Convert Figma logo to code with AI

stamparm logoipsum

Daily feed of bad IPs (with blacklist hit scores)

1,746
153
1,746
3

Top Related Projects

ipsets dynamically updated with firehol's update-ipsets.sh script

Block spying and tracking on Windows

27,991

🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.

The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.

Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage

Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.

Quick Overview

Ipsum is a comprehensive collection of IP blocklists for various security purposes. It aggregates and maintains lists of potentially malicious IP addresses from multiple sources, providing a valuable resource for network administrators and security professionals to enhance their defensive measures against cyber threats.

Pros

  • Regularly updated with fresh data from numerous reputable sources
  • Offers different types of blocklists (e.g., malware, abuse, spam) for specific use cases
  • Easy to integrate into existing security infrastructure and tools
  • Provides both IPv4 and IPv6 address lists

Cons

  • May include false positives, potentially blocking legitimate traffic
  • Requires careful implementation to avoid over-blocking or performance issues
  • Limited documentation on how to effectively use the lists in various scenarios
  • Relies on external sources, which may have varying levels of accuracy or timeliness

Getting Started

To use Ipsum in your security setup:

  1. Clone the repository:

    git clone https://github.com/stamparm/ipsum.git
    
  2. Choose the appropriate blocklist file based on your needs (e.g., ipsum.txt for a comprehensive list).

  3. Integrate the chosen list into your firewall, intrusion detection system, or other security tools. For example, with iptables:

    for ip in $(cat ipsum.txt); do
      iptables -A INPUT -s $ip -j DROP
    done
    
  4. Set up a cron job to regularly update the lists:

    0 0 * * * cd /path/to/ipsum && git pull origin master
    

Remember to test thoroughly in a controlled environment before deploying in production to ensure compatibility with your systems and to minimize potential disruptions.

Competitor Comparisons

ipsets dynamically updated with firehol's update-ipsets.sh script

Pros of blocklist-ipsets

  • Larger collection of IP blocklists from various sources
  • More frequent updates and active maintenance
  • Includes additional tools for processing and analyzing blocklists

Cons of blocklist-ipsets

  • May include more false positives due to the diverse range of sources
  • Larger file sizes and potentially higher resource usage
  • More complex setup and configuration for some use cases

Code Comparison

ipsum:

#!/bin/bash
curl -sS https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1 > blacklist.txt

blocklist-ipsets:

#!/bin/bash
git clone https://github.com/firehol/blocklist-ipsets.git
cd blocklist-ipsets
./update-ipsets.sh

Summary

Both ipsum and blocklist-ipsets provide valuable IP blocklists for security purposes. ipsum offers a simpler, more focused approach with a single curated list, while blocklist-ipsets provides a comprehensive collection of lists from various sources. The choice between the two depends on specific requirements, such as the desired level of granularity, update frequency, and resource constraints. ipsum may be more suitable for lightweight implementations, while blocklist-ipsets offers more flexibility and extensive coverage for advanced security setups.

Block spying and tracking on Windows

Pros of WindowsSpyBlocker

  • Specifically targets Windows telemetry and privacy concerns
  • Provides multiple blocking methods (hosts file, firewall rules, etc.)
  • Includes a user-friendly interface for managing blocked domains

Cons of WindowsSpyBlocker

  • Limited to Windows platform
  • May require more manual configuration and maintenance
  • Focuses solely on Microsoft-related domains and IPs

Code Comparison

WindowsSpyBlocker (PowerShell):

$ips = Get-Content -Path "$PSScriptRoot\data\firewall\spy.txt"
foreach ($ip in $ips) {
    New-NetFirewallRule -DisplayName "Block Windows Spy IP" -Direction Outbound -Action Block -RemoteAddress $ip
}

Ipsum (Python):

with open('ipsum.txt', 'r') as f:
    blocklist = f.read().splitlines()

for ip in blocklist:
    print(f"iptables -A INPUT -s {ip} -j DROP")

Summary

WindowsSpyBlocker is a specialized tool for blocking Windows telemetry, offering multiple blocking methods and a user interface. It's limited to Windows and requires more manual configuration. Ipsum, on the other hand, is a simpler, platform-agnostic IP blocklist that can be easily integrated into various firewall systems. WindowsSpyBlocker uses PowerShell for firewall rules, while Ipsum generates iptables commands in Python.

27,991

🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.

Pros of hosts

  • More comprehensive, combining multiple well-curated sources
  • Offers customizable versions (e.g., fakenews, gambling, social)
  • Actively maintained with frequent updates

Cons of hosts

  • Larger file size due to comprehensive nature
  • May block some legitimate domains in certain categories
  • Requires more processing power to parse and apply

Code Comparison

hosts:

0.0.0.0 0.0.0.0
0.0.0.0 1.2.3.4
0.0.0.0 101.com
0.0.0.0 101order.com
0.0.0.0 123banners.com

ipsum:

1.2.3.4
2.3.4.5
3.4.5.6
4.5.6.7
5.6.7.8

Key Differences

  • hosts uses the 0.0.0.0 prefix for each entry
  • ipsum provides only IP addresses without domain names
  • hosts includes both IP addresses and domain names
  • ipsum is more compact and focused on malicious IPs
  • hosts offers a broader range of blocked content types

Both repositories serve as valuable resources for network security and ad-blocking, but they cater to slightly different use cases. hosts is more suitable for general-purpose blocking and content filtering, while ipsum is focused on known malicious IP addresses.

The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.

Pros of Ultimate.Hosts.Blacklist

  • Larger and more comprehensive blocklist with over 800,000 domains
  • Regularly updated with contributions from multiple sources
  • Provides additional tools and scripts for list management and deployment

Cons of Ultimate.Hosts.Blacklist

  • May include more false positives due to its extensive size
  • Requires more system resources to process and implement
  • Can potentially cause issues with legitimate websites if not carefully managed

Code Comparison

Ultimate.Hosts.Blacklist:

def parse_rule(rule):
    rule = rule.strip()
    if rule.startswith('#') or not rule:
        return None
    return rule.split()[1]

ipsum:

def generate_blacklist():
    addresses = set()
    for line in fileinput.input():
        line = line.strip()
        if not line or line.startswith('#'):
            continue
        addresses.add(line)
    return addresses

Both repositories use Python for list processing, but Ultimate.Hosts.Blacklist employs a more structured approach with dedicated functions for parsing rules. ipsum uses a simpler, more straightforward method for generating the blacklist.

While Ultimate.Hosts.Blacklist offers a more comprehensive solution with additional features, ipsum provides a lighter, more focused approach to IP blacklisting. The choice between the two depends on the specific needs of the user, balancing between extensive coverage and simplicity of implementation.

Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage

Pros of hosts-blocklists

  • Larger blocklist with more comprehensive coverage
  • Regularly updated with community contributions
  • Includes separate lists for different purposes (e.g., ads, tracking, malware)

Cons of hosts-blocklists

  • May cause more false positives due to its extensive nature
  • Requires more system resources to process and implement
  • Can potentially break some legitimate websites or services

Code Comparison

hosts-blocklists:

0.0.0.0 0.0.0.0
0.0.0.0 0.r.msn.com
0.0.0.0 0.start.bz
0.0.0.0 000free.us
0.0.0.0 000webhost.com

ipsum:

1.1.1.1 1.1.1.1
1.2.3.4 malicious1.com
5.6.7.8 malicious2.com
9.10.11.12 malicious3.com
13.14.15.16 malicious4.com

The code snippets show that hosts-blocklists uses the 0.0.0.0 IP address to block domains, while ipsum uses various IP addresses. hosts-blocklists appears to block more general domains, whereas ipsum focuses on specific malicious domains.

Both repositories serve as valuable resources for network administrators and security-conscious users looking to enhance their systems' protection against malicious activities. The choice between them depends on the specific needs and resources of the user, with hosts-blocklists offering broader coverage at the cost of potential false positives, and ipsum providing a more focused approach.

Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.

Pros of Phishing.Database

  • Larger dataset with over 1 million phishing URLs
  • More frequent updates (multiple times per day)
  • Includes additional metadata like submission date and status

Cons of Phishing.Database

  • Less organized file structure
  • Lacks comprehensive documentation
  • May contain more false positives due to its larger size

Code Comparison

Phishing.Database:

https://www.paypal.com.9ks8jd.ru/
http://appleid.apple.com.securelogin-user.com/
https://www.dropbox.com.security-check.gq/

ipsum:

1.162.131.53
103.21.244.0/22
103.22.200.0/22

Summary

Phishing.Database offers a more extensive and frequently updated list of phishing URLs, making it suitable for real-time threat intelligence. However, ipsum provides a more focused and curated list of malicious IP addresses and networks, which may be easier to integrate into security systems. The choice between the two depends on specific use cases and the type of data required for threat detection and prevention.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Logo

License

About

IPsum is a threat intelligence feed based on 30+ different publicly available lists of suspicious and/or malicious IP addresses. All lists are automatically retrieved and parsed on a daily (24h) basis and the final result is pushed to this repository. List is made of IP addresses together with a total number of (black)list occurrence (for each). Greater the number, lesser the chance of false positive detection and/or dropping in (inbound) monitored traffic. Also, list is sorted from most (problematic) to least occurent IP addresses.

As an example, to get a fresh and ready-to-deploy auto-ban list of "bad IPs" that appear on at least 3 (black)lists you can run:

curl https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1

If you want to try it with ipset, you can do the following:

sudo su
apt-get -qq install iptables ipset
ipset -q flush ipsum
ipset -q create ipsum hash:ip
for ip in $(curl https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1); do ipset add ipsum $ip; done
iptables -D INPUT -m set --match-set ipsum src -j DROP 2>/dev/null
iptables -I INPUT -m set --match-set ipsum src -j DROP

In directory levels you can find preprocessed raw IP lists based on number of blacklist occurrences (e.g. levels/3.txt holds IP addresses that can be found on 3 or more blacklists).

Wall of Shame (2025-04-01)

IPDNS lookupNumber of (black)lists
184.168.122.184184.122.168.184.host.secureserver.net9
194.0.234.35-9
92.255.85.188-8
134.209.120.69-8
194.0.234.36-8
195.178.110.26-8
195.178.110.31-8
218.92.0.103-8
218.92.0.111-8
218.92.0.198-8
218.92.0.218-8
218.92.0.231-8
80.82.77.139dojo.census.shodan.io7
45.148.10.131-7
45.148.10.240-7
103.197.184.162-7
116.110.85.50-7
196.251.66.3-7
196.251.67.42-7
218.92.0.112-7
218.92.0.216-7
218.92.0.217-7
218.92.0.219-7
218.92.0.220-7
218.92.0.221-7
218.92.0.222-7
218.92.0.223-7
218.92.0.225-7
218.92.0.226-7
218.92.0.227-7
218.92.0.228-7
218.92.0.229-7
218.92.0.230-7
218.92.0.232-7
218.92.0.233-7
218.92.0.235-7
218.92.0.236-7
218.92.0.237-7
150.5.156.34-7
160.191.89.4-7
185.213.173.44-7
81.181.129.243-7
92.255.85.253-7