Skip to content

Commit 232dd87

Browse files
Update block-lists.md
1 parent ce0d097 commit 232dd87

File tree

1 file changed

+22
-8
lines changed

1 file changed

+22
-8
lines changed

wiki/block-lists.md

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Supported list stypes
2323

2424
[Troubleshooting](#troubleshooting)
2525

26-
[Video tutorial](#resources)
26+
[Video tutorial](#video-tutorials)
2727

2828
[Resources](#resources)
2929

@@ -98,6 +98,7 @@ Remember that you may need to add the domain without the subdomains (`domain.com
9898
127.0.0.1 www.domain.com
9999
```
100100

101+
---
101102

102103
#### Lists of domains with regular expressions
103104
- one regular expression per line:
@@ -117,6 +118,8 @@ adtrack(er|ing)?[0-9]*[_.-]
117118

118119
Here's a playground you can use to test regular expressions: https://go.dev/play/p/JzQCeNH4OH1
119120

121+
---
122+
120123
#### Lists of IPs
121124
- One per line:
122125
IPs
@@ -126,6 +129,8 @@ IPs
126129
9.8.7.6
127130
```
128131

132+
---
133+
129134
#### Lists of NETs
130135
You can use these lists for exmple for GeoIP blocking: https://www.ipdeny.com/ipblocks/
131136

@@ -136,6 +141,8 @@ Nets:
136141
1.2.3.0/16
137142
```
138143

144+
---
145+
139146
#### Notes
140147
- Lines started with # are ignored. Write comments always on a new line, not after a domain.
141148
- The domains `local`, `localhost`, `localhost.localdomain` and `broadcasthost` are ignored.
@@ -186,13 +193,6 @@ See this issue [#646](https://github.com/evilsocket/opensnitch/issues/646) for m
186193
187194
### Resources
188195
189-
Video tutorials:
190-
191-
https://user-images.githubusercontent.com/2742953/192171195-ba14e4cc-420a-4b85-a6c7-7f023a6a63e3.webm
192-
193-
https://user-images.githubusercontent.com/2742953/192171230-330adbd0-4ef8-48f8-a304-96812fd31c41.webm
194-
195-
---
196196
Lists of ads, trackers, malware domains, etc that you can use:
197197
198198
https://github.com/badmojr/1Hosts
@@ -211,6 +211,20 @@ https://pgl.yoyo.org/adservers/
211211
212212
https://iplists.firehol.org/
213213
214+
List of active malware domains:
215+
216+
https://urlhaus.abuse.ch/api/#hostfile
217+
218+
https://threatfox.abuse.ch/export/#hostfile
219+
214220
Collections of Threat Intel feeds (by hash, IPs, domains, and more):
215221
216222
https://github.com/Bert-JanP/Open-Source-Threat-Intel-Feeds
223+
224+
---
225+
226+
### Video tutorials:
227+
228+
https://user-images.githubusercontent.com/2742953/192171195-ba14e4cc-420a-4b85-a6c7-7f023a6a63e3.webm
229+
230+
https://user-images.githubusercontent.com/2742953/192171230-330adbd0-4ef8-48f8-a304-96812fd31c41.webm

0 commit comments

Comments
 (0)