Top Related Projects
ipsets dynamically updated with firehol's update-ipsets.sh script
Block spying and tracking on Windows
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Quick Overview
Ipsum is a comprehensive collection of IP blocklists for various security purposes. It aggregates and maintains lists of potentially malicious IP addresses from multiple sources, providing a valuable resource for network administrators and security professionals to enhance their defensive measures against cyber threats.
Pros
- Regularly updated with fresh data from numerous reputable sources
- Offers different types of blocklists (e.g., malware, abuse, spam) for specific use cases
- Easy to integrate into existing security infrastructure and tools
- Provides both IPv4 and IPv6 address lists
Cons
- May include false positives, potentially blocking legitimate traffic
- Requires careful implementation to avoid over-blocking or performance issues
- Limited documentation on how to effectively use the lists in various scenarios
- Relies on external sources, which may have varying levels of accuracy or timeliness
Getting Started
To use Ipsum in your security setup:
-
Clone the repository:
git clone https://github.com/stamparm/ipsum.git
-
Choose the appropriate blocklist file based on your needs (e.g.,
ipsum.txt
for a comprehensive list). -
Integrate the chosen list into your firewall, intrusion detection system, or other security tools. For example, with iptables:
for ip in $(cat ipsum.txt); do iptables -A INPUT -s $ip -j DROP done
-
Set up a cron job to regularly update the lists:
0 0 * * * cd /path/to/ipsum && git pull origin master
Remember to test thoroughly in a controlled environment before deploying in production to ensure compatibility with your systems and to minimize potential disruptions.
Competitor Comparisons
ipsets dynamically updated with firehol's update-ipsets.sh script
Pros of blocklist-ipsets
- Larger collection of IP blocklists from various sources
- More frequent updates and active maintenance
- Includes additional tools for processing and analyzing blocklists
Cons of blocklist-ipsets
- May include more false positives due to the diverse range of sources
- Larger file sizes and potentially higher resource usage
- More complex setup and configuration for some use cases
Code Comparison
ipsum:
#!/bin/bash
curl -sS https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1 > blacklist.txt
blocklist-ipsets:
#!/bin/bash
git clone https://github.com/firehol/blocklist-ipsets.git
cd blocklist-ipsets
./update-ipsets.sh
Summary
Both ipsum and blocklist-ipsets provide valuable IP blocklists for security purposes. ipsum offers a simpler, more focused approach with a single curated list, while blocklist-ipsets provides a comprehensive collection of lists from various sources. The choice between the two depends on specific requirements, such as the desired level of granularity, update frequency, and resource constraints. ipsum may be more suitable for lightweight implementations, while blocklist-ipsets offers more flexibility and extensive coverage for advanced security setups.
Block spying and tracking on Windows
Pros of WindowsSpyBlocker
- Specifically targets Windows telemetry and privacy concerns
- Provides multiple blocking methods (hosts file, firewall rules, etc.)
- Includes a user-friendly interface for managing blocked domains
Cons of WindowsSpyBlocker
- Limited to Windows platform
- May require more manual configuration and maintenance
- Focuses solely on Microsoft-related domains and IPs
Code Comparison
WindowsSpyBlocker (PowerShell):
$ips = Get-Content -Path "$PSScriptRoot\data\firewall\spy.txt"
foreach ($ip in $ips) {
New-NetFirewallRule -DisplayName "Block Windows Spy IP" -Direction Outbound -Action Block -RemoteAddress $ip
}
Ipsum (Python):
with open('ipsum.txt', 'r') as f:
blocklist = f.read().splitlines()
for ip in blocklist:
print(f"iptables -A INPUT -s {ip} -j DROP")
Summary
WindowsSpyBlocker is a specialized tool for blocking Windows telemetry, offering multiple blocking methods and a user interface. It's limited to Windows and requires more manual configuration. Ipsum, on the other hand, is a simpler, platform-agnostic IP blocklist that can be easily integrated into various firewall systems. WindowsSpyBlocker uses PowerShell for firewall rules, while Ipsum generates iptables commands in Python.
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Pros of hosts
- More comprehensive, combining multiple well-curated sources
- Offers customizable versions (e.g., fakenews, gambling, social)
- Actively maintained with frequent updates
Cons of hosts
- Larger file size due to comprehensive nature
- May block some legitimate domains in certain categories
- Requires more processing power to parse and apply
Code Comparison
hosts:
0.0.0.0 0.0.0.0
0.0.0.0 1.2.3.4
0.0.0.0 101.com
0.0.0.0 101order.com
0.0.0.0 123banners.com
ipsum:
1.2.3.4
2.3.4.5
3.4.5.6
4.5.6.7
5.6.7.8
Key Differences
- hosts uses the 0.0.0.0 prefix for each entry
- ipsum provides only IP addresses without domain names
- hosts includes both IP addresses and domain names
- ipsum is more compact and focused on malicious IPs
- hosts offers a broader range of blocked content types
Both repositories serve as valuable resources for network security and ad-blocking, but they cater to slightly different use cases. hosts is more suitable for general-purpose blocking and content filtering, while ipsum is focused on known malicious IP addresses.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
Pros of Ultimate.Hosts.Blacklist
- Larger and more comprehensive blocklist with over 800,000 domains
- Regularly updated with contributions from multiple sources
- Provides additional tools and scripts for list management and deployment
Cons of Ultimate.Hosts.Blacklist
- May include more false positives due to its extensive size
- Requires more system resources to process and implement
- Can potentially cause issues with legitimate websites if not carefully managed
Code Comparison
Ultimate.Hosts.Blacklist:
def parse_rule(rule):
rule = rule.strip()
if rule.startswith('#') or not rule:
return None
return rule.split()[1]
ipsum:
def generate_blacklist():
addresses = set()
for line in fileinput.input():
line = line.strip()
if not line or line.startswith('#'):
continue
addresses.add(line)
return addresses
Both repositories use Python for list processing, but Ultimate.Hosts.Blacklist employs a more structured approach with dedicated functions for parsing rules. ipsum uses a simpler, more straightforward method for generating the blacklist.
While Ultimate.Hosts.Blacklist offers a more comprehensive solution with additional features, ipsum provides a lighter, more focused approach to IP blacklisting. The choice between the two depends on the specific needs of the user, balancing between extensive coverage and simplicity of implementation.
Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Pros of hosts-blocklists
- Larger blocklist with more comprehensive coverage
- Regularly updated with community contributions
- Includes separate lists for different purposes (e.g., ads, tracking, malware)
Cons of hosts-blocklists
- May cause more false positives due to its extensive nature
- Requires more system resources to process and implement
- Can potentially break some legitimate websites or services
Code Comparison
hosts-blocklists:
0.0.0.0 0.0.0.0
0.0.0.0 0.r.msn.com
0.0.0.0 0.start.bz
0.0.0.0 000free.us
0.0.0.0 000webhost.com
ipsum:
1.1.1.1 1.1.1.1
1.2.3.4 malicious1.com
5.6.7.8 malicious2.com
9.10.11.12 malicious3.com
13.14.15.16 malicious4.com
The code snippets show that hosts-blocklists uses the 0.0.0.0 IP address to block domains, while ipsum uses various IP addresses. hosts-blocklists appears to block more general domains, whereas ipsum focuses on specific malicious domains.
Both repositories serve as valuable resources for network administrators and security-conscious users looking to enhance their systems' protection against malicious activities. The choice between them depends on the specific needs and resources of the user, with hosts-blocklists offering broader coverage at the cost of potential false positives, and ipsum providing a more focused approach.
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Pros of Phishing.Database
- Larger dataset with over 1 million phishing URLs
- More frequent updates (multiple times per day)
- Includes additional metadata like submission date and status
Cons of Phishing.Database
- Less organized file structure
- Lacks comprehensive documentation
- May contain more false positives due to its larger size
Code Comparison
Phishing.Database:
https://www.paypal.com.9ks8jd.ru/
http://appleid.apple.com.securelogin-user.com/
https://www.dropbox.com.security-check.gq/
ipsum:
1.162.131.53
103.21.244.0/22
103.22.200.0/22
Summary
Phishing.Database offers a more extensive and frequently updated list of phishing URLs, making it suitable for real-time threat intelligence. However, ipsum provides a more focused and curated list of malicious IP addresses and networks, which may be easier to integrate into security systems. The choice between the two depends on specific use cases and the type of data required for threat detection and prevention.
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
About
IPsum is a threat intelligence feed based on 30+ different publicly available lists of suspicious and/or malicious IP addresses. All lists are automatically retrieved and parsed on a daily (24h) basis and the final result is pushed to this repository. List is made of IP addresses together with a total number of (black)list occurrence (for each). Greater the number, lesser the chance of false positive detection and/or dropping in (inbound) monitored traffic. Also, list is sorted from most (problematic) to least occurent IP addresses.
As an example, to get a fresh and ready-to-deploy auto-ban list of "bad IPs" that appear on at least 3 (black)lists you can run:
curl https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1
If you want to try it with ipset
, you can do the following:
sudo su
apt-get -qq install iptables ipset
ipset -q flush ipsum
ipset -q create ipsum hash:ip
for ip in $(curl https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1); do ipset add ipsum $ip; done
iptables -D INPUT -m set --match-set ipsum src -j DROP 2>/dev/null
iptables -I INPUT -m set --match-set ipsum src -j DROP
In directory levels you can find preprocessed raw IP lists based on number of blacklist occurrences (e.g. levels/3.txt holds IP addresses that can be found on 3 or more blacklists).
Wall of Shame (2025-04-01)
IP | DNS lookup | Number of (black)lists |
---|---|---|
184.168.122.184 | 184.122.168.184.host.secureserver.net | 9 |
194.0.234.35 | - | 9 |
92.255.85.188 | - | 8 |
134.209.120.69 | - | 8 |
194.0.234.36 | - | 8 |
195.178.110.26 | - | 8 |
195.178.110.31 | - | 8 |
218.92.0.103 | - | 8 |
218.92.0.111 | - | 8 |
218.92.0.198 | - | 8 |
218.92.0.218 | - | 8 |
218.92.0.231 | - | 8 |
80.82.77.139 | dojo.census.shodan.io | 7 |
45.148.10.131 | - | 7 |
45.148.10.240 | - | 7 |
103.197.184.162 | - | 7 |
116.110.85.50 | - | 7 |
196.251.66.3 | - | 7 |
196.251.67.42 | - | 7 |
218.92.0.112 | - | 7 |
218.92.0.216 | - | 7 |
218.92.0.217 | - | 7 |
218.92.0.219 | - | 7 |
218.92.0.220 | - | 7 |
218.92.0.221 | - | 7 |
218.92.0.222 | - | 7 |
218.92.0.223 | - | 7 |
218.92.0.225 | - | 7 |
218.92.0.226 | - | 7 |
218.92.0.227 | - | 7 |
218.92.0.228 | - | 7 |
218.92.0.229 | - | 7 |
218.92.0.230 | - | 7 |
218.92.0.232 | - | 7 |
218.92.0.233 | - | 7 |
218.92.0.235 | - | 7 |
218.92.0.236 | - | 7 |
218.92.0.237 | - | 7 |
150.5.156.34 | - | 7 |
160.191.89.4 | - | 7 |
185.213.173.44 | - | 7 |
81.181.129.243 | - | 7 |
92.255.85.253 | - | 7 |
Top Related Projects
ipsets dynamically updated with firehol's update-ipsets.sh script
Block spying and tracking on Windows
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
The Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
Automatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot