GitHub - firehol/blocklist-ipsets: ipsets dynamically updated with firehol's update-ipsets.sh script
bds_atif
Artillery Threat Intelligence Feed and Banlist Feed
ipv4 hash:ip
649 unique IPs
updated every 1 day from this link
bitcoin_nodes
BitNodes Bitcoin connected nodes, globally.
ipv4 hash:ip
7196 unique IPs
updated every 10 mins from this link
bitcoin_nodes_1d
BitNodes Bitcoin connected nodes, globally.
ipv4 hash:ip
7998 unique IPs
updated every 10 mins from this link
bitcoin_nodes_30d
BitNodes Bitcoin connected nodes, globally.
ipv4 hash:ip
15789 unique IPs
updated every 10 mins from this link
bitcoin_nodes_7d
BitNodes Bitcoin connected nodes, globally.
ipv4 hash:ip
9777 unique IPs
updated every 10 mins from this link
blocklist_de
Blocklist.de IPs that have been detected by fail2ban in the last 48 hours
ipv4 hash:ip
32510 unique IPs
updated every 15 mins from this link
blocklist_de_apache
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
ipv4 hash:ip
10389 unique IPs
updated every 15 mins from this link
blocklist_de_bots
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = it has posted a Spam-Comment on a open Forum or Wiki).
ipv4 hash:ip
6623 unique IPs
updated every 15 mins from this link
blocklist_de_bruteforce
Blocklist.de All IPs which attacks Joomla, Wordpress and other Web-Logins with Brute-Force Logins.
ipv4 hash:ip
2013 unique IPs
updated every 15 mins from this link
blocklist_de_ftp
Blocklist.de All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
ipv4 hash:ip
436 unique IPs
updated every 15 mins from this link
blocklist_de_imap
Blocklist.de All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3, etc.
ipv4 hash:ip
6802 unique IPs
updated every 15 mins from this link
blocklist_de_mail
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
ipv4 hash:ip
16105 unique IPs
updated every 15 mins from this link
blocklist_de_sip
Blocklist.de All IP addresses that tried to login in a SIP, VOIP or Asterisk Server and are included in the IPs list from infiltrated.net
ipv4 hash:ip
48 unique IPs
updated every 15 mins from this link
blocklist_de_ssh
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
ipv4 hash:ip
6868 unique IPs
updated every 15 mins from this link
blocklist_de_strongips
Blocklist.de All IPs which are older then 2 month and have more then 5.000 attacks.
ipv4 hash:ip
306 unique IPs
updated every 15 mins from this link
blocklist_net_ua
blocklist.net.ua The BlockList project was created to become protection against negative influence of the harmful and potentially dangerous events on the Internet. First of all this service will help internet and hosting providers to protect subscribers sites from being hacked. BlockList will help to stop receiving a large amount of spam from dubious SMTP relays or from attempts of brute force passwords to servers and network equipment.
ipv4 hash:ip
83725 unique IPs
updated every 10 mins from this link
bm_tor
torstatus.blutmagie.de list of all TOR network servers
ipv4 hash:ip
disabled
updated every 30 mins from this link
bogons
Team-Cymru.org private and reserved addresses defined by RFC 1918, RFC 5735, and RFC 6598 and netblocks that have not been allocated to a regional internet registry
ipv4 hash:net
13 subnets, 592708608 unique IPs
updated every 1 day
botscout
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.
ipv4 hash:ip
60 unique IPs
updated every 30 mins from this link
botscout_1d
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.
ipv4 hash:ip
549 unique IPs
updated every 30 mins from this link
botscout_30d
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.
ipv4 hash:ip
9241 unique IPs
updated every 30 mins from this link
botscout_7d
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots.
ipv4 hash:ip
3099 unique IPs
updated every 30 mins from this link
botvrij_dst
botvrij.eu Indicators of Compromise (IOCS) about malicious destination IPs, gathered via open source information feeds (blog pages and PDF documents) and then consolidated into different datasets. To ensure the quality of the data all entries older than approx. 6 months are removed.
ipv4 hash:ip
disabled
updated every 1 day from this link
botvrij_src
botvrij.eu Indicators of Compromise (IOCS) about malicious source IPs, gathered via open source information feeds (blog pages and PDF documents) and then consolidated into different datasets. To ensure the quality of the data all entries older than approx. 6 months are removed.
ipv4 hash:ip
disabled
updated every 1 day from this link
bruteforceblocker
danger.rulez.sk bruteforceblocker (fail2ban alternative for SSH on OpenBSD). This is an automatically generated list from users reporting failed authentication attempts. An IP seems to be included if 3 or more users report it. Its retention pocily seems 30 days.
ipv4 hash:ip
560 unique IPs
updated every 3 hours from this link
ciarmy
CIArmy.com IPs with poor Rogue Packet score that have not yet been identified as malicious by the community
ipv4 hash:ip
15000 unique IPs
updated every 3 hours from this link
cidr_report_bogons
Unallocated (Free) Address Space, generated on a daily basis using the IANA registry files, the Regional Internet Registry stats files and the Regional Internet Registry whois data.
ipv4 hash:net
18 subnets, 588514808 unique IPs
updated every 1 day from this link
cleantalk
CleanTalk Today's HTTP Spammers (includes: cleantalk_new cleantalk_updated)
ipv4 hash:ip
494 unique IPs
updated every 1 min
cleantalk_1d
CleanTalk Today's HTTP Spammers (includes: cleantalk_new_1d cleantalk_updated_1d)
ipv4 hash:ip
1900 unique IPs
updated every 1 min
cleantalk_30d
CleanTalk Today's HTTP Spammers (includes: cleantalk_new_30d cleantalk_updated_30d)
ipv4 hash:ip
37919 unique IPs
updated every 1 min
cleantalk_7d
CleanTalk Today's HTTP Spammers (includes: cleantalk_new_7d cleantalk_updated_7d)
ipv4 hash:ip
9233 unique IPs
updated every 1 min
cleantalk_new
CleanTalk Recent HTTP Spammers
ipv4 hash:ip
250 unique IPs
updated every 15 mins from this link
cleantalk_new_1d
CleanTalk Recent HTTP Spammers
ipv4 hash:ip
754 unique IPs
updated every 15 mins from this link
cleantalk_new_30d
CleanTalk Recent HTTP Spammers
ipv4 hash:ip
15416 unique IPs
updated every 15 mins from this link
cleantalk_new_7d
CleanTalk Recent HTTP Spammers
ipv4 hash:ip
3989 unique IPs
updated every 15 mins from this link
cleantalk_top20
CleanTalk Top 20 HTTP Spammers
ipv4 hash:ip
20 unique IPs
updated every 1 day from this link
cleantalk_updated
CleanTalk Recurring HTTP Spammers
ipv4 hash:ip
250 unique IPs
updated every 15 mins from this link
cleantalk_updated_1d
CleanTalk Recurring HTTP Spammers
ipv4 hash:ip
1278 unique IPs
updated every 15 mins from this link
cleantalk_updated_30d
CleanTalk Recurring HTTP Spammers
ipv4 hash:ip
28579 unique IPs
updated every 15 mins from this link
cleantalk_updated_7d
CleanTalk Recurring HTTP Spammers
ipv4 hash:ip
6171 unique IPs
updated every 15 mins from this link
cta_cryptowall
Cyber Threat Alliance CryptoWall is one of the most lucrative and broad-reaching ransomware campaigns affecting Internet users today. Sharing intelligence and analysis resources, the CTA profiled the latest version of CryptoWall, which impacted hundreds of thousands of users, resulting in over US $325 million in damages worldwide.
ipv4 hash:ip
1360 unique IPs
updated every 1 day from this link
cybercrime
CyberCrime A project tracking Command and Control.
ipv4 hash:ip
216 unique IPs
updated every 12 hours from this link
darklist_de
darklist.de ssh fail2ban reporting
ipv4 hash:net
6008 subnets, 274857 unique IPs
updated every 1 day from this link
dataplane_dnsrd
DataPlane.org IP addresses that have been identified as sending recursive DNS queries to a remote host. This report lists addresses that may be cataloging open DNS resolvers or evaluating cache entries.
ipv4 hash:ip
54455 unique IPs
updated every 1 hour
dataplane_dnsrdany
DataPlane.org IP addresses that have been identified as sending recursive DNS IN ANY queries to a remote host. This report lists addresses that may be cataloging open DNS resolvers for the purpose of later using them to facilitate DNS amplification and reflection attacks.
ipv4 hash:ip
47952 unique IPs
updated every 1 hour
dataplane_dnsversion
DataPlane.org IP addresses that have been identified as sending DNS CH TXT VERSION.BIND queries to a remote host. This report lists addresses that may be cataloging DNS software.
ipv4 hash:ip
5878 unique IPs
updated every 1 hour
dataplane_sipinvitation
DataPlane.org IP addresses that have been seen initiating a SIP INVITE operation to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP client cataloging or conducting various forms of telephony abuse.
ipv4 hash:ip
56 unique IPs
updated every 1 hour
dataplane_sipquery
DataPlane.org IP addresses that has been seen initiating a SIP OPTIONS query to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP server cataloging or conducting various forms of telephony abuse.
ipv4 hash:ip
4747 unique IPs
updated every 1 hour
dataplane_sipregistration
DataPlane.org IP addresses that have been seen initiating a SIP REGISTER operation to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP client cataloging or conducting various forms of telephony abuse.
ipv4 hash:ip
475 unique IPs
updated every 1 hour
dataplane_sshclient
DataPlane.org IP addresses that has been seen initiating an SSH connection to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SSH server cataloging or conducting authentication attack attempts.
ipv4 hash:ip
36666 unique IPs
updated every 1 hour
dataplane_sshpwauth
DataPlane.org IP addresses that has been seen attempting to remotely login to a host using SSH password authentication. This report lists hosts that are highly suspicious and are likely conducting malicious SSH password authentication attacks.
ipv4 hash:ip
29300 unique IPs
updated every 1 hour
dataplane_vncrfb
DataPlane.org IP addresses that have been seen initiating a VNC remote frame buffer (RFB) session to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be VNC server cataloging or conducting various forms of remote access abuse.
ipv4 hash:ip
2108 unique IPs
updated every 1 hour
dm_tor
dan.me.uk dynamic list of TOR nodes
ipv4 hash:ip
7284 unique IPs
updated every 30 mins from this link
dronebl_anonymizers
DroneBL.org List of open proxies. It includes IPs which DroneBL categorizes as SOCKS proxies (8), HTTP proxies (9), web page proxies (11), WinGate proxies (14), proxy chains (10).
ipv4 hash:net
1276703 subnets, 1380407 unique IPs
updated every 1 min
dronebl_auto_botnets
DroneBL.org IPs of automatically detected botnets. It includes IPs for which DroneBL responds with 17.
ipv4 hash:net
32127 subnets, 33657 unique IPs
updated every 1 min
dronebl_autorooting_worms
DroneBL.org IPs of autorooting worms. It includes IPs for which DroneBL responds with 16. These are usually SSH bruteforce attacks.
ipv4 hash:net
36 subnets, 36 unique IPs
updated every 1 min
dronebl_compromised
DroneBL.org IPs of compromised routers / gateways. It includes IPs for which DroneBL responds with 15 (BOPM detected).
ipv4 hash:net
46270 subnets, 47714 unique IPs
updated every 1 min
dronebl_ddos_drones
DroneBL.org IPs of DDoS drones. It includes IPs for which DroneBL responds with 7.
ipv4 hash:net
7297 subnets, 7453 unique IPs
updated every 1 min
dronebl_dns_mx_on_irc
DroneBL.org List of IPs of DNS / MX hostname detected on IRC. It includes IPs for which DroneBL responds with 18.
ipv4 hash:net
16 subnets, 16 unique IPs
updated every 1 min
dronebl_irc_drones
DroneBL.org List of IRC spam drones (litmus/sdbot/fyle). It includes IPs for which DroneBL responds with 3.
ipv4 hash:net
836294 subnets, 1005887 unique IPs
updated every 1 min
dronebl_unknown
DroneBL.org List of IPs of uncategorized threats. It includes IPs for which DroneBL responds with 255.
ipv4 hash:net
16 subnets, 16 unique IPs
updated every 1 min
dronebl_worms_bots
DroneBL.org IPs of unknown worms or spambots. It includes IPs for which DroneBL responds with 6
ipv4 hash:net
432997 subnets, 444506 unique IPs
updated every 1 min
dshield
DShield.org top 20 attacking class C (/24) subnets over the last three days
ipv4 hash:net
20 subnets, 5120 unique IPs
updated every 10 mins from this link
dshield_1d
DShield.org top 20 attacking class C (/24) subnets over the last three days
ipv4 hash:net
29 subnets, 7424 unique IPs
updated every 10 mins from this link
dshield_30d
DShield.org top 20 attacking class C (/24) subnets over the last three days
ipv4 hash:net
58 subnets, 15616 unique IPs
updated every 10 mins from this link
dshield_7d
DShield.org top 20 attacking class C (/24) subnets over the last three days
ipv4 hash:net
40 subnets, 10752 unique IPs
updated every 10 mins from this link
et_block
EmergingThreats.net default blacklist (at the time of writing includes spamhaus DROP, dshield and abuse.ch trackers, which are available separately too - prefer to use the direct ipsets instead of this, they seem to lag a bit in updates)
ipv4 hash:net
1477 subnets, 15039491 unique IPs
updated every 12 hours from this link
et_compromised
EmergingThreats.net compromised hosts
ipv4 hash:ip
515 unique IPs
updated every 12 hours from this link
et_dshield
EmergingThreats.net dshield blocklist
ipv4 hash:net
20 subnets, 5120 unique IPs
updated every 12 hours from this link
et_spamhaus
EmergingThreats.net spamhaus blocklist
ipv4 hash:net
1457 subnets, 15035136 unique IPs
updated every 12 hours from this link
et_tor
EmergingThreats.net TOR list of TOR network IPs
ipv4 hash:ip
7300 unique IPs
updated every 12 hours from this link
feodo
Abuse.ch Feodo tracker trojan includes IPs which are being used by Feodo (also known as Cridex or Bugat) which commits ebanking fraud
ipv4 hash:ip
1 unique IPs
updated every 30 mins from this link
feodo_badips
Abuse.ch Feodo tracker BadIPs The Feodo Tracker Feodo BadIP Blocklist only contains IP addresses (IPv4) used as C&C communication channel by the Feodo Trojan version B. These IP addresses are usually servers rented by cybercriminals directly and used for the exclusive purpose of hosting a Feodo C&C server. Hence you should expect no legit traffic to those IP addresses. The site highly recommends you to block/drop any traffic towards any Feodo C&C using the Feodo BadIP Blocklist. Please consider that this blocklist only contains IP addresses used by version B of the Feodo Trojan. C&C communication channels used by version A, version C and version D are not covered by this blocklist.
ipv4 hash:ip
4 unique IPs
updated every 30 mins from this link
firehol_abusers_1d
An ipset made from blocklists that track abusers in the last 24 hours. (includes: botscout_1d cleantalk_new_1d cleantalk_updated_1d php_commenters_1d php_dictionary_1d php_harvesters_1d php_spammers_1d stopforumspam_1d)
ipv4 hash:net
6025 subnets, 6117 unique IPs
updated every 1 min
firehol_abusers_30d
An ipset made from blocklists that track abusers in the last 30 days. (includes: cleantalk_new_30d cleantalk_updated_30d php_commenters_30d php_dictionary_30d php_harvesters_30d php_spammers_30d stopforumspam sblam)
ipv4 hash:net
161597 subnets, 171772 unique IPs
updated every 1 min
firehol_anonymous
An ipset that includes all the anonymizing IPs of the world. (includes: anonymous dm_tor firehol_proxies tor_exits)
ipv4 hash:net
1970605 subnets, 2402615 unique IPs
updated every 1 min
firehol_level1
A firewall blacklist composed from IP lists, providing maximum protection with minimum false positives. Suitable for basic protection on all internet facing servers, routers and firewalls. (includes: dshield feodo fullbogons spamhaus_drop spamhaus_edrop)
ipv4 hash:net
4574 subnets, 611801153 unique IPs
updated every 1 min
firehol_level2
An ipset made from blocklists that track attacks, during about the last 48 hours. (includes: blocklist_de dshield_1d greensnow)
ipv4 hash:net
24902 subnets, 41745 unique IPs
updated every 1 min
firehol_level3
An ipset made from blocklists that track attacks, spyware, viruses. It includes IPs than have been reported or detected in the last 30 days. (includes: bruteforceblocker ciarmy dshield_30d myip vxvault)
ipv4 hash:net
12980 subnets, 30096 unique IPs
updated every 1 min
firehol_level4
An ipset made from blocklists that track attacks, but may include a large number of false positives. (includes: blocklist_net_ua botscout_30d cybercrime iblocklist_hijacked iblocklist_spyware iblocklist_webexploit)
ipv4 hash:net
84036 subnets, 9182461 unique IPs
updated every 1 min
firehol_proxies
An ipset made from all sources that track open proxies. It includes IPs reported or detected in the last 30 days. (includes: iblocklist_proxies ip2proxy_px1lite socks_proxy_30d sslproxies_30d)
ipv4 hash:net
1964780 subnets, 2389415 unique IPs
updated every 1 min
firehol_webclient
An IP blacklist made from blocklists that track IPs that a web client should never talk to. This list is to be used on top of firehol_level1. (includes: cybercrime)
ipv4 hash:net
216 subnets, 216 unique IPs
updated every 1 min
firehol_webserver
A web server IP blacklist made from blocklists that track IPs that should never be used by your web users. (This list includes IPs that are servers hosting malware, bots, etc or users having a long criminal history. This list is to be used on top of firehol_level1, firehol_level2, firehol_level3 and possibly firehol_proxies or firehol_anonymous). (includes: myip stopforumspam_toxic)
ipv4 hash:net
892 subnets, 123874 unique IPs
updated every 1 min
fullbogons
Team-Cymru.org IP space that has been allocated to an RIR, but not assigned by that RIR to an actual ISP or other end-user
ipv4 hash:net
2909 subnets, 596503104 unique IPs
updated every 1 day
geolite2_asn
MaxMind GeoLite2 ASN
ipv4 hash:net
disabled
updated every 7 days from this link
geolite2_country
MaxMind GeoLite2 databases are free IP geolocation databases comparable to, but less accurate than, MaxMind’s GeoIP2 databases. They include IPs per country, IPs per continent, IPs used by anonymous services (VPNs, Proxies, etc) and Satellite Providers.
ipv4 hash:net
All the world
updated every 7 days from this link
gofferje_sip
Stefan Gofferje A personal blacklist of networks and IPs of SIP attackers. To end up here, the IP or network must have been the origin of considerable and repeated attacks on my PBX and additionally, the ISP didn't react to any complaint. Note from the author: I don't give any guarantees of accuracy, completeness or even usability! USE AT YOUR OWN RISK! Also note that I block complete countries, namely China, Korea and Palestine with blocklists from ipdeny.com, so some attackers will never even get the chance to get noticed by me to be put on this blacklist. I also don't accept any liabilities related to this blocklist. If you're an ISP and don't like your IPs being listed here, too bad! You should have done something about your customers' behavior and reacted to my complaints. This blocklist is nothing but an expression of my personal opinion and exercising my right of free speech.
ipv4 hash:net
disabled
updated every 6 hours from this link
gpf_comics
The GPF DNS Block List is a list of IP addresses on the Internet that have attacked the GPF Comics family of Web sites. IPs on this block list have been banned from accessing all of our servers because they were caught in the act of spamming, attempting to exploit our scripts, scanning for vulnerabilities, or consuming resources to the detriment of our human visitors.
ipv4 hash:ip
2536 unique IPs
updated every 1 day from this link
graphiclineweb
GraphiclineWeb The IP’s, Hosts and Domains listed in this table are banned universally from accessing websites controlled by the maintainer. Some form of bad activity has been seen from the addresses listed. Bad activity includes: unwanted spiders, rule breakers, comment spammers, trackback spammers, spambots, hacker bots, registration bots and other scripting attackers, harvesters, nuisance spiders, spy bots and organizations spying on websites for commercial reasons.
ipv4 hash:net
2579 subnets, 330527 unique IPs
updated every 1 day from this link
greensnow
GreenSnow is a team harvesting a large number of IPs from different computers located around the world. GreenSnow is comparable with SpamHaus.org for attacks of any kind except for spam. Their list is updated automatically and you can withdraw at any time your IP address if it has been listed. Attacks / bruteforce that are monitored are: Scan Port, FTP, POP3, mod_security, IMAP, SMTP, SSH, cPanel, etc.
ipv4 hash:ip
5485 unique IPs
updated every 30 mins from this link
iblocklist_abuse_palevo
palevotracker.abuse.ch IP blocklist.
ipv4 hash:net
12 subnets, 12 unique IPs
updated every 12 hours from this link
iblocklist_abuse_spyeye
spyeyetracker.abuse.ch IP blocklist.
ipv4 hash:net
83 subnets, 84 unique IPs
updated every 12 hours from this link
iblocklist_abuse_zeus
zeustracker.abuse.ch IP blocklist that contains IP addresses which are currently beeing tracked on the abuse.ch ZeuS Tracker.
ipv4 hash:net
209 subnets, 212 unique IPs
updated every 12 hours from this link
iblocklist_ads
Advertising trackers and a short list of bad/intrusive porn sites.
ipv4 hash:net
3392 subnets, 888719 unique IPs
updated every 12 hours
iblocklist_bogons
Unallocated address space.
ipv4 hash:net
2692 subnets, 645673639 unique IPs
updated every 12 hours
iblocklist_ciarmy_malicious
ciarmy.com IP blocklist. Based on information from a network of Sentinel devices deployed around the world, they compile a list of known bad IP addresses. Sentinel devices are uniquely positioned to pick up traffic from bad guys without requiring any type of signature-based or rate-based identification. If an IP is identified in this way by a significant number of Sentinels, the IP is malicious and should be blocked.
ipv4 hash:net
12539 subnets, 15000 unique IPs
updated every 12 hours from this link
iblocklist_cidr_report_bogons
cidr-report.org IP list of Unallocated address space.
ipv4 hash:net
18 subnets, 588514808 unique IPs
updated every 12 hours from this link
iblocklist_cruzit_web_attacks
CruzIT IP list with individual IP addresses of compromised machines scanning for vulnerabilities and DDOS attacks.
ipv4 hash:net
14096 subnets, 14397 unique IPs
updated every 12 hours from this link
iblocklist_dshield
known Hackers and such people.
ipv4 hash:net
16 subnets, 2566 unique IPs
updated every 12 hours
iblocklist_edu
IPs used by Educational Institutions.
ipv4 hash:net
43893 subnets, 227913408 unique IPs
updated every 12 hours
iblocklist_exclusions
Exclusions.
ipv4 hash:net
313 subnets, 7488 unique IPs
updated every 12 hours
iblocklist_fornonlancomputers
IP blocklist for non-LAN computers.
ipv4 hash:net
4 subnets, 302055424 unique IPs
updated every 12 hours
iblocklist_forumspam
Forum spam.
ipv4 hash:net
455 subnets, 479 unique IPs
updated every 12 hours
iblocklist_hijacked
Hijacked IP-Blocks. Contains hijacked IP-Blocks and known IP-Blocks that are used to deliver Spam. This list is a combination of lists with hijacked IP-Blocks. Hijacked IP space are IP blocks that are being used without permission by organizations that have no relation to original organization (or its legal successor) that received the IP block. In essence it's stealing of somebody else's IP resources.
ipv4 hash:net
512 subnets, 8736512 unique IPs
updated every 12 hours
iblocklist_iana_multicast
IANA Multicast IPs.
ipv4 hash:net
1 subnets, 268435456 unique IPs
updated every 12 hours
iblocklist_iana_private
IANA Private IPs.
ipv4 hash:net
58 subnets, 51643646 unique IPs
updated every 12 hours
iblocklist_iana_reserved
IANA Reserved IPs.
ipv4 hash:net
1 subnets, 536870912 unique IPs
updated every 12 hours
iblocklist_isp_aol
AOL IPs.
ipv4 hash:net
16 subnets, 6627584 unique IPs
updated every 1 day from this link
iblocklist_isp_att
AT&T IPs.
ipv4 hash:net
35 subnets, 55845128 unique IPs
updated every 1 day from this link
iblocklist_isp_cablevision
Cablevision IPs.
ipv4 hash:net
11 subnets, 1787136 unique IPs
updated every 1 day from this link
iblocklist_isp_charter
Charter IPs.
ipv4 hash:net
21 subnets, 6138112 unique IPs
updated every 1 day from this link
iblocklist_isp_comcast
Comcast IPs.
ipv4 hash:net
33 subnets, 45121536 unique IPs
updated every 1 day from this link
iblocklist_isp_embarq
Embarq IPs.
ipv4 hash:net
14 subnets, 2703360 unique IPs
updated every 1 day from this link
iblocklist_isp_qwest
Qwest IPs.
ipv4 hash:net
73 subnets, 15777552 unique IPs
updated every 1 day from this link
iblocklist_isp_sprint
Sprint IPs.
ipv4 hash:net
73 subnets, 6310570 unique IPs
updated every 1 day from this link
iblocklist_isp_suddenlink
Suddenlink IPs.
ipv4 hash:net
3 subnets, 458752 unique IPs
updated every 1 day from this link
iblocklist_isp_twc
Time Warner Cable IPs.
ipv4 hash:net
56 subnets, 15015936 unique IPs
updated every 1 day from this link
iblocklist_isp_verizon
Verizon IPs.
ipv4 hash:net
22 subnets, 18087936 unique IPs
updated every 1 day from this link
iblocklist_level1
Level 1 (for use in p2p): Companies or organizations who are clearly involved with trying to stop filesharing (e.g. Baytsp, MediaDefender, Mediasentry). Companies which anti-p2p activity has been seen from. Companies that produce or have a strong financial interest in copyrighted material (e.g. music, movie, software industries a.o.). Government ranges or companies that have a strong financial interest in doing work for governments. Legal industry ranges. IPs or ranges of ISPs from which anti-p2p activity has been observed. Basically this list will block all kinds of internet connections that most people would rather not have during their internet travels.
ipv4 hash:net
235633 subnets, 725210077 unique IPs
updated every 12 hours
iblocklist_level2
Level 2 (for use in p2p). General corporate ranges. Ranges used by labs or researchers. Proxies.
ipv4 hash:net
78366 subnets, 337851677 unique IPs
updated every 12 hours
iblocklist_level3
Level 3 (for use in p2p). Many portal-type websites. ISP ranges that may be dodgy for some reason. Ranges that belong to an individual, but which have not been determined to be used by a particular company. Ranges for things that are unusual in some way. The L3 list is aka the paranoid list.
ipv4 hash:net
18867 subnets, 137054866 unique IPs
updated every 12 hours
iblocklist_malc0de
malc0de.com IP blocklist. Addresses that have been identified distributing malware during the past 30 days.
ipv4 hash:net
21 subnets, 21 unique IPs
updated every 12 hours from this link
iblocklist_onion_router
The Onion Router IP addresses.
ipv4 hash:net
853 subnets, 1196 unique IPs
updated every 12 hours from this link
iblocklist_org_activision
Activision IPs.
ipv4 hash:net
49 subnets, 4902 unique IPs
updated every 1 day from this link
iblocklist_org_apple
Apple IPs.
ipv4 hash:net
1 subnets, 16777216 unique IPs
updated every 1 day from this link
iblocklist_org_blizzard
Blizzard IPs.
ipv4 hash:net
8 subnets, 16795139 unique IPs
updated every 1 day from this link
iblocklist_org_crowd_control
Crowd Control Productions IPs.
ipv4 hash:net
2 subnets, 768 unique IPs
updated every 1 day from this link
iblocklist_org_electronic_arts
Electronic Arts IPs.
ipv4 hash:net
42 subnets, 69720 unique IPs
updated every 1 day from this link
iblocklist_org_joost
Joost IPs.
ipv4 hash:net
4 subnets, 16779456 unique IPs
updated every 1 day from this link
iblocklist_org_linden_lab
Linden Lab IPs.
ipv4 hash:net
11 subnets, 23600 unique IPs
updated every 1 day from this link
iblocklist_org_logmein
LogMeIn IPs.
ipv4 hash:net
13 subnets, 16781568 unique IPs
updated every 1 day from this link
iblocklist_org_microsoft
Microsoft IP ranges.
ipv4 hash:net
901 subnets, 1848599 unique IPs
updated every 12 hours
iblocklist_org_ncsoft
NCsoft IPs.
ipv4 hash:net
5 subnets, 12560 unique IPs
updated every 1 day from this link
iblocklist_org_nintendo
Nintendo IPs.
ipv4 hash:net
45 subnets, 3927 unique IPs
updated every 1 day from this link
iblocklist_org_pandora
Pandora IPs.
ipv4 hash:net
1 subnets, 2048 unique IPs
updated every 1 day from this link
iblocklist_org_pirate_bay
The Pirate Bay IPs.
ipv4 hash:net
5 subnets, 323 unique IPs
updated every 1 day from this link
iblocklist_org_punkbuster
Punkbuster IPs.
ipv4 hash:net
1 subnets, 1 unique IPs
updated every 1 day from this link
iblocklist_org_riot_games
Riot Games IPs.
ipv4 hash:net
6 subnets, 1792 unique IPs
updated every 1 day from this link
iblocklist_org_sony_online
Sony Online Entertainment IPs.
ipv4 hash:net
7 subnets, 24616 unique IPs
updated every 1 day from this link
iblocklist_org_square_enix
Square Enix IPs.
ipv4 hash:net
2 subnets, 4112 unique IPs
updated every 1 day from this link
iblocklist_org_steam
Steam IPs.
ipv4 hash:net
53 subnets, 596448 unique IPs
updated every 1 day from this link
iblocklist_org_ubisoft
Ubisoft IPs.
ipv4 hash:net
10 subnets, 5308 unique IPs
updated every 1 day from this link
iblocklist_org_xfire
XFire IPs.
ipv4 hash:net
3 subnets, 3328 unique IPs
updated every 1 day from this link
iblocklist_pedophiles
IP ranges of people who we have found to be sharing child pornography in the p2p community.
ipv4 hash:net
29188 subnets, 847889 unique IPs
updated every 12 hours from this link
iblocklist_proxies
Open Proxies IPs list (without TOR)
ipv4 hash:ip
672 unique IPs
updated every 12 hours
iblocklist_rangetest
Suspicious IPs that are under investigation.
ipv4 hash:net
576 subnets, 4280758 unique IPs
updated every 12 hours
iblocklist_spamhaus_drop
Spamhaus.org DROP (Don't Route Or Peer) list.
ipv4 hash:net
900 subnets, 17338368 unique IPs
updated every 12 hours from this link
iblocklist_spider
IP list intended to be used by webmasters to block hostile spiders from their web sites.
ipv4 hash:net
773 subnets, 846788 unique IPs
updated every 12 hours
iblocklist_spyware
Known malicious SPYWARE and ADWARE IP Address ranges. It is compiled from various sources, including other available spyware blacklists, HOSTS files, from research found at many of the top anti-spyware forums, logs of spyware victims, etc.
ipv4 hash:net
3355 subnets, 339271 unique IPs
updated every 12 hours
iblocklist_webexploit
Web server hack and exploit attempts. IP addresses related to current web server hack and exploit attempts that have been logged or can be found in and cross referenced with other related IP databases. Malicious and other non search engine bots will also be listed here, along with anything found that can have a negative impact on a website or webserver such as proxies being used for negative SEO hijacks, unauthorised site mirroring, harvesting, scraping, snooping and data mining / spy bot / security & copyright enforcement companies that target and continuosly scan webservers.
ipv4 hash:ip
15382 unique IPs
updated every 12 hours
iblocklist_yoyo_adservers
pgl.yoyo.org ad servers
ipv4 hash:net
7532 subnets, 8909 unique IPs
updated every 12 hours from this link
ip2location_country
IP2Location.com geolocation database
ipv4 hash:net
All the world
updated every 1 day from this link
ip2location_country_eh
Western Sahara (EH) -- IP2Location.com
ipv4 hash:net
1 subnets, 256 unique IPs
updated every 1 day from this link
ip2proxy_px1lite
IP2Location.com IP2Proxy LITE IP-COUNTRY Database contains IP addresses which are used as public proxies. The LITE edition is a free version of database that is limited to public proxies IP address.
ipv4 hash:net
1963209 subnets, 2387794 unique IPs
updated every 1 day
ipdeny_country
IPDeny.com geolocation database
ipv4 hash:net
All the world
updated every 1 day from this link
myip
myip.ms IPs identified as web bots in the last 10 days, using several sites that require human action
ipv4 hash:ip
889 unique IPs
updated every 1 day from this link
php_bad
projecthoneypot.org bad web hosts (this list is composed using an RSS feed)
ipv4 hash:ip
disabled
updated every 1 hour from this link
php_commenters
projecthoneypot.org comment spammers (this list is composed using an RSS feed)
ipv4 hash:ip
47 unique IPs
updated every 1 hour from this link
php_commenters_1d
projecthoneypot.org comment spammers (this list is composed using an RSS feed)
ipv4 hash:ip
96 unique IPs
updated every 1 hour from this link
php_commenters_30d
projecthoneypot.org comment spammers (this list is composed using an RSS feed)
ipv4 hash:ip
1150 unique IPs
updated every 1 hour from this link
php_commenters_7d
projecthoneypot.org comment spammers (this list is composed using an RSS feed)
ipv4 hash:ip
309 unique IPs
updated every 1 hour from this link
php_dictionary
projecthoneypot.org directory attackers (this list is composed using an RSS feed)
ipv4 hash:ip
49 unique IPs
updated every 1 hour from this link
php_dictionary_1d
projecthoneypot.org directory attackers (this list is composed using an RSS feed)
ipv4 hash:ip
97 unique IPs
updated every 1 hour from this link
php_dictionary_30d
projecthoneypot.org directory attackers (this list is composed using an RSS feed)
ipv4 hash:ip
1013 unique IPs
updated every 1 hour from this link
php_dictionary_7d
projecthoneypot.org directory attackers (this list is composed using an RSS feed)
ipv4 hash:ip
326 unique IPs
updated every 1 hour from this link
php_harvesters
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)
ipv4 hash:ip
50 unique IPs
updated every 1 hour from this link
php_harvesters_1d
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)
ipv4 hash:ip
62 unique IPs
updated every 1 hour from this link
php_harvesters_30d
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)
ipv4 hash:ip
246 unique IPs
updated every 1 hour from this link
php_harvesters_7d
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed)
ipv4 hash:ip
104 unique IPs
updated every 1 hour from this link
php_spammers
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)
ipv4 hash:ip
46 unique IPs
updated every 1 hour from this link
php_spammers_1d
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)
ipv4 hash:ip
92 unique IPs
updated every 1 hour from this link
php_spammers_30d
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)
ipv4 hash:ip
1150 unique IPs
updated every 1 hour from this link
php_spammers_7d
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed)
ipv4 hash:ip
353 unique IPs
updated every 1 hour from this link
proxyrss
proxyrss.com open proxies syndicated from multiple sources.
ipv4 hash:ip
disabled
updated every 4 hours from this link
ri_connect_proxies
rosinstrument.com open CONNECT proxies (this list is composed using an RSS feed)
ipv4 hash:ip
disabled
updated every 1 hour from this link
ri_web_proxies
rosinstrument.com open HTTP proxies (this list is composed using an RSS feed)
ipv4 hash:ip
disabled
updated every 1 hour from this link
sblam
sblam.com IPs used by web form spammers, during the last month
ipv4 hash:ip
1363 unique IPs
updated every 1 day from this link
socks_proxy
socks-proxy.net open SOCKS proxies
ipv4 hash:ip
302 unique IPs
updated every 10 mins from this link
socks_proxy_1d
socks-proxy.net open SOCKS proxies
ipv4 hash:ip
1445 unique IPs
updated every 10 mins from this link
socks_proxy_30d
socks-proxy.net open SOCKS proxies
ipv4 hash:ip
2664 unique IPs
updated every 10 mins from this link
socks_proxy_7d
socks-proxy.net open SOCKS proxies
ipv4 hash:ip
1968 unique IPs
updated every 10 mins from this link
sorbs_anonymizers
Sorbs.net List of open HTTP and SOCKS proxies.
ipv4 hash:net
disabled
sorbs_block
Sorbs.net List of hosts demanding that they never be tested by SORBS.
ipv4 hash:net
disabled
sorbs_escalations
Sorbs.net Netblocks of spam supporting service providers, including those who provide websites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list.
ipv4 hash:net
disabled
sorbs_new_spam
Sorbs.net List of hosts that have been noted as sending spam/UCE/UBE within the last 48 hours
ipv4 hash:net
disabled
sorbs_noserver
Sorbs.net IP addresses and netblocks of where system administrators and ISPs owning the network have indicated that servers should not be present.
ipv4 hash:net
disabled
sorbs_recent_spam
Sorbs.net List of hosts that have been noted as sending spam/UCE/UBE within the last 28 days (includes sorbs_new_spam)
ipv4 hash:net
disabled
sorbs_smtp
Sorbs.net List of SMTP Open Relays.
ipv4 hash:net
disabled
sorbs_web
Sorbs.net List of IPs which have spammer abusable vulnerabilities (e.g. FormMail scripts)
ipv4 hash:net
disabled
sorbs_zombie
Sorbs.net List of networks hijacked from their original owners, some of which have already used for spamming.
ipv4 hash:net
disabled
spamhaus_drop
Spamhaus.org DROP list (according to their site this list should be dropped at tier-1 ISPs globally)
ipv4 hash:net
1456 subnets, 15034112 unique IPs
updated every 12 hours from this link
spamhaus_edrop
Spamhaus.org EDROP (extended matches that should be used with DROP)
ipv4 hash:net
336 subnets, 731392 unique IPs
updated every 12 hours from this link
sslproxies
SSLProxies.org open SSL proxies
ipv4 hash:ip
102 unique IPs
updated every 10 mins from this link
sslproxies_1d
SSLProxies.org open SSL proxies
ipv4 hash:ip
193 unique IPs
updated every 10 mins from this link
sslproxies_30d
SSLProxies.org open SSL proxies
ipv4 hash:ip
1764 unique IPs
updated every 10 mins from this link
sslproxies_7d
SSLProxies.org open SSL proxies
ipv4 hash:ip
592 unique IPs
updated every 10 mins from this link
stopforumspam
StopForumSpam.com Banned IPs used by forum spammers
ipv4 hash:ip
129791 unique IPs
updated every 1 day from this link
stopforumspam_180d
StopForumSpam.com IPs used by forum spammers (last 180 days)
ipv4 hash:ip
272168 unique IPs
updated every 1 day from this link
stopforumspam_1d
StopForumSpam.com IPs used by forum spammers in the last 24 hours
ipv4 hash:ip
3498 unique IPs
updated every 1 hour from this link
stopforumspam_30d
StopForumSpam.com IPs used by forum spammers (last 30 days)
ipv4 hash:ip
51062 unique IPs
updated every 1 day from this link
stopforumspam_365d
StopForumSpam.com IPs used by forum spammers (last 365 days)
ipv4 hash:ip
542819 unique IPs
updated every 1 day from this link
stopforumspam_7d
StopForumSpam.com IPs used by forum spammers (last 7 days)
ipv4 hash:ip
17248 unique IPs
updated every 1 day from this link
stopforumspam_90d
StopForumSpam.com IPs used by forum spammers (last 90 days)
ipv4 hash:ip
130118 unique IPs
updated every 1 day from this link
stopforumspam_toxic
StopForumSpam.com Networks that have large amounts of spambots and are flagged as toxic. Toxic IP ranges are infrequently changed.
ipv4 hash:net
56 subnets, 122988 unique IPs
updated every 1 day from this link
tor_exits
TorProject.org list of all current TOR exit points (TorDNSEL)
ipv4 hash:ip
1195 unique IPs
updated every 5 mins from this link
tor_exits_1d
TorProject.org list of all current TOR exit points (TorDNSEL)
ipv4 hash:ip
1203 unique IPs
updated every 5 mins from this link
tor_exits_30d
TorProject.org list of all current TOR exit points (TorDNSEL)
ipv4 hash:ip
1489 unique IPs
updated every 5 mins from this link
tor_exits_7d
TorProject.org list of all current TOR exit points (TorDNSEL)
ipv4 hash:ip
1275 unique IPs
updated every 5 mins from this link
urandomusto_dns
IP Feed about dns, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_ftp
IP Feed about ftp, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_http
IP Feed about http, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_mailer
IP Feed about mailer, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_malware
IP Feed about malware, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_ntp
IP Feed about ntp, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_rdp
IP Feed about rdp, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_smb
IP Feed about smb, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_spam
IP Feed about spam, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_ssh
IP Feed about ssh, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_telnet
IP Feed about telnet, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_unspecified
IP Feed about unspecified, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
urandomusto_vnc
IP Feed about vnc, crawled from several sources, including several twitter accounts.
ipv4 hash:ip
disabled
updated every 1 hour from this link
vxvault
VxVault The latest 100 additions of VxVault.
ipv4 hash:ip
66 unique IPs
updated every 12 hours from this link
yoyo_adservers
Yoyo.org IPs of ad servers
ipv4 hash:ip
8909 unique IPs
updated every 12 hours from this link
zeus
Abuse.ch Zeus tracker standard, contains the same data as the ZeuS IP blocklist (zeus_badips) but with the slight difference that it doesn't exclude hijacked websites (level 2) and free web hosting providers (level 3). This means that this blocklist contains all IPv4 addresses associated with ZeuS C&Cs which are currently being tracked by ZeuS Tracker. Hence this blocklist will likely cause some false positives.
ipv4 hash:ip
disabled
updated every 30 mins from this link
zeus_badips
Abuse.ch Zeus tracker badips includes IPv4 addresses that are used by the ZeuS trojan. It is the recommened blocklist if you want to block only ZeuS IPs. It excludes IP addresses that ZeuS Tracker believes to be hijacked (level 2) or belong to a free web hosting provider (level 3). Hence the false postive rate should be much lower compared to the standard ZeuS IP blocklist.
ipv4 hash:ip
disabled
updated every 30 mins from this link