false positives. They suggest to use the default blacklist which has a retention policy of 90 days (openbl), but they also provide lists with different retention policies (from 1 day to 1 year). Their goal is to report abuse to the responsible provider so that the infection is disabled.

  2. Blocklist.de lists blocklist_de*

    Is a network of users reporting abuse mainly using fail2ban. They eliminate false positives using other lists available. Since they collect information from their users, their lists may be subject to poisoning, or false positives. I asked them about poisoning. Here you can find their answer. In short, they track it down so that they have an ignorable rate of false positives. Also, they only include individual IPs (no subnets) which have attacked their users the last 48 hours and their list contains 20.000 to 40.000 IPs (which is small enough considering the size of the internet). Like openbl, their goal is to report abuse back, so that the infection is disabled. They also provide their blocklist per type of attack (mail, web, etc).

Of course, there are more lists included. You can check them and decide if they fit for your needs.

Why are open proxy lists included

Of course, I haven't included them for you to use the open proxies. The port the proxy is listening, or the type of proxy, are not included (although most of them use the standard proxy ports and do serve web requests).

If you check the comparisons for the open proxy lists (ri_connect_proxies, ri_web_proxies, xroxy, proxz, proxyrss, etc) you will find that they overlap to a great degree with other blocklists, like blocklist_de, stopforumspam, etc.

This means the attackers also use open proxies to execute attacks.

So, if you are under attack, blocking the open proxies may help isolate a large part of the attack.

I don't suggest to permanently block IPs using the proxy lists. Their purpose of existence is questionable. Their quality though may be acceptable, since lot of these sites advertise that they test open proxies before including them in their lists, so that there are no false positives, at least at the time they tested them.


Using them in FireHOL

update-ipsets.sh itself does not alter your firewall. It can be used to update ipsets both on disk and in the kernel for any firewall solution you use.

The information below, shows you how to configure FireHOL to use the provides ipsets.

Adding the ipsets in your firehol.conf

I use something like this:

	# our wan interface
	wan="dsl0"
	
	# our whitelist
	ipset4 create whitelist hash:net
	ipset4 add whitelist A.B.C.D/E # A.B.C.D/E is whitelisted
	
	# subnets - netsets
	for x in fullbogons dshield spamhaus_drop spamhaus_edrop
	do
		ipset4 create  ${x} hash:net
		ipset4 addfile ${x} ipsets/${x}.netset
		blacklist4 full inface "${wan}" log "BLACKLIST ${x^^}" ipset:${x} \
			except src ipset:whitelist
	done

	# individual IPs - ipsets
	for x in feodo palevo sslbl zeus openbl blocklist_de
	do
		ipset4 create  ${x} hash:ip
		ipset4 addfile ${x} ipsets/${x}.ipset
		blacklist4 full inface "${wan}" log "BLACKLIST ${x^^}" ipset:${x} \
			except src ipset:whitelist
	done

	... rest of firehol.conf ...

If you are concerned about iptables performance, change the blacklist4 keyword full to input. This will block only inbound NEW connections, i.e. only the first packet for every NEW inbound connection will be checked. All other traffic passes through unchecked.

Before adding these rules to your firehol.conf you should run update-ipsets.sh to enable them.

Updating the ipsets while the firewall is running

Just use the update-ipsets.sh script from the firehol distribution. This script will update each ipset and call firehol to update the ipset while the firewall is running.

You can add update-ipsets.sh to cron, to run every 10 mins. update-ipsets.sh is smart enough to download a list only when it needs to.


List of ipsets included

The following list was automatically generated on Tue Jul 1 09:57:01 UTC 2025.

The update frequency is the maximum allowed by internal configuration. A list will never be downloaded sooner than the update frequency stated. A list may also not be downloaded, after this frequency expired, if it has not been modified on the server (as reported by HTTP IF_MODIFIED_SINCE method).

nameinfotypeentriesupdate
bds_atifArtillery Threat Intelligence Feed and Banlist Feedipv4 hash:ip212 unique IPsupdated every 1 day from this link
bitcoin_nodesBitNodes Bitcoin connected nodes, globally.ipv4 hash:ip6377 unique IPsupdated every 10 mins from this link
bitcoin_nodes_1dBitNodes Bitcoin connected nodes, globally.ipv4 hash:ip7089 unique IPsupdated every 10 mins from this link
bitcoin_nodes_30dBitNodes Bitcoin connected nodes, globally.ipv4 hash:ip14646 unique IPsupdated every 10 mins from this link
bitcoin_nodes_7dBitNodes Bitcoin connected nodes, globally.ipv4 hash:ip8936 unique IPsupdated every 10 mins from this link
blocklist_deBlocklist.de IPs that have been detected by fail2ban in the last 48 hoursipv4 hash:ip20343 unique IPsupdated every 15 mins from this link
blocklist_de_apacheBlocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.ipv4 hash:ip8782 unique IPsupdated every 15 mins from this link
blocklist_de_botsBlocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = it has posted a Spam-Comment on a open Forum or Wiki).ipv4 hash:ip428 unique IPsupdated every 15 mins from this link
blocklist_de_bruteforceBlocklist.de All IPs which attacks Joomla, Wordpress and other Web-Logins with Brute-Force Logins.ipv4 hash:ip629 unique IPsupdated every 15 mins from this link
blocklist_de_ftpBlocklist.de All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.ipv4 hash:ip32 unique IPsupdated every 15 mins from this link
blocklist_de_imapBlocklist.de All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3, etc.ipv4 hash:ip3575 unique IPsupdated every 15 mins from this link
blocklist_de_mailBlocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.ipv4 hash:ip13049 unique IPsupdated every 15 mins from this link
blocklist_de_sipBlocklist.de All IP addresses that tried to login in a SIP, VOIP or Asterisk Server and are included in the IPs list from infiltrated.netipv4 hash:ip35 unique IPsupdated every 15 mins from this link
blocklist_de_sshBlocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.ipv4 hash:ip5979 unique IPsupdated every 15 mins from this link
blocklist_de_strongipsBlocklist.de All IPs which are older then 2 month and have more then 5.000 attacks.ipv4 hash:ip267 unique IPsupdated every 15 mins from this link
blocklist_net_uablocklist.net.ua The BlockList project was created to become protection against negative influence of the harmful and potentially dangerous events on the Internet. First of all this service will help internet and hosting providers to protect subscribers sites from being hacked. BlockList will help to stop receiving a large amount of spam from dubious SMTP relays or from attempts of brute force passwords to servers and network equipment.ipv4 hash:ip85020 unique IPsupdated every 10 mins from this link
bm_tortorstatus.blutmagie.de list of all TOR network serversipv4 hash:ipdisabledupdated every 30 mins from this link
bogonsTeam-Cymru.org private and reserved addresses defined by RFC 1918, RFC 5735, and RFC 6598 and netblocks that have not been allocated to a regional internet registryipv4 hash:net13 subnets, 592708608 unique IPsupdated every 1 day
botscoutBotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.ipv4 hash:ip32 unique IPsupdated every 30 mins from this link
botscout_1dBotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.ipv4 hash:ip425 unique IPsupdated every 30 mins from this link
botscout_30dBotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.ipv4 hash:ip8159 unique IPsupdated every 30 mins from this link
botscout_7dBotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.ipv4 hash:ip2180 unique IPsupdated every 30 mins from this link
botvrij_dstbotvrij.eu Indicators of Compromise (IOCS) about malicious destination IPs, gathered via open source information feeds (blog pages and PDF documents) and then consolidated into different datasets. To ensure the quality of the data all entries older than approx. 6 months are removed.ipv4 hash:ipdisabledupdated every 1 day from this link
botvrij_srcbotvrij.eu Indicators of Compromise (IOCS) about malicious source IPs, gathered via open source information feeds (blog pages and PDF documents) and then consolidated into different datasets. To ensure the quality of the data all entries older than approx. 6 months are removed.ipv4 hash:ipdisabledupdated every 1 day from this link
bruteforceblockerdanger.rulez.sk bruteforceblocker (fail2ban alternative for SSH on OpenBSD). This is an automatically generated list from users reporting failed authentication attempts. An IP seems to be included if 3 or more users report it. Its retention pocily seems 30 days.ipv4 hash:ip466 unique IPsupdated every 3 hours from this link
ciarmyCIArmy.com IPs with poor Rogue Packet score that have not yet been identified as malicious by the communityipv4 hash:ip15000 unique IPsupdated every 3 hours from this link
cidr_report_bogonsUnallocated (Free) Address Space, generated on a daily basis using the IANA registry files, the Regional Internet Registry stats files and the Regional Internet Registry whois data.ipv4 hash:net18 subnets, 588514808 unique IPsupdated every 1 day from this link
cleantalkCleanTalk Today's HTTP Spammers (includes: cleantalk_new cleantalk_updated)ipv4 hash:ip493 unique IPsupdated every 1 min
cleantalk_1dCleanTalk Today's HTTP Spammers (includes: cleantalk_new_1d cleantalk_updated_1d)ipv4 hash:ip2650 unique IPsupdated every 1 min
cleantalk_30dCleanTalk Today's HTTP Spammers (includes: cleantalk_new_30d cleantalk_updated_30d)ipv4 hash:ip51254 unique IPsupdated every 1 min
cleantalk_7dCleanTalk Today's HTTP Spammers (includes: cleantalk_new_7d cleantalk_updated_7d)ipv4 hash:ip13816 unique IPsupdated every 1 min
cleantalk_newCleanTalk Recent HTTP Spammersipv4 hash:ip250 unique IPsupdated every 15 mins from this link
cleantalk_new_1dCleanTalk Recent HTTP Spammersipv4 hash:ip933 unique IPsupdated every 15 mins from this link
cleantalk_new_30dCleanTalk Recent HTTP Spammersipv4 hash:ip14478 unique IPsupdated every 15 mins from this link
cleantalk_new_7dCleanTalk Recent HTTP Spammersipv4 hash:ip3092 unique IPsupdated every 15 mins from this link
cleantalk_top20CleanTalk Top 20 HTTP Spammersipv4 hash:ip20 unique IPsupdated every 1 day from this link
cleantalk_updatedCleanTalk Recurring HTTP Spammersipv4 hash:ip250 unique IPsupdated every 15 mins from this link
cleantalk_updated_1dCleanTalk Recurring HTTP Spammersipv4 hash:ip1898 unique IPsupdated every 15 mins from this link
cleantalk_updated_30dCleanTalk Recurring HTTP Spammersipv4 hash:ip49457 unique IPsupdated every 15 mins from this link
cleantalk_updated_7dCleanTalk Recurring HTTP Spammersipv4 hash:ip12631 unique IPsupdated every 15 mins from this link
cta_cryptowallCyber Threat Alliance CryptoWall is one of the most lucrative and broad-reaching ransomware campaigns affecting Internet users today. Sharing intelligence and analysis resources, the CTA profiled the latest version of CryptoWall, which impacted hundreds of thousands of users, resulting in over US $325 million in damages worldwide.ipv4 hash:ip1360 unique IPsupdated every 1 day from this link
cybercrimeCyberCrime A project tracking Command and Control.ipv4 hash:ip117 unique IPsupdated every 12 hours from this link
darklist_dedarklist.de ssh fail2ban reportingipv4 hash:net6008 subnets, 274857 unique IPsupdated every 1 day from this link
dataplane_dnsrdDataPlane.org IP addresses that have been identified as sending recursive DNS queries to a remote host. This report lists addresses that may be cataloging open DNS resolvers or evaluating cache entries.ipv4 hash:ip6813 unique IPsupdated every 1 hour
dataplane_dnsrdanyDataPlane.org IP addresses that have been identified as sending recursive DNS IN ANY queries to a remote host. This report lists addresses that may be cataloging open DNS resolvers for the purpose of later using them to facilitate DNS amplification and reflection attacks.ipv4 hash:ip355 unique IPsupdated every 1 hour
dataplane_dnsversionDataPlane.org IP addresses that have been identified as sending DNS CH TXT VERSION.BIND queries to a remote host. This report lists addresses that may be cataloging DNS software.ipv4 hash:ip6042 unique IPsupdated every 1 hour
dataplane_sipinvitationDataPlane.org IP addresses that have been seen initiating a SIP INVITE operation to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP client cataloging or conducting various forms of telephony abuse.ipv4 hash:ip30 unique IPsupdated every 1 hour
dataplane_sipqueryDataPlane.org IP addresses that has been seen initiating a SIP OPTIONS query to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP server cataloging or conducting various forms of telephony abuse.ipv4 hash:ip3434 unique IPsupdated every 1 hour
dataplane_sipregistrationDataPlane.org IP addresses that have been seen initiating a SIP REGISTER operation to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP client cataloging or conducting various forms of telephony abuse.ipv4 hash:ip422 unique IPsupdated every 1 hour
dataplane_sshclientDataPlane.org IP addresses that has been seen initiating an SSH connection to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SSH server cataloging or conducting authentication attack attempts.ipv4 hash:ip18793 unique IPsupdated every 1 hour
dataplane_sshpwauthDataPlane.org IP addresses that has been seen attempting to remotely login to a host using SSH password authentication. This report lists hosts that are highly suspicious and are likely conducting malicious SSH password authentication attacks.ipv4 hash:ip13321 unique IPsupdated every 1 hour
dataplane_vncrfbDataPlane.org IP addresses that have been seen initiating a VNC remote frame buffer (RFB) session to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be VNC server cataloging or conducting various forms of remote access abuse.ipv4 hash:ip3263 unique IPsupdated every 1 hour
dm_tordan.me.uk dynamic list of TOR nodesipv4 hash:ip6376 unique IPsupdated every 30 mins from this link
dronebl_anonymizersDroneBL.org List of open proxies. It includes IPs which DroneBL categorizes as SOCKS proxies (8), HTTP proxies (9), web page proxies (11), WinGate proxies (14), proxy chains (10).ipv4 hash:net1199249 subnets, 1297710 unique IPsupdated every 1 min
dronebl_auto_botnetsDroneBL.org IPs of automatically detected botnets. It includes IPs for which DroneBL responds with 17.ipv4 hash:net3996 subnets, 4010 unique IPsupdated every 1 min
dronebl_autorooting_wormsDroneBL.org IPs of autorooting worms. It includes IPs for which DroneBL responds with 16. These are usually SSH bruteforce attacks.ipv4 hash:net35 subnets, 35 unique IPsupdated every 1 min
dronebl_compromisedDroneBL.org IPs of compromised routers / gateways. It includes IPs for which DroneBL responds with 15 (BOPM detected).ipv4 hash:net46006 subnets, 47451 unique IPsupdated every 1 min
dronebl_ddos_dronesDroneBL.org IPs of DDoS drones. It includes IPs for which DroneBL responds with 7.ipv4 hash:net7607 subnets, 7763 unique IPsupdated every 1 min
dronebl_dns_mx_on_ircDroneBL.org List of IPs of DNS / MX hostname detected on IRC. It includes IPs for which DroneBL responds with 18.ipv4 hash:net16 subnets, 16 unique IPsupdated every 1 min
dronebl_irc_dronesDroneBL.org List of IRC spam drones (litmus/sdbot/fyle). It includes IPs for which DroneBL responds with 3.ipv4 hash:net815215 subnets, 984740 unique IPsupdated every 1 min
dronebl_unknownDroneBL.org List of IPs of uncategorized threats. It includes IPs for which DroneBL responds with 255.ipv4 hash:net152 subnets, 152 unique IPsupdated every 1 min
dronebl_worms_botsDroneBL.org IPs of unknown worms or spambots. It includes IPs for which DroneBL responds with 6ipv4 hash:net108779 subnets, 115607 unique IPsupdated every 1 min
dshieldDShield.org top 20 attacking class C (/24) subnets over the last three daysipv4 hash:net20 subnets, 5120 unique IPsupdated every 10 mins from this link
dshield_1dDShield.org top 20 attacking class C (/24) subnets over the last three daysipv4 hash:net27 subnets, 6912 unique IPsupdated every 10 mins from this link
dshield_30dDShield.org top 20 attacking class C (/24) subnets over the last three daysipv4 hash:net62 subnets, 17408 unique IPsupdated every 10 mins from this link
dshield_7dDShield.org top 20 attacking class C (/24) subnets over the last three daysipv4 hash:net40 subnets, 10496 unique IPsupdated every 10 mins from this link
et_blockEmergingThreats.net default blacklist (at the time of writing includes spamhaus DROP, dshield and abuse.ch trackers, which are available separately too - prefer to use the direct ipsets instead of this, they seem to lag a bit in updates)ipv4 hash:net1473 subnets, 15690241 unique IPsupdated every 12 hours from this link
et_compromisedEmergingThreats.net compromised hostsipv4 hash:ip484 unique IPsupdated every 12 hours from this link
et_dshieldEmergingThreats.net dshield blocklistipv4 hash:net20 subnets, 5120 unique IPsupdated every 12 hours from this link
et_spamhausEmergingThreats.net spamhaus blocklistipv4 hash:net1456 subnets, 15686144 unique IPsupdated every 12 hours from this link
et_torEmergingThreats.net TOR list of TOR network IPsipv4 hash:ip6320 unique IPsupdated every 12 hours from this link
feodoAbuse.ch Feodo tracker trojan includes IPs which are being used by Feodo (also known as Cridex or Bugat) which commits ebanking fraudipv4 hash:ip0 unique IPsupdated every 30 mins from this link
feodo_badipsAbuse.ch Feodo tracker BadIPs The Feodo Tracker Feodo BadIP Blocklist only contains IP addresses (IPv4) used as C&C communication channel by the Feodo Trojan version B. These IP addresses are usually servers rented by cybercriminals directly and used for the exclusive purpose of hosting a Feodo C&C server. Hence you should expect no legit traffic to those IP addresses. The site highly recommends you to block/drop any traffic towards any Feodo C&C using the Feodo BadIP Blocklist. Please consider that this blocklist only contains IP addresses used by version B of the Feodo Trojan. C&C communication channels used by version A, version C and version D are not covered by this blocklist.ipv4 hash:ip1 unique IPsupdated every 30 mins from this link
firehol_abusers_1dAn ipset made from blocklists that track abusers in the last 24 hours. (includes: botscout_1d cleantalk_new_1d cleantalk_updated_1d php_commenters_1d php_dictionary_1d php_harvesters_1d php_spammers_1d stopforumspam_1d)ipv4 hash:net8854 subnets, 9042 unique IPsupdated every 1 min
firehol_abusers_30dAn ipset made from blocklists that track abusers in the last 30 days. (includes: cleantalk_new_30d cleantalk_updated_30d php_commenters_30d php_dictionary_30d php_harvesters_30d php_spammers_30d stopforumspam sblam)ipv4 hash:net202157 subnets, 222165 unique IPsupdated every 1 min
firehol_anonymousAn ipset that includes all the anonymizing IPs of the world. (includes: anonymous dm_tor firehol_proxies tor_exits)ipv4 hash:net1257717 subnets, 1403627 unique IPsupdated every 1 min
firehol_level1A firewall blacklist composed from IP lists, providing maximum protection with minimum false positives. Suitable for basic protection on all internet facing servers, routers and firewalls. (includes: dshield feodo fullbogons spamhaus_drop spamhaus_edrop)ipv4 hash:net4482 subnets, 612773056 unique IPsupdated every 1 min
firehol_level2An ipset made from blocklists that track attacks, during about the last 48 hours. (includes: blocklist_de dshield_1d greensnow)ipv4 hash:net14941 subnets, 30208 unique IPsupdated every 1 min
firehol_level3An ipset made from blocklists that track attacks, spyware, viruses. It includes IPs than have been reported or detected in the last 30 days. (includes: bruteforceblocker ciarmy dshield_30d myip vxvault)ipv4 hash:net12881 subnets, 31453 unique IPsupdated every 1 min
firehol_level4An ipset made from blocklists that track attacks, but may include a large number of false positives. (includes: blocklist_net_ua botscout_30d cybercrime iblocklist_hijacked iblocklist_spyware iblocklist_webexploit)ipv4 hash:net88204 subnets, 9182033 unique IPsupdated every 1 min
firehol_proxiesAn ipset made from all sources that track open proxies. It includes IPs reported or detected in the last 30 days. (includes: iblocklist_proxies ip2proxy_px1lite socks_proxy_30d sslproxies_30d)ipv4 hash:net1252224 subnets, 1391377 unique IPsupdated every 1 min
firehol_webclientAn IP blacklist made from blocklists that track IPs that a web client should never talk to. This list is to be used on top of firehol_level1. (includes: cybercrime)ipv4 hash:net117 subnets, 117 unique IPsupdated every 1 min
firehol_webserverA web server IP blacklist made from blocklists that track IPs that should never be used by your web users. (This list includes IPs that are servers hosting malware, bots, etc or users having a long criminal history. This list is to be used on top of firehol_level1, firehol_level2, firehol_level3 and possibly firehol_proxies or firehol_anonymous). (includes: myip stopforumspam_toxic)ipv4 hash:net571 subnets, 122275 unique IPsupdated every 1 min
fullbogonsTeam-Cymru.org IP space that has been allocated to an RIR, but not assigned by that RIR to an actual ISP or other end-useripv4 hash:net2856 subnets, 596971712 unique IPsupdated every 1 day
geolite2_asnMaxMind GeoLite2 ASNipv4 hash:netdisabledupdated every 7 days from this link
geolite2_countryMaxMind GeoLite2 databases are free IP geolocation databases comparable to, but less accurate than, MaxMind’s GeoIP2 databases. They include IPs per country, IPs per continent, IPs used by anonymous services (VPNs, Proxies, etc) and Satellite Providers.ipv4 hash:netAll the worldupdated every 7 days from this link
gofferje_sipStefan Gofferje A personal blacklist of networks and IPs of SIP attackers. To end up here, the IP or network must have been the origin of considerable and repeated attacks on my PBX and additionally, the ISP didn't react to any complaint. Note from the author: I don't give any guarantees of accuracy, completeness or even usability! USE AT YOUR OWN RISK! Also note that I block complete countries, namely China, Korea and Palestine with blocklists from ipdeny.com, so some attackers will never even get the chance to get noticed by me to be put on this blacklist. I also don't accept any liabilities related to this blocklist. If you're an ISP and don't like your IPs being listed here, too bad! You should have done something about your customers' behavior and reacted to my complaints. This blocklist is nothing but an expression of my personal opinion and exercising my right of free speech.ipv4 hash:netdisabledupdated every 6 hours from this link
gpf_comicsThe GPF DNS Block List is a list of IP addresses on the Internet that have attacked the GPF Comics family of Web sites. IPs on this block list have been banned from accessing all of our servers because they were caught in the act of spamming, attempting to exploit our scripts, scanning for vulnerabilities, or consuming resources to the detriment of our human visitors.ipv4 hash:ip2068 unique IPsupdated every 1 day from this link
graphiclinewebGraphiclineWeb The IP’s, Hosts and Domains listed in this table are banned universally from accessing websites controlled by the maintainer. Some form of bad activity has been seen from the addresses listed. Bad activity includes: unwanted spiders, rule breakers, comment spammers, trackback spammers, spambots, hacker bots, registration bots and other scripting attackers, harvesters, nuisance spiders, spy bots and organizations spying on websites for commercial reasons.ipv4 hash:net2579 subnets, 330527 unique IPsupdated every 1 day from this link
greensnowGreenSnow is a team harvesting a large number of IPs from different computers located around the world. GreenSnow is comparable with SpamHaus.org for attacks of any kind except for spam. Their list is updated automatically and you can withdraw at any time your IP address if it has been listed. Attacks / bruteforce that are monitored are: Scan Port, FTP, POP3, mod_security, IMAP, SMTP, SSH, cPanel, etc.ipv4 hash:ip6116 unique IPsupdated every 30 mins from this link
iblocklist_abuse_palevopalevotracker.abuse.ch IP blocklist.ipv4 hash:net12 subnets, 12 unique IPsupdated every 12 hours from this link
iblocklist_abuse_spyeyespyeyetracker.abuse.ch IP blocklist.ipv4 hash:net83 subnets, 84 unique IPsupdated every 12 hours from this link
iblocklist_abuse_zeuszeustracker.abuse.ch IP blocklist that contains IP addresses which are currently beeing tracked on the abuse.ch ZeuS Tracker.ipv4 hash:net209 subnets, 212 unique IPsupdated every 12 hours from this link
iblocklist_adsAdvertising trackers and a short list of bad/intrusive porn sites.ipv4 hash:net3392 subnets, 888798 unique IPsupdated every 12 hours
iblocklist_bogonsUnallocated address space.ipv4 hash:net2692 subnets, 645673639 unique IPsupdated every 12 hours
iblocklist_ciarmy_maliciousciarmy.com IP blocklist. Based on information from a network of Sentinel devices deployed around the world, they compile a list of known bad IP addresses. Sentinel devices are uniquely positioned to pick up traffic from bad guys without requiring any type of signature-based or rate-based identification. If an IP is identified in this way by a significant number of Sentinels, the IP is malicious and should be blocked.ipv4 hash:net12991 subnets, 15000 unique IPsupdated every 12 hours from this link
iblocklist_cidr_report_bogonscidr-report.org IP list of Unallocated address space.ipv4 hash:net18 subnets, 588514808 unique IPsupdated every 12 hours from this link
iblocklist_cruzit_web_attacksCruzIT IP list with individual IP addresses of compromised machines scanning for vulnerabilities and DDOS attacks.ipv4 hash:net14096 subnets, 14397 unique IPsupdated every 12 hours from this link
iblocklist_dshieldknown Hackers and such people.ipv4 hash:net16 subnets, 2566 unique IPsupdated every 12 hours
iblocklist_eduIPs used by Educational Institutions.ipv4 hash:net43896 subnets, 227796759 unique IPsupdated every 12 hours
iblocklist_exclusionsExclusions.ipv4 hash:net313 subnets, 7488 unique IPsupdated every 12 hours
iblocklist_fornonlancomputersIP blocklist for non-LAN computers.ipv4 hash:net4 subnets, 302055424 unique IPsupdated every 12 hours
iblocklist_forumspamForum spam.ipv4 hash:net455 subnets, 479 unique IPsupdated every 12 hours
iblocklist_hijackedHijacked IP-Blocks. Contains hijacked IP-Blocks and known IP-Blocks that are used to deliver Spam. This list is a combination of lists with hijacked IP-Blocks. Hijacked IP space are IP blocks that are being used without permission by organizations that have no relation to original organization (or its legal successor) that received the IP block. In essence it's stealing of somebody else's IP resources.ipv4 hash:net512 subnets, 8736512 unique IPsupdated every 12 hours
iblocklist_iana_multicastIANA Multicast IPs.ipv4 hash:net1 subnets, 268435456 unique IPsupdated every 12 hours
iblocklist_iana_privateIANA Private IPs.ipv4 hash:net58 subnets, 51643646 unique IPsupdated every 12 hours
iblocklist_iana_reservedIANA Reserved IPs.ipv4 hash:net1 subnets, 536870912 unique IPsupdated every 12 hours
iblocklist_isp_aolAOL IPs.ipv4 hash:net16 subnets, 6627584 unique IPsupdated every 1 day from this link
iblocklist_isp_attAT&T IPs.ipv4 hash:net35 subnets, 55845128 unique IPsupdated every 1 day from this link
iblocklist_isp_cablevisionCablevision IPs.ipv4 hash:net11 subnets, 1787136 unique IPsupdated every 1 day from this link
iblocklist_isp_charterCharter IPs.ipv4 hash:net21 subnets, 6138112 unique IPsupdated every 1 day from this link
iblocklist_isp_comcastComcast IPs.ipv4 hash:net33 subnets, 45121536 unique IPsupdated every 1 day from this link
iblocklist_isp_embarqEmbarq IPs.ipv4 hash:net14 subnets, 2703360 unique IPsupdated every 1 day from this link
iblocklist_isp_qwestQwest IPs.ipv4 hash:net73 subnets, 15777552 unique IPsupdated every 1 day from this link
iblocklist_isp_sprintSprint IPs.ipv4 hash:net73 subnets, 6310570 unique IPsupdated every 1 day from this link
iblocklist_isp_suddenlinkSuddenlink IPs.ipv4 hash:net3 subnets, 458752 unique IPsupdated every 1 day from this link
iblocklist_isp_twcTime Warner Cable IPs.ipv4 hash:net56 subnets, 15015936 unique IPsupdated every 1 day from this link
iblocklist_isp_verizonVerizon IPs.ipv4 hash:net22 subnets, 18087936 unique IPsupdated every 1 day from this link
iblocklist_level1Level 1 (for use in p2p): Companies or organizations who are clearly involved with trying to stop filesharing (e.g. Baytsp, MediaDefender, Mediasentry). Companies which anti-p2p activity has been seen from. Companies that produce or have a strong financial interest in copyrighted material (e.g. music, movie, software industries a.o.). Government ranges or companies that have a strong financial interest in doing work for governments. Legal industry ranges. IPs or ranges of ISPs from which anti-p2p activity has been observed. Basically this list will block all kinds of internet connections that most people would rather not have during their internet travels.ipv4 hash:net235629 subnets, 725142218 unique IPsupdated every 12 hours
iblocklist_level2Level 2 (for use in p2p). General corporate ranges. Ranges used by labs or researchers. Proxies.ipv4 hash:net78372 subnets, 337719853 unique IPsupdated every 12 hours
iblocklist_level3Level 3 (for use in p2p). Many portal-type websites. ISP ranges that may be dodgy for some reason. Ranges that belong to an individual, but which have not been determined to be used by a particular company. Ranges for things that are unusual in some way. The L3 list is aka the paranoid list.ipv4 hash:net18853 subnets, 137073979 unique IPsupdated every 12 hours
iblocklist_malc0demalc0de.com IP blocklist. Addresses that have been identified distributing malware during the past 30 days.ipv4 hash:net21 subnets, 21 unique IPsupdated every 12 hours from this link
iblocklist_onion_routerThe Onion Router IP addresses.ipv4 hash:net837 subnets, 1155 unique IPsupdated every 12 hours from this link
iblocklist_org_activisionActivision IPs.ipv4 hash:net49 subnets, 4902 unique IPsupdated every 1 day from this link
iblocklist_org_appleApple IPs.ipv4 hash:net1 subnets, 16777216 unique IPsupdated every 1 day from this link
iblocklist_org_blizzardBlizzard IPs.ipv4 hash:net8 subnets, 16795139 unique IPsupdated every 1 day from this link
iblocklist_org_crowd_controlCrowd Control Productions IPs.ipv4 hash:net2 subnets, 768 unique IPsupdated every 1 day from this link
iblocklist_org_electronic_artsElectronic Arts IPs.ipv4 hash:net42 subnets, 69720 unique IPsupdated every 1 day from this link
iblocklist_org_joostJoost IPs.ipv4 hash:net4 subnets, 16779456 unique IPsupdated every 1 day from this link
iblocklist_org_linden_labLinden Lab IPs.ipv4 hash:net11 subnets, 23600 unique IPsupdated every 1 day from this link
iblocklist_org_logmeinLogMeIn IPs.ipv4 hash:net13 subnets, 16781568 unique IPsupdated every 1 day from this link
iblocklist_org_microsoftMicrosoft IP ranges.ipv4 hash:net901 subnets, 1848599 unique IPsupdated every 12 hours
iblocklist_org_ncsoftNCsoft IPs.ipv4 hash:net5 subnets, 12560 unique IPsupdated every 1 day from this link
iblocklist_org_nintendoNintendo IPs.ipv4 hash:net45 subnets, 3927 unique IPsupdated every 1 day from this link
iblocklist_org_pandoraPandora IPs.ipv4 hash:net1 subnets, 2048 unique IPsupdated every 1 day from this link
iblocklist_org_pirate_bayThe Pirate Bay IPs.ipv4 hash:net5 subnets, 323 unique IPsupdated every 1 day from this link
iblocklist_org_punkbusterPunkbuster IPs.ipv4 hash:net1 subnets, 1 unique IPsupdated every 1 day from this link
iblocklist_org_riot_gamesRiot Games IPs.ipv4 hash:net6 subnets, 1792 unique IPsupdated every 1 day from this link
iblocklist_org_sony_onlineSony Online Entertainment IPs.ipv4 hash:net7 subnets, 24616 unique IPsupdated every 1 day from this link
iblocklist_org_square_enixSquare Enix IPs.ipv4 hash:net2 subnets, 4112 unique IPsupdated every 1 day from this link
iblocklist_org_steamSteam IPs.ipv4 hash:net53 subnets, 596448 unique IPsupdated every 1 day from this link
iblocklist_org_ubisoftUbisoft IPs.ipv4 hash:net10 subnets, 5308 unique IPsupdated every 1 day from this link
iblocklist_org_xfireXFire IPs.ipv4 hash:net3 subnets, 3328 unique IPsupdated every 1 day from this link
iblocklist_pedophilesIP ranges of people who we have found to be sharing child pornography in the p2p community.ipv4 hash:net29188 subnets, 847889 unique IPsupdated every 12 hours from this link
iblocklist_proxiesOpen Proxies IPs list (without TOR)ipv4 hash:ip672 unique IPsupdated every 12 hours
iblocklist_rangetestSuspicious IPs that are under investigation.ipv4 hash:net576 subnets, 4280758 unique IPsupdated every 12 hours
iblocklist_spamhaus_dropSpamhaus.org DROP (Don't Route Or Peer) list.ipv4 hash:net900 subnets, 17338368 unique IPsupdated every 12 hours from this link
iblocklist_spiderIP list intended to be used by webmasters to block hostile spiders from their web sites.ipv4 hash:net773 subnets, 846788 unique IPsupdated every 12 hours
iblocklist_spywareKnown malicious SPYWARE and ADWARE IP Address ranges. It is compiled from various sources, including other available spyware blacklists, HOSTS files, from research found at many of the top anti-spyware forums, logs of spyware victims, etc.ipv4 hash:net3349 subnets, 339171 unique IPsupdated every 12 hours
iblocklist_webexploitWeb server hack and exploit attempts. IP addresses related to current web server hack and exploit attempts that have been logged or can be found in and cross referenced with other related IP databases. Malicious and other non search engine bots will also be listed here, along with anything found that can have a negative impact on a website or webserver such as proxies being used for negative SEO hijacks, unauthorised site mirroring, harvesting, scraping, snooping and data mining / spy bot / security & copyright enforcement companies that target and continuosly scan webservers.ipv4 hash:ip15382 unique IPsupdated every 12 hours
iblocklist_yoyo_adserverspgl.yoyo.org ad serversipv4 hash:net7598 subnets, 8978 unique IPsupdated every 12 hours from this link
ip2location_countryIP2Location.com geolocation databaseipv4 hash:netAll the worldupdated every 1 day from this link
ip2location_country_ehWestern Sahara (EH) -- IP2Location.comipv4 hash:net1 subnets, 256 unique IPsupdated every 1 day from this link
ip2proxy_px1liteIP2Location.com IP2Proxy LITE IP-COUNTRY Database contains IP addresses which are used as public proxies. The LITE edition is a free version of database that is limited to public proxies IP address.ipv4 hash:net1250824 subnets, 1389943 unique IPsupdated every 1 day
ipdeny_countryIPDeny.com geolocation databaseipv4 hash:netAll the worldupdated every 1 day from this link
myipmyip.ms IPs identified as web bots in the last 10 days, using several sites that require human actionipv4 hash:ip567 unique IPsupdated every 1 day from this link
php_badprojecthoneypot.org bad web hosts (this list is composed using an RSS feed)ipv4 hash:ipdisabledupdated every 1 hour from this link
php_commentersprojecthoneypot.org comment spammers (this list is composed using an RSS feed)ipv4 hash:ip50 unique IPsupdated every 1 hour from this link
php_commenters_1dprojecthoneypot.org comment spammers (this list is composed using an RSS feed)ipv4 hash:ip96 unique IPsupdated every 1 hour from this link
php_commenters_30dprojecthoneypot.org comment spammers (this list is composed using an RSS feed)ipv4 hash:ip1107 unique IPsupdated every 1 hour from this link
php_commenters_7dprojecthoneypot.org comment spammers (this list is composed using an RSS feed)ipv4 hash:ip317 unique IPsupdated every 1 hour from this link
php_dictionaryprojecthoneypot.org directory attackers (this list is composed using an RSS feed)ipv4 hash:ip46 unique IPsupdated every 1 hour from this link
php_dictionary_1dprojecthoneypot.org directory attackers (this list is composed using an RSS feed)ipv4 hash:ip83 unique IPsupdated every 1 hour from this link
php_dictionary_30dprojecthoneypot.org directory attackers (this list is composed using an RSS feed)ipv4 hash:ip834 unique IPsupdated every 1 hour from this link
php_dictionary_7dprojecthoneypot.org directory attackers (this list is composed using an RSS feed)ipv4 hash:ip274 unique IPsupdated every 1 hour from this link
php_harvestersprojecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)ipv4 hash:ip50 unique IPsupdated every 1 hour from this link
php_harvesters_1dprojecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)ipv4 hash:ip50 unique IPsupdated every 1 hour from this link
php_harvesters_30dprojecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)ipv4 hash:ip515 unique IPsupdated every 1 hour from this link
php_harvesters_7dprojecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)ipv4 hash:ip157 unique IPsupdated every 1 hour from this link
php_spammersprojecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)ipv4 hash:ip45 unique IPsupdated every 1 hour from this link
php_spammers_1dprojecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)ipv4 hash:ip45 unique IPsupdated every 1 hour from this link
php_spammers_30dprojecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)ipv4 hash:ip1035 unique IPsupdated every 1 hour from this link
php_spammers_7dprojecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)ipv4 hash:ip328 unique IPsupdated every 1 hour from this link
proxyrssproxyrss.com open proxies syndicated from multiple sources.ipv4 hash:ipdisabledupdated every 4 hours from this link
ri_connect_proxiesrosinstrument.com open CONNECT proxies (this list is composed using an RSS feed)ipv4 hash:ipdisabledupdated every 1 hour from this link
ri_web_proxiesrosinstrument.com open HTTP proxies (this list is composed using an RSS feed)ipv4 hash:ipdisabledupdated every 1 hour from this link
sblamsblam.com IPs used by web form spammers, during the last monthipv4 hash:ip2461 unique IPsupdated every 1 day from this link
socks_proxysocks-proxy.net open SOCKS proxiesipv4 hash:ip302 unique IPsupdated every 10 mins from this link
socks_proxy_1dsocks-proxy.net open SOCKS proxiesipv4 hash:ip1879 unique IPsupdated every 10 mins from this link
socks_proxy_30dsocks-proxy.net open SOCKS proxiesipv4 hash:ip3927 unique IPsupdated every 10 mins from this link
socks_proxy_7dsocks-proxy.net open SOCKS proxiesipv4 hash:ip2766 unique IPsupdated every 10 mins from this link
sorbs_anonymizersSorbs.net List of open HTTP and SOCKS proxies.ipv4 hash:netdisabled
sorbs_blockSorbs.net List of hosts demanding that they never be tested by SORBS.ipv4 hash:netdisabled
sorbs_escalationsSorbs.net Netblocks of spam supporting service providers, including those who provide websites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list.ipv4 hash:netdisabled
sorbs_new_spamSorbs.net List of hosts that have been noted as sending spam/UCE/UBE within the last 48 hoursipv4 hash:netdisabled
sorbs_noserverSorbs.net IP addresses and netblocks of where system administrators and ISPs owning the network have indicated that servers should not be present.ipv4 hash:netdisabled
sorbs_recent_spamSorbs.net List of hosts that have been noted as sending spam/UCE/UBE within the last 28 days (includes sorbs_new_spam)ipv4 hash:netdisabled
sorbs_smtpSorbs.net List of SMTP Open Relays.ipv4 hash:netdisabled
sorbs_webSorbs.net List of IPs which have spammer abusable vulnerabilities (e.g. FormMail scripts)ipv4 hash:netdisabled
sorbs_zombieSorbs.net List of networks hijacked from their original owners, some of which have already used for spamming.ipv4 hash:netdisabled
spamhaus_dropSpamhaus.org DROP list (according to their site this list should be dropped at tier-1 ISPs globally)ipv4 hash:net1456 subnets, 15655936 unique IPsupdated every 12 hours from this link
spamhaus_edropSpamhaus.org EDROP (extended matches that should be used with DROP)ipv4 hash:net336 subnets, 731392 unique IPsupdated every 12 hours from this link
sslproxiesSSLProxies.org open SSL proxiesipv4 hash:ip102 unique IPsupdated every 10 mins from this link
sslproxies_1dSSLProxies.org open SSL proxiesipv4 hash:ip278 unique IPsupdated every 10 mins from this link
sslproxies_30dSSLProxies.org open SSL proxiesipv4 hash:ip2559 unique IPsupdated every 10 mins from this link
sslproxies_7dSSLProxies.org open SSL proxiesipv4 hash:ip772 unique IPsupdated every 10 mins from this link
stopforumspamStopForumSpam.com Banned IPs used by forum spammersipv4 hash:ip177183 unique IPsupdated every 1 day from this link
stopforumspam_180dStopForumSpam.com IPs used by forum spammers (last 180 days)ipv4 hash:ip318588 unique IPsupdated every 1 day from this link
stopforumspam_1dStopForumSpam.com IPs used by forum spammers in the last 24 hoursipv4 hash:ip5903 unique IPsupdated every 1 hour from this link
stopforumspam_30dStopForumSpam.com IPs used by forum spammers (last 30 days)ipv4 hash:ip73746 unique IPsupdated every 1 day from this link
stopforumspam_365dStopForumSpam.com IPs used by forum spammers (last 365 days)ipv4 hash:ip550822 unique IPsupdated every 1 day from this link
stopforumspam_7dStopForumSpam.com IPs used by forum spammers (last 7 days)ipv4 hash:ip24974 unique IPsupdated every 1 day from this link
stopforumspam_90dStopForumSpam.com IPs used by forum spammers (last 90 days)ipv4 hash:ip177977 unique IPsupdated every 1 day from this link
stopforumspam_toxicStopForumSpam.com Networks that have large amounts of spambots and are flagged as toxic. Toxic IP ranges are infrequently changed.ipv4 hash:net51 subnets, 121708 unique IPsupdated every 1 day from this link
tor_exitsTorProject.org list of all current TOR exit points (TorDNSEL)ipv4 hash:ip1227 unique IPsupdated every 5 mins from this link
tor_exits_1dTorProject.org list of all current TOR exit points (TorDNSEL)ipv4 hash:ip1231 unique IPsupdated every 5 mins from this link
tor_exits_30dTorProject.org list of all current TOR exit points (TorDNSEL)ipv4 hash:ip1498 unique IPsupdated every 5 mins from this link
tor_exits_7dTorProject.org list of all current TOR exit points (TorDNSEL)ipv4 hash:ip1309 unique IPsupdated every 5 mins from this link
urandomusto_dnsIP Feed about dns, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_ftpIP Feed about ftp, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_httpIP Feed about http, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_mailerIP Feed about mailer, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_malwareIP Feed about malware, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_ntpIP Feed about ntp, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_rdpIP Feed about rdp, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_smbIP Feed about smb, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_spamIP Feed about spam, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_sshIP Feed about ssh, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_telnetIP Feed about telnet, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_unspecifiedIP Feed about unspecified, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
urandomusto_vncIP Feed about vnc, crawled from several sources, including several twitter accounts.ipv4 hash:ipdisabledupdated every 1 hour from this link
vxvaultVxVault The latest 100 additions of VxVault.ipv4 hash:ip63 unique IPsupdated every 12 hours from this link
yoyo_adserversYoyo.org IPs of ad serversipv4 hash:ip8978 unique IPsupdated every 12 hours from this link
zeusAbuse.ch Zeus tracker standard, contains the same data as the ZeuS IP blocklist (zeus_badips) but with the slight difference that it doesn't exclude hijacked websites (level 2) and free web hosting providers (level 3). This means that this blocklist contains all IPv4 addresses associated with ZeuS C&Cs which are currently being tracked by ZeuS Tracker. Hence this blocklist will likely cause some false positives.ipv4 hash:ipdisabledupdated every 30 mins from this link
zeus_badipsAbuse.ch Zeus tracker badips includes IPv4 addresses that are used by the ZeuS trojan. It is the recommened blocklist if you want to block only ZeuS IPs. It excludes IP addresses that ZeuS Tracker believes to be hijacked (level 2) or belong to a free web hosting provider (level 3). Hence the false postive rate should be much lower compared to the standard ZeuS IP blocklist.ipv4 hash:ipdisabledupdated every 30 mins from this link