Skip to content

Firewall / Host blocklists / ipsets which include privacy, brute-force / port scanners, geographical continent & country databases. Support for BT Transmission. Updated multiple times a day.

License

Notifications You must be signed in to change notification settings

Aetherinox/blocklists

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🕙 Last Sync: 03/27/2025 12:14 UTC






About

This repository contains a collection of dynamically updated blocklists which can be utilized to filter out traffic from communicating with your server.


These blocklists can be used with:

  • ConfigServer Firewall
  • FireHOL
  • Crowdsec
  • Transmission (BitTorrent Client)
  • OPNsense
  • Many others

Blocklist and statistics are updated daily, and some are updated multiple times a day depending on the category of blocklist. Others may only update once per day depending on how often they refresh.


★ Severity Rating ★

The Severity Rating is a column shown below for each blocklist. This score is calculated depending on how many "abusive" IP addresses exist within that ipset file.


As an example, the Cloudflare CDN has a score of ★★★⚝⚝ 3 or higher, due to the fact that many people are reporting that servers hosted by Cloudflare seem to be involved in a lot of abusive activity such as port scanning and SSH bruteforce attacks. The more reports that the Ips in the Cloudflare file have, the higher the severity rating will rise. This score is based on the mean (average) report history of all IPs in the list.


This rating is calculated once a day.




Main Lists

These are the primary lists that most people will be interested in. They contain a large list of IP addresses which have been reported recently for abusive behavior. These statistics are gathered from numerous websites such as AbuseIPDB and IPThreat. IPs on this list have a 100% confidence level, which means you should get no false-positives from any of the IPs in these lists. IP addresses in these lists have been flagged for engaging in the following:

  • SSH Bruteforcing
  • Port Scanning
  • DDoS Attacks
  • IoT Targeting
  • Phishing

For the majority of people, using the blocklists master.ipset and highrisk.ipset will be all you need. It is a massive collection, all with a 100% confidence level, which means you should get none or minimal false positives.


Set Name Description Severity View
master.ipset Abusive IP addresses which have been reported for port scanning and SSH brute-forcing. HIGHLY recommended.
Includes AbuseIPDB, IPThreat, CinsScore, GreensNow
★★★★★ view
highrisk.ipset IPs with highest risk to your network and have a possibility that the activity which comes from them are going to be fraudulent. ★★★★★ view



Privacy Lists

These blocklists give you more control over what 3rd party services can access your server, and allows you to remove bad actors or services hosting such services.


Set Description Severity View
privacy_general.ipset Servers which scan ports for data collection and research purposes. List includes Censys, Shodan, Project25499, InternetArchive, Cyber Resilience, Internet Measurement, probe.onyphe.net, Security Trails ★★★★⚝ view
privacy_ahrefs.ipset Ahrefs SEO and services ★★⚝⚝⚝ view
privacy_amazon_aws.ipset Amazon AWS ★★⚝⚝⚝ view
privacy_amazon_ec2.ipset Amazon EC2 ★★⚝⚝⚝ view
privacy_applebot.ipset Apple Bots ★★★⚝⚝ view
privacy_bing.ipset Microsoft Bind and Bing Crawlers / Bots ★★⚝⚝⚝ view
privacy_bunnycdn.ipset Bunny CDN ★★⚝⚝⚝ view
privacy_cloudflarecdn.ipset Cloudflare CDN ★★⚝⚝⚝ view
privacy_cloudfront.ipset Cloudfront DNS ★⚝⚝⚝⚝ view
privacy_duckduckgo.ipset DuckDuckGo Web Crawlers / Bots ★★⚝⚝⚝ view
privacy_facebook.ipset Facebook Bots & Trackers ★★★⚝⚝ view
privacy_fastly.ipset Fastly CDN ★⚝⚝⚝⚝ view
privacy_google.ipset Google Crawlers ★★⚝⚝⚝ view
privacy_pingdom.ipset Pingdom Monitoring Service ★★⚝⚝⚝ view
privacy_rssapi.ipset RSS API Reader ★★⚝⚝⚝ view
privacy_stripe_api.ipset Stripe Payment Gateway API ★★⚝⚝⚝ view
privacy_stripe_armada_gator.ipset Stripe Armada Gator ★★⚝⚝⚝ view
privacy_stripe_webhooks.ipset Stripe Webhook Service ★★⚝⚝⚝ view
privacy_telegram.ipset Telegram Trackers and Crawlers ★★★⚝⚝ view
privacy_uptimerobot.ipset Uptime Robot Monitoring Service ★⚝⚝⚝⚝ view
privacy_webpagetest.ipset Webpage Test Services ★★⚝⚝⚝ view



Spam Lists

These blocklists allow you to remove the possibility of spam sources accessing your server.


Set Description Severity View
spam_forums.ipset List of known forum / blog spammers and bots ★★★⚝⚝ view
spam_spamhaus.ipset Bad actor IP addresses registered with Spamhaus ★★★★⚝ view



Geographical (Continents & Countries)

These blocklists allow you to determine what geographical locations can access your server. These can be used as either a whitelist or a blacklist. Includes both continents and countries.


Set Description Severity View
GeoLite2 Database Lists IPs by continent and country from GeoLite2 database. Contains both IPv4 and IPv6 subnets ★★★★★ view
Ip2Location Database Coming soon ★★★★★ view



Transmission (BitTorrent Client)

This section includes blocklists which you can import into the bittorrent client Transmission.



Set Description Severity View Website
bt-transmission A large blocklist for the BitTorrent client Transmission ★★★★★ view view



Install

This section explains how to use these blocklists within particular software titles.


ConfigServer Firewall Users

This repository contains a set of ipsets which are automatically updated every 6 hours. You may add these sets to your ConfigServer Firewall /etc/csf/csf.blocklists with the following new line:

CSF_MASTER|86400|0|https://raw.githubusercontent.com/Aetherinox/blocklists/main/blocklists/master.ipset
CSF_HIGHRISK|86400|0|https://raw.githubusercontent.com/Aetherinox/blocklists/main/blocklists/highrisk.ipset

The format for the above lines are NAME|INTERVAL|MAX_IPS|URL:

  • NAME: List name with all uppercase alphabetic characters with no spaces and a maximum of 25 characters - this will be used as the iptables chain name
  • INTERVAL: Refresh interval to download the list, must be a minimum of 3600 seconds (an hour).
    • 86400 (one day / 24 hours) should be more than enough
  • MAX_IPS: This is the maximum number of IP addresses to use from the list, a value of 0 means all IPs.
    • If you add an ipset with 50,000 IPs, and you set this value to 20,000; then you will only block the first 20,000.
  • URL: The URL to download the ipset from

Note

If you have not modified the settings of ConfigServer Firewall; the MAX_IPS value is limited by the setting LF_IPSET_MAXELEM which has a maximum value of 65536 IPs; even if you set the value in your lists above to 0, or anything above 65536.

To allow for higher numbers of blocked IPs in an ipset; you must edit your CSF config file located in /etc/csf/csf.conf and set the setting LF_IPSET_MAXELEM to something higher than 65536:

# old value
# LF_IPSET_MAXELEM = "65536"
LF_IPSET_MAXELEM = "4000000"

This setting can also be modified through the ConfigServer Firewall Admin WebUI if you have it installed.


Once you have added the line(s) above; you will need to give ConfigServer Firewall and LFD a restart.

sudo csf -ra

You can confirm that the ipset is installed by running the command:

sudo ipset --list -n

The above command will list all existing ipsets running on your firewall. As you can see in the list below; we have bl_CSF_HIGHRISK, bl_6_CSF_HIGHRISK, bl_CSF_MASTER, and bl_6_CSF_MASTER. Which are the lists we loaded above.

chain_DENY
chain_6_DENY
chain_ALLOW
chain_6_ALLOW
bl_CSF_HIGHRISK
bl_6_CSF_HIGHRISK
bl_CSF_MASTER
bl_6_CSF_MASTER

To view all of the IPs in a specified ipset / list, run:

$ sudo ipset --list bl_CSF_HIGHRISK

Name: bl_CSF_HIGHRISK
Type: hash:net
Revision: 7
Header: family inet hashsize 1024 maxelem 4000000 bucketsize 12 initval 0x5f263e28
Size in memory: 24024
References: 1
Number of entries: 630
Members:
XX.XX.XX.XXX
XX.XX.XX.XXX
[ ... ]

If you modified the ConfigServer Firewall setting LF_IPSET_MAXELEM (explained in the note above), you will see the new max limit value listed next to maxelem.

Header: family inet hashsize 1024 maxelem 4000000 

Note

If you decide to use the blocklist master.ipset, you must ensure you increase the value of the setting LF_IPSET_MAXELEM in the file /etc/csf/csf.conf to at least 400000.

On average, the master.ipset list normally contains 392,000 blocked IP addresses.

About

Firewall / Host blocklists / ipsets which include privacy, brute-force / port scanners, geographical continent & country databases. Support for BT Transmission. Updated multiple times a day.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published