| abuseipdb_1d |
AbuseIPDB aggregated blocklist of IPs with ~100% abuse confidence score, reported in the last 1 day. Aggregated by borestad. |
ipv4 hash:ip |
74666 unique IPs |
updated every 1 day from this link |
| abuseipdb_30d |
AbuseIPDB aggregated blocklist of IPs with ~100% abuse confidence score, reported in the last 30 days. Aggregated by borestad. |
ipv4 hash:ip |
168461 unique IPs |
updated every 1 day from this link |
| bds_atif |
Artillery Threat Intelligence Feed and Banlist Feed |
ipv4 hash:ip |
864 unique IPs |
updated every 1 day from this link |
| bitcoin_nodes |
BitNodes Bitcoin connected nodes, globally. |
ipv4 hash:ip |
7196 unique IPs |
updated every 10 mins from this link |
| bitcoin_nodes_1d |
BitNodes Bitcoin connected nodes, globally. |
ipv4 hash:ip |
7998 unique IPs |
updated every 10 mins from this link |
| bitcoin_nodes_30d |
BitNodes Bitcoin connected nodes, globally. |
ipv4 hash:ip |
15789 unique IPs |
updated every 10 mins from this link |
| bitcoin_nodes_7d |
BitNodes Bitcoin connected nodes, globally. |
ipv4 hash:ip |
9777 unique IPs |
updated every 10 mins from this link |
| blocklist_de |
Blocklist.de IPs that have been detected by fail2ban in the last 48 hours |
ipv4 hash:ip |
21640 unique IPs |
updated every 15 mins from this link |
| blocklist_de_apache |
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks. |
ipv4 hash:ip |
9394 unique IPs |
updated every 15 mins from this link |
| blocklist_de_bots |
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = it has posted a Spam-Comment on a open Forum or Wiki). |
ipv4 hash:ip |
1311 unique IPs |
updated every 15 mins from this link |
| blocklist_de_bruteforce |
Blocklist.de All IPs which attacks Joomla, Wordpress and other Web-Logins with Brute-Force Logins. |
ipv4 hash:ip |
1264 unique IPs |
updated every 15 mins from this link |
| blocklist_de_ftp |
Blocklist.de All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP. |
ipv4 hash:ip |
563 unique IPs |
updated every 15 mins from this link |
| blocklist_de_imap |
Blocklist.de All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3, etc. |
ipv4 hash:ip |
4340 unique IPs |
updated every 15 mins from this link |
| blocklist_de_mail |
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix. |
ipv4 hash:ip |
13579 unique IPs |
updated every 15 mins from this link |
| blocklist_de_sip |
Blocklist.de All IP addresses that tried to login in a SIP, VOIP or Asterisk Server and are included in the IPs list from infiltrated.net |
ipv4 hash:ip |
63 unique IPs |
updated every 15 mins from this link |
| blocklist_de_ssh |
Blocklist.de All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH. |
ipv4 hash:ip |
4716 unique IPs |
updated every 15 mins from this link |
| blocklist_de_strongips |
Blocklist.de All IPs which are older then 2 month and have more then 5.000 attacks. |
ipv4 hash:ip |
303 unique IPs |
updated every 15 mins from this link |
| blocklist_net_ua |
blocklist.net.ua The BlockList project was created to become protection against negative influence of the harmful and potentially dangerous events on the Internet. First of all this service will help internet and hosting providers to protect subscribers sites from being hacked. BlockList will help to stop receiving a large amount of spam from dubious SMTP relays or from attempts of brute force passwords to servers and network equipment. |
ipv4 hash:ip |
86658 unique IPs |
updated every 10 mins from this link |
| bm_tor |
torstatus.blutmagie.de list of all TOR network servers |
ipv4 hash:ip |
disabled |
updated every 30 mins from this link |
| bogons |
Team-Cymru.org private and reserved addresses defined by RFC 1918, RFC 5735, and RFC 6598 and netblocks that have not been allocated to a regional internet registry |
ipv4 hash:net |
13 subnets, 592708608 unique IPs |
updated every 1 day |
| botscout |
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots. |
ipv4 hash:ip |
40 unique IPs |
updated every 30 mins from this link |
| botscout_1d |
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots. |
ipv4 hash:ip |
348 unique IPs |
updated every 30 mins from this link |
| botscout_30d |
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots. |
ipv4 hash:ip |
8378 unique IPs |
updated every 30 mins from this link |
| botscout_7d |
BotScout helps prevent automated web scripts, known as bots, from registering on forums, polluting databases, spreading spam, and abusing forms on web sites. They do this by tracking the names, IPs, and email addresses that bots use and logging them as unique signatures for future reference. They also provide a simple yet powerful API that you can use to test forms when they're submitted on your site. This list is composed of the most recently-caught bots. |
ipv4 hash:ip |
2130 unique IPs |
updated every 30 mins from this link |
| botvrij_dst |
botvrij.eu Indicators of Compromise (IOCS) about malicious destination IPs, gathered via open source information feeds (blog pages and PDF documents) and then consolidated into different datasets. To ensure the quality of the data all entries older than approx. 6 months are removed. |
ipv4 hash:ip |
disabled |
updated every 1 day from this link |
| botvrij_src |
botvrij.eu Indicators of Compromise (IOCS) about malicious source IPs, gathered via open source information feeds (blog pages and PDF documents) and then consolidated into different datasets. To ensure the quality of the data all entries older than approx. 6 months are removed. |
ipv4 hash:ip |
disabled |
updated every 1 day from this link |
| bruteforceblocker |
danger.rulez.sk bruteforceblocker (fail2ban alternative for SSH on OpenBSD). This is an automatically generated list from users reporting failed authentication attempts. An IP seems to be included if 3 or more users report it. Its retention pocily seems 30 days. |
ipv4 hash:ip |
631 unique IPs |
updated every 3 hours from this link |
| c2_tracker |
C2 Tracker tracks Command and Control frameworks (Cobalt Strike, Sliver, Metasploit, Havoc, etc.) using Shodan and Censys data. Updated weekly. |
ipv4 hash:ip |
2351 unique IPs |
updated every 7 days from this link |
| ciarmy |
CIArmy.com IPs with poor Rogue Packet score that have not yet been identified as malicious by the community |
ipv4 hash:ip |
15000 unique IPs |
updated every 3 hours from this link |
| cidr_report_bogons |
Unallocated (Free) Address Space, generated on a daily basis using the IANA registry files, the Regional Internet Registry stats files and the Regional Internet Registry whois data. |
ipv4 hash:net |
18 subnets, 588514808 unique IPs |
updated every 1 day from this link |
| cleantalk |
CleanTalk Today's HTTP Spammers (includes: cleantalk_new cleantalk_updated) |
ipv4 hash:ip |
494 unique IPs |
updated every 1 min |
| cleantalk_1d |
CleanTalk Today's HTTP Spammers (includes: cleantalk_new_1d cleantalk_updated_1d) |
ipv4 hash:ip |
1900 unique IPs |
updated every 1 min |
| cleantalk_30d |
CleanTalk Today's HTTP Spammers (includes: cleantalk_new_30d cleantalk_updated_30d) |
ipv4 hash:ip |
37919 unique IPs |
updated every 1 min |
| cleantalk_7d |
CleanTalk Today's HTTP Spammers (includes: cleantalk_new_7d cleantalk_updated_7d) |
ipv4 hash:ip |
9233 unique IPs |
updated every 1 min |
| cleantalk_new |
CleanTalk Recent HTTP Spammers |
ipv4 hash:ip |
250 unique IPs |
updated every 15 mins from this link |
| cleantalk_new_1d |
CleanTalk Recent HTTP Spammers |
ipv4 hash:ip |
754 unique IPs |
updated every 15 mins from this link |
| cleantalk_new_30d |
CleanTalk Recent HTTP Spammers |
ipv4 hash:ip |
15416 unique IPs |
updated every 15 mins from this link |
| cleantalk_new_7d |
CleanTalk Recent HTTP Spammers |
ipv4 hash:ip |
3989 unique IPs |
updated every 15 mins from this link |
| cleantalk_top20 |
CleanTalk Top 20 HTTP Spammers |
ipv4 hash:ip |
20 unique IPs |
updated every 1 day from this link |
| cleantalk_updated |
CleanTalk Recurring HTTP Spammers |
ipv4 hash:ip |
250 unique IPs |
updated every 15 mins from this link |
| cleantalk_updated_1d |
CleanTalk Recurring HTTP Spammers |
ipv4 hash:ip |
1278 unique IPs |
updated every 15 mins from this link |
| cleantalk_updated_30d |
CleanTalk Recurring HTTP Spammers |
ipv4 hash:ip |
28579 unique IPs |
updated every 15 mins from this link |
| cleantalk_updated_7d |
CleanTalk Recurring HTTP Spammers |
ipv4 hash:ip |
6171 unique IPs |
updated every 15 mins from this link |
| cta_cryptowall |
Cyber Threat Alliance CryptoWall is one of the most lucrative and broad-reaching ransomware campaigns affecting Internet users today. Sharing intelligence and analysis resources, the CTA profiled the latest version of CryptoWall, which impacted hundreds of thousands of users, resulting in over US $325 million in damages worldwide. |
ipv4 hash:ip |
1360 unique IPs |
updated every 1 day from this link |
| cybercrime |
CyberCrime A project tracking Command and Control. |
ipv4 hash:ip |
287 unique IPs |
updated every 12 hours from this link |
| cybercure |
CyberCure threat intelligence feed of IPs identified as malicious from real-time infection monitoring sensors. |
ipv4 hash:ip |
89897 unique IPs |
updated every 6 hours from this link |
| darklist_de |
darklist.de ssh fail2ban reporting |
ipv4 hash:net |
6008 subnets, 274857 unique IPs |
updated every 1 day from this link |
| dataplane_dnsrd |
DataPlane.org IP addresses that have been identified as sending recursive DNS queries to a remote host. This report lists addresses that may be cataloging open DNS resolvers or evaluating cache entries. |
ipv4 hash:ip |
5886 unique IPs |
updated every 1 hour |
| dataplane_dnsrdany |
DataPlane.org IP addresses that have been identified as sending recursive DNS IN ANY queries to a remote host. This report lists addresses that may be cataloging open DNS resolvers for the purpose of later using them to facilitate DNS amplification and reflection attacks. |
ipv4 hash:ip |
223 unique IPs |
updated every 1 hour |
| dataplane_dnsversion |
DataPlane.org IP addresses that have been identified as sending DNS CH TXT VERSION.BIND queries to a remote host. This report lists addresses that may be cataloging DNS software. |
ipv4 hash:ip |
4979 unique IPs |
updated every 1 hour |
| dataplane_sipinvitation |
DataPlane.org IP addresses that have been seen initiating a SIP INVITE operation to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP client cataloging or conducting various forms of telephony abuse. |
ipv4 hash:ip |
44 unique IPs |
updated every 1 hour |
| dataplane_sipquery |
DataPlane.org IP addresses that has been seen initiating a SIP OPTIONS query to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP server cataloging or conducting various forms of telephony abuse. |
ipv4 hash:ip |
4474 unique IPs |
updated every 1 hour |
| dataplane_sipregistration |
DataPlane.org IP addresses that have been seen initiating a SIP REGISTER operation to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SIP client cataloging or conducting various forms of telephony abuse. |
ipv4 hash:ip |
231 unique IPs |
updated every 1 hour |
| dataplane_sshclient |
DataPlane.org IP addresses that has been seen initiating an SSH connection to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be SSH server cataloging or conducting authentication attack attempts. |
ipv4 hash:ip |
22651 unique IPs |
updated every 1 hour |
| dataplane_sshpwauth |
DataPlane.org IP addresses that has been seen attempting to remotely login to a host using SSH password authentication. This report lists hosts that are highly suspicious and are likely conducting malicious SSH password authentication attacks. |
ipv4 hash:ip |
13875 unique IPs |
updated every 1 hour |
| dataplane_vncrfb |
DataPlane.org IP addresses that have been seen initiating a VNC remote frame buffer (RFB) session to a remote host. This report lists hosts that are suspicious of more than just port scanning. These hosts may be VNC server cataloging or conducting various forms of remote access abuse. |
ipv4 hash:ip |
1443 unique IPs |
updated every 1 hour |
| dm_tor |
dan.me.uk dynamic list of TOR nodes |
ipv4 hash:ip |
7195 unique IPs |
updated every 30 mins from this link |
| dronebl_anonymizers |
DroneBL.org List of open proxies. It includes IPs which DroneBL categorizes as SOCKS proxies (8), HTTP proxies (9), web page proxies (11), WinGate proxies (14), proxy chains (10). |
ipv4 hash:net |
1283614 subnets, 1387795 unique IPs |
updated every 1 min |
| dronebl_auto_botnets |
DroneBL.org IPs of automatically detected botnets. It includes IPs for which DroneBL responds with 17. |
ipv4 hash:net |
94413 subnets, 99240 unique IPs |
updated every 1 min |
| dronebl_autorooting_worms |
DroneBL.org IPs of autorooting worms. It includes IPs for which DroneBL responds with 16. These are usually SSH bruteforce attacks. |
ipv4 hash:net |
36 subnets, 36 unique IPs |
updated every 1 min |
| dronebl_compromised |
DroneBL.org IPs of compromised routers / gateways. It includes IPs for which DroneBL responds with 15 (BOPM detected). |
ipv4 hash:net |
46269 subnets, 47713 unique IPs |
updated every 1 min |
| dronebl_ddos_drones |
DroneBL.org IPs of DDoS drones. It includes IPs for which DroneBL responds with 7. |
ipv4 hash:net |
7298 subnets, 7454 unique IPs |
updated every 1 min |
| dronebl_dns_mx_on_irc |
DroneBL.org List of IPs of DNS / MX hostname detected on IRC. It includes IPs for which DroneBL responds with 18. |
ipv4 hash:net |
16 subnets, 16 unique IPs |
updated every 1 min |
| dronebl_irc_drones |
DroneBL.org List of IRC spam drones (litmus/sdbot/fyle). It includes IPs for which DroneBL responds with 3. |
ipv4 hash:net |
836281 subnets, 1005872 unique IPs |
updated every 1 min |
| dronebl_unknown |
DroneBL.org List of IPs of uncategorized threats. It includes IPs for which DroneBL responds with 255. |
ipv4 hash:net |
16 subnets, 16 unique IPs |
updated every 1 min |
| dronebl_worms_bots |
DroneBL.org IPs of unknown worms or spambots. It includes IPs for which DroneBL responds with 6 |
ipv4 hash:net |
432908 subnets, 444406 unique IPs |
updated every 1 min |
| dshield |
DShield.org top 20 attacking class C (/24) subnets over the last three days |
ipv4 hash:net |
20 subnets, 5120 unique IPs |
updated every 10 mins from this link |
| dshield_1d |
DShield.org top 20 attacking class C (/24) subnets over the last three days |
ipv4 hash:net |
29 subnets, 7424 unique IPs |
updated every 10 mins from this link |
| dshield_30d |
DShield.org top 20 attacking class C (/24) subnets over the last three days |
ipv4 hash:net |
72 subnets, 19200 unique IPs |
updated every 10 mins from this link |
| dshield_7d |
DShield.org top 20 attacking class C (/24) subnets over the last three days |
ipv4 hash:net |
48 subnets, 12800 unique IPs |
updated every 10 mins from this link |
| et_block |
EmergingThreats.net default blacklist (at the time of writing includes spamhaus DROP, dshield and abuse.ch trackers, which are available separately too - prefer to use the direct ipsets instead of this, they seem to lag a bit in updates) |
ipv4 hash:net |
1489 subnets, 15384325 unique IPs |
updated every 12 hours from this link |
| et_compromised |
EmergingThreats.net compromised hosts |
ipv4 hash:ip |
659 unique IPs |
updated every 12 hours from this link |
| et_dshield |
EmergingThreats.net dshield blocklist |
ipv4 hash:net |
20 subnets, 5120 unique IPs |
updated every 12 hours from this link |
| et_spamhaus |
EmergingThreats.net spamhaus blocklist |
ipv4 hash:net |
1466 subnets, 15379712 unique IPs |
updated every 12 hours from this link |
| et_tor |
EmergingThreats.net TOR list of TOR network IPs |
ipv4 hash:ip |
7270 unique IPs |
updated every 12 hours from this link |
| feodo |
Abuse.ch Feodo tracker trojan includes IPs which are being used by Feodo (also known as Cridex or Bugat) which commits ebanking fraud |
ipv4 hash:ip |
1 unique IPs |
updated every 30 mins from this link |
| feodo_badips |
Abuse.ch Feodo tracker BadIPs The Feodo Tracker Feodo BadIP Blocklist only contains IP addresses (IPv4) used as C&C communication channel by the Feodo Trojan version B. These IP addresses are usually servers rented by cybercriminals directly and used for the exclusive purpose of hosting a Feodo C&C server. Hence you should expect no legit traffic to those IP addresses. The site highly recommends you to block/drop any traffic towards any Feodo C&C using the Feodo BadIP Blocklist. Please consider that this blocklist only contains IP addresses used by version B of the Feodo Trojan. C&C communication channels used by version A, version C and version D are not covered by this blocklist. |
ipv4 hash:ip |
5 unique IPs |
updated every 30 mins from this link |
| firehol_abusers_1d |
An ipset made from blocklists that track abusers in the last 24 hours. (includes: botscout_1d cleantalk_new_1d cleantalk_updated_1d php_commenters_1d php_dictionary_1d php_harvesters_1d php_spammers_1d stopforumspam_1d) |
ipv4 hash:net |
6064 subnets, 6165 unique IPs |
updated every 1 min |
| firehol_abusers_30d |
An ipset made from blocklists that track abusers in the last 30 days. (includes: cleantalk_new_30d cleantalk_updated_30d php_commenters_30d php_dictionary_30d php_harvesters_30d php_spammers_30d stopforumspam sblam) |
ipv4 hash:net |
161144 subnets, 171213 unique IPs |
updated every 1 min |
| firehol_anonymous |
An ipset that includes all the anonymizing IPs of the world. (includes: anonymous dm_tor firehol_proxies tor_exits) |
ipv4 hash:net |
2056982 subnets, 2492747 unique IPs |
updated every 1 min |
| firehol_level1 |
A firewall blacklist composed from IP lists, providing maximum protection with minimum false positives. Suitable for basic protection on all internet facing servers, routers and firewalls. (includes: dshield feodo fullbogons spamhaus_drop) |
ipv4 hash:net |
4385 subnets, 611852609 unique IPs |
updated every 1 min |
| firehol_level2 |
An ipset made from blocklists that track attacks, during about the last 48 hours. (includes: blocklist_de dshield_1d greensnow) |
ipv4 hash:net |
15029 subnets, 30692 unique IPs |
updated every 1 min |
| firehol_level3 |
An ipset made from blocklists that track attacks, spyware, viruses. It includes IPs than have been reported or detected in the last 30 days. (includes: bruteforceblocker ciarmy dshield_30d myip vxvault) |
ipv4 hash:net |
14346 subnets, 34545 unique IPs |
updated every 1 min |
| firehol_level4 |
An ipset made from blocklists that track attacks, but may include a large number of false positives. (includes: blocklist_net_ua botscout_30d cybercrime iblocklist_hijacked iblocklist_spyware iblocklist_webexploit) |
ipv4 hash:net |
85354 subnets, 9184647 unique IPs |
updated every 1 min |
| firehol_proxies |
An ipset made from all sources that track open proxies. It includes IPs reported or detected in the last 30 days. (includes: iblocklist_proxies ip2proxy_px1lite socks_proxy_30d sslproxies_30d) |
ipv4 hash:net |
2051290 subnets, 2479649 unique IPs |
updated every 1 min |
| firehol_webclient |
An IP blacklist made from blocklists that track IPs that a web client should never talk to. This list is to be used on top of firehol_level1. (includes: cybercrime) |
ipv4 hash:net |
287 subnets, 287 unique IPs |
updated every 1 min |
| firehol_webserver |
A web server IP blacklist made from blocklists that track IPs that should never be used by your web users. (This list includes IPs that are servers hosting malware, bots, etc or users having a long criminal history. This list is to be used on top of firehol_level1, firehol_level2, firehol_level3 and possibly firehol_proxies or firehol_anonymous). (includes: myip stopforumspam_toxic) |
ipv4 hash:net |
948 subnets, 124030 unique IPs |
updated every 1 min |
| fullbogons |
Team-Cymru.org IP space that has been allocated to an RIR, but not assigned by that RIR to an actual ISP or other end-user |
ipv4 hash:net |
2911 subnets, 596468800 unique IPs |
updated every 1 day |
| geolite2_asn |
MaxMind GeoLite2 ASN |
ipv4 hash:net |
disabled |
updated every 7 days from this link |
| geolite2_country |
MaxMind GeoLite2 databases are free IP geolocation databases comparable to, but less accurate than, MaxMind’s GeoIP2 databases. They include IPs per country, IPs per continent, IPs used by anonymous services (VPNs, Proxies, etc) and Satellite Providers. |
ipv4 hash:net |
All the world |
updated every 7 days from this link |
| gofferje_sip |
Stefan Gofferje A personal blacklist of networks and IPs of SIP attackers. To end up here, the IP or network must have been the origin of considerable and repeated attacks on my PBX and additionally, the ISP didn't react to any complaint. Note from the author: I don't give any guarantees of accuracy, completeness or even usability! USE AT YOUR OWN RISK! Also note that I block complete countries, namely China, Korea and Palestine with blocklists from ipdeny.com, so some attackers will never even get the chance to get noticed by me to be put on this blacklist. I also don't accept any liabilities related to this blocklist. If you're an ISP and don't like your IPs being listed here, too bad! You should have done something about your customers' behavior and reacted to my complaints. This blocklist is nothing but an expression of my personal opinion and exercising my right of free speech. |
ipv4 hash:net |
disabled |
updated every 6 hours from this link |
| gpf_comics |
The GPF DNS Block List is a list of IP addresses on the Internet that have attacked the GPF Comics family of Web sites. IPs on this block list have been banned from accessing all of our servers because they were caught in the act of spamming, attempting to exploit our scripts, scanning for vulnerabilities, or consuming resources to the detriment of our human visitors. |
ipv4 hash:ip |
2406 unique IPs |
updated every 1 day from this link |
| graphiclineweb |
GraphiclineWeb The IP’s, Hosts and Domains listed in this table are banned universally from accessing websites controlled by the maintainer. Some form of bad activity has been seen from the addresses listed. Bad activity includes: unwanted spiders, rule breakers, comment spammers, trackback spammers, spambots, hacker bots, registration bots and other scripting attackers, harvesters, nuisance spiders, spy bots and organizations spying on websites for commercial reasons. |
ipv4 hash:net |
2579 subnets, 330527 unique IPs |
updated every 1 day from this link |
| greensnow |
GreenSnow is a team harvesting a large number of IPs from different computers located around the world. GreenSnow is comparable with SpamHaus.org for attacks of any kind except for spam. Their list is updated automatically and you can withdraw at any time your IP address if it has been listed. Attacks / bruteforce that are monitored are: Scan Port, FTP, POP3, mod_security, IMAP, SMTP, SSH, cPanel, etc. |
ipv4 hash:ip |
4628 unique IPs |
updated every 30 mins from this link |
| griffinguard |
GriffinGuard top 10K abusive IP addresses observed over the last 7 days from more than 100,000 sensors. Includes mass-Internet scanners and exploiters. IPs are classified as Malicious, Institutional, or Suspicious. |
ipv4 hash:ip |
10000 unique IPs |
updated every 30 mins |
| iblocklist_abuse_palevo |
palevotracker.abuse.ch IP blocklist. |
ipv4 hash:net |
12 subnets, 12 unique IPs |
updated every 12 hours from this link |
| iblocklist_abuse_spyeye |
spyeyetracker.abuse.ch IP blocklist. |
ipv4 hash:net |
83 subnets, 84 unique IPs |
updated every 12 hours from this link |
| iblocklist_abuse_zeus |
zeustracker.abuse.ch IP blocklist that contains IP addresses which are currently beeing tracked on the abuse.ch ZeuS Tracker. |
ipv4 hash:net |
209 subnets, 212 unique IPs |
updated every 12 hours from this link |
| iblocklist_ads |
Advertising trackers and a short list of bad/intrusive porn sites. |
ipv4 hash:net |
3393 subnets, 880747 unique IPs |
updated every 12 hours |
| iblocklist_bogons |
Unallocated address space. |
ipv4 hash:net |
2692 subnets, 645673639 unique IPs |
updated every 12 hours |
| iblocklist_ciarmy_malicious |
ciarmy.com IP blocklist. Based on information from a network of Sentinel devices deployed around the world, they compile a list of known bad IP addresses. Sentinel devices are uniquely positioned to pick up traffic from bad guys without requiring any type of signature-based or rate-based identification. If an IP is identified in this way by a significant number of Sentinels, the IP is malicious and should be blocked. |
ipv4 hash:net |
12627 subnets, 15000 unique IPs |
updated every 12 hours from this link |
| iblocklist_cidr_report_bogons |
cidr-report.org IP list of Unallocated address space. |
ipv4 hash:net |
18 subnets, 588514808 unique IPs |
updated every 12 hours from this link |
| iblocklist_cruzit_web_attacks |
CruzIT IP list with individual IP addresses of compromised machines scanning for vulnerabilities and DDOS attacks. |
ipv4 hash:net |
14096 subnets, 14397 unique IPs |
updated every 12 hours from this link |
| iblocklist_dshield |
known Hackers and such people. |
ipv4 hash:net |
16 subnets, 2566 unique IPs |
updated every 12 hours |
| iblocklist_edu |
IPs used by Educational Institutions. |
ipv4 hash:net |
43894 subnets, 227731596 unique IPs |
updated every 12 hours |
| iblocklist_exclusions |
Exclusions. |
ipv4 hash:net |
313 subnets, 7488 unique IPs |
updated every 12 hours |
| iblocklist_fornonlancomputers |
IP blocklist for non-LAN computers. |
ipv4 hash:net |
4 subnets, 302055424 unique IPs |
updated every 12 hours |
| iblocklist_forumspam |
Forum spam. |
ipv4 hash:net |
455 subnets, 479 unique IPs |
updated every 12 hours |
| iblocklist_hijacked |
Hijacked IP-Blocks. Contains hijacked IP-Blocks and known IP-Blocks that are used to deliver Spam. This list is a combination of lists with hijacked IP-Blocks. Hijacked IP space are IP blocks that are being used without permission by organizations that have no relation to original organization (or its legal successor) that received the IP block. In essence it's stealing of somebody else's IP resources. |
ipv4 hash:net |
512 subnets, 8736512 unique IPs |
updated every 12 hours |
| iblocklist_iana_multicast |
IANA Multicast IPs. |
ipv4 hash:net |
1 subnets, 268435456 unique IPs |
updated every 12 hours |
| iblocklist_iana_private |
IANA Private IPs. |
ipv4 hash:net |
58 subnets, 51643646 unique IPs |
updated every 12 hours |
| iblocklist_iana_reserved |
IANA Reserved IPs. |
ipv4 hash:net |
1 subnets, 536870912 unique IPs |
updated every 12 hours |
| iblocklist_isp_aol |
AOL IPs. |
ipv4 hash:net |
16 subnets, 6627584 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_att |
AT&T IPs. |
ipv4 hash:net |
35 subnets, 55845128 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_cablevision |
Cablevision IPs. |
ipv4 hash:net |
11 subnets, 1787136 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_charter |
Charter IPs. |
ipv4 hash:net |
21 subnets, 6138112 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_comcast |
Comcast IPs. |
ipv4 hash:net |
33 subnets, 45121536 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_embarq |
Embarq IPs. |
ipv4 hash:net |
14 subnets, 2703360 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_qwest |
Qwest IPs. |
ipv4 hash:net |
73 subnets, 15777552 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_sprint |
Sprint IPs. |
ipv4 hash:net |
73 subnets, 6310570 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_suddenlink |
Suddenlink IPs. |
ipv4 hash:net |
3 subnets, 458752 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_twc |
Time Warner Cable IPs. |
ipv4 hash:net |
56 subnets, 15015936 unique IPs |
updated every 1 day from this link |
| iblocklist_isp_verizon |
Verizon IPs. |
ipv4 hash:net |
22 subnets, 18087936 unique IPs |
updated every 1 day from this link |
| iblocklist_level1 |
Level 1 (for use in p2p): Companies or organizations who are clearly involved with trying to stop filesharing (e.g. Baytsp, MediaDefender, Mediasentry). Companies which anti-p2p activity has been seen from. Companies that produce or have a strong financial interest in copyrighted material (e.g. music, movie, software industries a.o.). Government ranges or companies that have a strong financial interest in doing work for governments. Legal industry ranges. IPs or ranges of ISPs from which anti-p2p activity has been observed. Basically this list will block all kinds of internet connections that most people would rather not have during their internet travels. |
ipv4 hash:net |
235635 subnets, 725210629 unique IPs |
updated every 12 hours |
| iblocklist_level2 |
Level 2 (for use in p2p). General corporate ranges. Ranges used by labs or researchers. Proxies. |
ipv4 hash:net |
78372 subnets, 337852562 unique IPs |
updated every 12 hours |
| iblocklist_level3 |
Level 3 (for use in p2p). Many portal-type websites. ISP ranges that may be dodgy for some reason. Ranges that belong to an individual, but which have not been determined to be used by a particular company. Ranges for things that are unusual in some way. The L3 list is aka the paranoid list. |
ipv4 hash:net |
18870 subnets, 137081306 unique IPs |
updated every 12 hours |
| iblocklist_malc0de |
malc0de.com IP blocklist. Addresses that have been identified distributing malware during the past 30 days. |
ipv4 hash:net |
21 subnets, 21 unique IPs |
updated every 12 hours from this link |
| iblocklist_onion_router |
The Onion Router IP addresses. |
ipv4 hash:net |
853 subnets, 1278 unique IPs |
updated every 12 hours from this link |
| iblocklist_org_activision |
Activision IPs. |
ipv4 hash:net |
49 subnets, 4902 unique IPs |
updated every 1 day from this link |
| iblocklist_org_apple |
Apple IPs. |
ipv4 hash:net |
1 subnets, 16777216 unique IPs |
updated every 1 day from this link |
| iblocklist_org_blizzard |
Blizzard IPs. |
ipv4 hash:net |
8 subnets, 16795139 unique IPs |
updated every 1 day from this link |
| iblocklist_org_crowd_control |
Crowd Control Productions IPs. |
ipv4 hash:net |
2 subnets, 768 unique IPs |
updated every 1 day from this link |
| iblocklist_org_electronic_arts |
Electronic Arts IPs. |
ipv4 hash:net |
42 subnets, 69720 unique IPs |
updated every 1 day from this link |
| iblocklist_org_joost |
Joost IPs. |
ipv4 hash:net |
4 subnets, 16779456 unique IPs |
updated every 1 day from this link |
| iblocklist_org_linden_lab |
Linden Lab IPs. |
ipv4 hash:net |
11 subnets, 23600 unique IPs |
updated every 1 day from this link |
| iblocklist_org_logmein |
LogMeIn IPs. |
ipv4 hash:net |
13 subnets, 16781568 unique IPs |
updated every 1 day from this link |
| iblocklist_org_microsoft |
Microsoft IP ranges. |
ipv4 hash:net |
901 subnets, 1848599 unique IPs |
updated every 12 hours |
| iblocklist_org_ncsoft |
NCsoft IPs. |
ipv4 hash:net |
5 subnets, 12560 unique IPs |
updated every 1 day from this link |
| iblocklist_org_nintendo |
Nintendo IPs. |
ipv4 hash:net |
45 subnets, 3927 unique IPs |
updated every 1 day from this link |
| iblocklist_org_pandora |
Pandora IPs. |
ipv4 hash:net |
1 subnets, 2048 unique IPs |
updated every 1 day from this link |
| iblocklist_org_pirate_bay |
The Pirate Bay IPs. |
ipv4 hash:net |
5 subnets, 323 unique IPs |
updated every 1 day from this link |
| iblocklist_org_punkbuster |
Punkbuster IPs. |
ipv4 hash:net |
1 subnets, 1 unique IPs |
updated every 1 day from this link |
| iblocklist_org_riot_games |
Riot Games IPs. |
ipv4 hash:net |
6 subnets, 1792 unique IPs |
updated every 1 day from this link |
| iblocklist_org_sony_online |
Sony Online Entertainment IPs. |
ipv4 hash:net |
7 subnets, 24616 unique IPs |
updated every 1 day from this link |
| iblocklist_org_square_enix |
Square Enix IPs. |
ipv4 hash:net |
2 subnets, 4112 unique IPs |
updated every 1 day from this link |
| iblocklist_org_steam |
Steam IPs. |
ipv4 hash:net |
53 subnets, 596448 unique IPs |
updated every 1 day from this link |
| iblocklist_org_ubisoft |
Ubisoft IPs. |
ipv4 hash:net |
10 subnets, 5308 unique IPs |
updated every 1 day from this link |
| iblocklist_org_xfire |
XFire IPs. |
ipv4 hash:net |
3 subnets, 3328 unique IPs |
updated every 1 day from this link |
| iblocklist_pedophiles |
IP ranges of people who we have found to be sharing child pornography in the p2p community. |
ipv4 hash:net |
29188 subnets, 847889 unique IPs |
updated every 12 hours from this link |
| iblocklist_proxies |
Open Proxies IPs list (without TOR) |
ipv4 hash:ip |
672 unique IPs |
updated every 12 hours |
| iblocklist_rangetest |
Suspicious IPs that are under investigation. |
ipv4 hash:net |
576 subnets, 4280758 unique IPs |
updated every 12 hours |
| iblocklist_spamhaus_drop |
Spamhaus.org DROP (Don't Route Or Peer) list. |
ipv4 hash:net |
900 subnets, 17338368 unique IPs |
updated every 12 hours from this link |
| iblocklist_spider |
IP list intended to be used by webmasters to block hostile spiders from their web sites. |
ipv4 hash:net |
773 subnets, 846788 unique IPs |
updated every 12 hours |
| iblocklist_spyware |
Known malicious SPYWARE and ADWARE IP Address ranges. It is compiled from various sources, including other available spyware blacklists, HOSTS files, from research found at many of the top anti-spyware forums, logs of spyware victims, etc. |
ipv4 hash:net |
3357 subnets, 339303 unique IPs |
updated every 12 hours |
| iblocklist_webexploit |
Web server hack and exploit attempts. IP addresses related to current web server hack and exploit attempts that have been logged or can be found in and cross referenced with other related IP databases. Malicious and other non search engine bots will also be listed here, along with anything found that can have a negative impact on a website or webserver such as proxies being used for negative SEO hijacks, unauthorised site mirroring, harvesting, scraping, snooping and data mining / spy bot / security & copyright enforcement companies that target and continuosly scan webservers. |
ipv4 hash:ip |
15382 unique IPs |
updated every 12 hours |
| iblocklist_yoyo_adservers |
pgl.yoyo.org ad servers |
ipv4 hash:net |
7523 subnets, 8900 unique IPs |
updated every 12 hours from this link |
| ip2location_country |
IP2Location.com geolocation database |
ipv4 hash:net |
All the world |
updated every 1 day from this link |
| ip2location_country_eh |
Western Sahara (EH) -- IP2Location.com |
ipv4 hash:net |
1 subnets, 256 unique IPs |
updated every 1 day from this link |
| ip2proxy_px1lite |
IP2Location.com IP2Proxy LITE IP-COUNTRY Database contains IP addresses which are used as public proxies. The LITE edition is a free version of database that is limited to public proxies IP address. |
ipv4 hash:net |
2049653 subnets, 2477837 unique IPs |
updated every 1 day |
| ipdeny_country |
IPDeny.com geolocation database |
ipv4 hash:net |
All the world |
updated every 1 day from this link |
| ipsum |
IPsum threat intelligence feed of IPs appearing on at least 1 blacklist. Based on analysis of 30+ publicly available blacklists updated daily. This is the full list with the most entries and the highest false positive rate. |
ipv4 hash:ip |
129212 unique IPs |
updated every 1 day from this link |
| ipsum_2 |
IPsum threat intelligence feed of IPs appearing on at least 2 blacklists. Based on analysis of 30+ publicly available blacklists updated daily. |
ipv4 hash:ip |
35653 unique IPs |
updated every 1 day from this link |
| ipsum_3 |
IPsum threat intelligence feed of IPs appearing on at least 3 blacklists. Based on analysis of 30+ publicly available blacklists updated daily. This is the recommended level for most use cases. |
ipv4 hash:ip |
16840 unique IPs |
updated every 1 day from this link |
| ipsum_4 |
IPsum threat intelligence feed of IPs appearing on at least 4 blacklists. Based on analysis of 30+ publicly available blacklists updated daily. |
ipv4 hash:ip |
7704 unique IPs |
updated every 1 day from this link |
| ipsum_5 |
IPsum threat intelligence feed of IPs appearing on at least 5 blacklists. Based on analysis of 30+ publicly available blacklists updated daily. |
ipv4 hash:ip |
3543 unique IPs |
updated every 1 day from this link |
| ipsum_6 |
IPsum threat intelligence feed of IPs appearing on at least 6 blacklists. Based on analysis of 30+ publicly available blacklists updated daily. |
ipv4 hash:ip |
781 unique IPs |
updated every 1 day from this link |
| ipsum_7 |
IPsum threat intelligence feed of IPs appearing on at least 7 blacklists. Based on analysis of 30+ publicly available blacklists updated daily. |
ipv4 hash:ip |
92 unique IPs |
updated every 1 day from this link |
| ipsum_8 |
IPsum threat intelligence feed of IPs appearing on at least 8 blacklists. Based on analysis of 30+ publicly available blacklists updated daily. This is the most conservative level with the highest confidence and fewest entries. |
ipv4 hash:ip |
13 unique IPs |
updated every 1 day from this link |
| maltrail_scanners |
MalTrail list of known mass-Internet scanners. These IPs are known to perform large-scale scanning across the Internet. |
ipv4 hash:ip |
16854 unique IPs |
updated every 1 day from this link |
| myip |
myip.ms IPs identified as web bots in the last 10 days, using several sites that require human action |
ipv4 hash:ip |
1052 unique IPs |
updated every 1 day from this link |
| php_bad |
projecthoneypot.org bad web hosts (this list is composed using an RSS feed) |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| php_commenters |
projecthoneypot.org comment spammers (this list is composed using an RSS feed) |
ipv4 hash:ip |
49 unique IPs |
updated every 1 hour from this link |
| php_commenters_1d |
projecthoneypot.org comment spammers (this list is composed using an RSS feed) |
ipv4 hash:ip |
49 unique IPs |
updated every 1 hour from this link |
| php_commenters_30d |
projecthoneypot.org comment spammers (this list is composed using an RSS feed) |
ipv4 hash:ip |
1258 unique IPs |
updated every 1 hour from this link |
| php_commenters_7d |
projecthoneypot.org comment spammers (this list is composed using an RSS feed) |
ipv4 hash:ip |
364 unique IPs |
updated every 1 hour from this link |
| php_dictionary |
projecthoneypot.org directory attackers (this list is composed using an RSS feed) |
ipv4 hash:ip |
50 unique IPs |
updated every 1 hour from this link |
| php_dictionary_1d |
projecthoneypot.org directory attackers (this list is composed using an RSS feed) |
ipv4 hash:ip |
50 unique IPs |
updated every 1 hour from this link |
| php_dictionary_30d |
projecthoneypot.org directory attackers (this list is composed using an RSS feed) |
ipv4 hash:ip |
1016 unique IPs |
updated every 1 hour from this link |
| php_dictionary_7d |
projecthoneypot.org directory attackers (this list is composed using an RSS feed) |
ipv4 hash:ip |
314 unique IPs |
updated every 1 hour from this link |
| php_harvesters |
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed) |
ipv4 hash:ip |
50 unique IPs |
updated every 1 hour from this link |
| php_harvesters_1d |
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed) |
ipv4 hash:ip |
56 unique IPs |
updated every 1 hour from this link |
| php_harvesters_30d |
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed) |
ipv4 hash:ip |
264 unique IPs |
updated every 1 hour from this link |
| php_harvesters_7d |
projecthoneypot.org harvesters (IPs that surf the internet looking for email addresses) (this list is composed using an RSS feed) |
ipv4 hash:ip |
114 unique IPs |
updated every 1 hour from this link |
| php_spammers |
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed) |
ipv4 hash:ip |
49 unique IPs |
updated every 1 hour from this link |
| php_spammers_1d |
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed) |
ipv4 hash:ip |
49 unique IPs |
updated every 1 hour from this link |
| php_spammers_30d |
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed) |
ipv4 hash:ip |
1248 unique IPs |
updated every 1 hour from this link |
| php_spammers_7d |
projecthoneypot.org spam servers (IPs used by spammers to send messages) (this list is composed using an RSS feed) |
ipv4 hash:ip |
359 unique IPs |
updated every 1 hour from this link |
| proxyrss |
proxyrss.com open proxies syndicated from multiple sources. |
ipv4 hash:ip |
disabled |
updated every 4 hours from this link |
| ri_connect_proxies |
rosinstrument.com open CONNECT proxies (this list is composed using an RSS feed) |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| ri_web_proxies |
rosinstrument.com open HTTP proxies (this list is composed using an RSS feed) |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| sblam |
sblam.com IPs used by web form spammers, during the last month |
ipv4 hash:ip |
1415 unique IPs |
updated every 1 day from this link |
| socks_proxy |
socks-proxy.net open SOCKS proxies |
ipv4 hash:ip |
302 unique IPs |
updated every 10 mins from this link |
| socks_proxy_1d |
socks-proxy.net open SOCKS proxies |
ipv4 hash:ip |
1405 unique IPs |
updated every 10 mins from this link |
| socks_proxy_30d |
socks-proxy.net open SOCKS proxies |
ipv4 hash:ip |
2830 unique IPs |
updated every 10 mins from this link |
| socks_proxy_7d |
socks-proxy.net open SOCKS proxies |
ipv4 hash:ip |
2030 unique IPs |
updated every 10 mins from this link |
| sorbs_anonymizers |
Sorbs.net List of open HTTP and SOCKS proxies. |
ipv4 hash:net |
disabled |
|
| sorbs_block |
Sorbs.net List of hosts demanding that they never be tested by SORBS. |
ipv4 hash:net |
disabled |
|
| sorbs_escalations |
Sorbs.net Netblocks of spam supporting service providers, including those who provide websites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list. |
ipv4 hash:net |
disabled |
|
| sorbs_new_spam |
Sorbs.net List of hosts that have been noted as sending spam/UCE/UBE within the last 48 hours |
ipv4 hash:net |
disabled |
|
| sorbs_noserver |
Sorbs.net IP addresses and netblocks of where system administrators and ISPs owning the network have indicated that servers should not be present. |
ipv4 hash:net |
disabled |
|
| sorbs_recent_spam |
Sorbs.net List of hosts that have been noted as sending spam/UCE/UBE within the last 28 days (includes sorbs_new_spam) |
ipv4 hash:net |
disabled |
|
| sorbs_smtp |
Sorbs.net List of SMTP Open Relays. |
ipv4 hash:net |
disabled |
|
| sorbs_web |
Sorbs.net List of IPs which have spammer abusable vulnerabilities (e.g. FormMail scripts) |
ipv4 hash:net |
disabled |
|
| sorbs_zombie |
Sorbs.net List of networks hijacked from their original owners, some of which have already used for spamming. |
ipv4 hash:net |
disabled |
|
| spamhaus_drop |
Spamhaus.org DROP list (according to their site this list should be dropped at tier-1 ISPs globally) |
ipv4 hash:net |
1465 subnets, 15379456 unique IPs |
updated every 12 hours from this link |
| spamhaus_edrop |
Spamhaus.org EDROP (extended matches that should be used with DROP) |
ipv4 hash:net |
336 subnets, 731392 unique IPs |
updated every 12 hours from this link |
| sslproxies |
SSLProxies.org open SSL proxies |
ipv4 hash:ip |
102 unique IPs |
updated every 10 mins from this link |
| sslproxies_1d |
SSLProxies.org open SSL proxies |
ipv4 hash:ip |
439 unique IPs |
updated every 10 mins from this link |
| sslproxies_30d |
SSLProxies.org open SSL proxies |
ipv4 hash:ip |
1865 unique IPs |
updated every 10 mins from this link |
| sslproxies_7d |
SSLProxies.org open SSL proxies |
ipv4 hash:ip |
861 unique IPs |
updated every 10 mins from this link |
| stopforumspam |
StopForumSpam.com Banned IPs used by forum spammers |
ipv4 hash:ip |
128842 unique IPs |
updated every 1 day from this link |
| stopforumspam_180d |
StopForumSpam.com IPs used by forum spammers (last 180 days) |
ipv4 hash:ip |
259319 unique IPs |
updated every 1 day from this link |
| stopforumspam_1d |
StopForumSpam.com IPs used by forum spammers in the last 24 hours |
ipv4 hash:ip |
3795 unique IPs |
updated every 1 hour from this link |
| stopforumspam_30d |
StopForumSpam.com IPs used by forum spammers (last 30 days) |
ipv4 hash:ip |
49887 unique IPs |
updated every 1 day from this link |
| stopforumspam_365d |
StopForumSpam.com IPs used by forum spammers (last 365 days) |
ipv4 hash:ip |
533211 unique IPs |
updated every 1 day from this link |
| stopforumspam_7d |
StopForumSpam.com IPs used by forum spammers (last 7 days) |
ipv4 hash:ip |
15139 unique IPs |
updated every 1 day from this link |
| stopforumspam_90d |
StopForumSpam.com IPs used by forum spammers (last 90 days) |
ipv4 hash:ip |
129596 unique IPs |
updated every 1 day from this link |
| stopforumspam_toxic |
StopForumSpam.com Networks that have large amounts of spambots and are flagged as toxic. Toxic IP ranges are infrequently changed. |
ipv4 hash:net |
56 subnets, 122988 unique IPs |
updated every 1 day from this link |
| tor_exits |
TorProject.org list of all current TOR exit points (TorDNSEL) |
ipv4 hash:ip |
1279 unique IPs |
updated every 5 mins from this link |
| tor_exits_1d |
TorProject.org list of all current TOR exit points (TorDNSEL) |
ipv4 hash:ip |
1287 unique IPs |
updated every 5 mins from this link |
| tor_exits_30d |
TorProject.org list of all current TOR exit points (TorDNSEL) |
ipv4 hash:ip |
1443 unique IPs |
updated every 5 mins from this link |
| tor_exits_7d |
TorProject.org list of all current TOR exit points (TorDNSEL) |
ipv4 hash:ip |
1329 unique IPs |
updated every 5 mins from this link |
| urandomusto_dns |
IP Feed about dns, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_ftp |
IP Feed about ftp, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_http |
IP Feed about http, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_mailer |
IP Feed about mailer, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_malware |
IP Feed about malware, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_ntp |
IP Feed about ntp, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_rdp |
IP Feed about rdp, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_smb |
IP Feed about smb, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_spam |
IP Feed about spam, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_ssh |
IP Feed about ssh, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_telnet |
IP Feed about telnet, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_unspecified |
IP Feed about unspecified, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| urandomusto_vnc |
IP Feed about vnc, crawled from several sources, including several twitter accounts. |
ipv4 hash:ip |
disabled |
updated every 1 hour from this link |
| vxvault |
VxVault The latest 100 additions of VxVault. |
ipv4 hash:ip |
66 unique IPs |
updated every 12 hours from this link |
| yoyo_adservers |
Yoyo.org IPs of ad servers |
ipv4 hash:ip |
8900 unique IPs |
updated every 12 hours from this link |
| zeus |
Abuse.ch Zeus tracker standard, contains the same data as the ZeuS IP blocklist (zeus_badips) but with the slight difference that it doesn't exclude hijacked websites (level 2) and free web hosting providers (level 3). This means that this blocklist contains all IPv4 addresses associated with ZeuS C&Cs which are currently being tracked by ZeuS Tracker. Hence this blocklist will likely cause some false positives. |
ipv4 hash:ip |
disabled |
updated every 30 mins from this link |
| zeus_badips |
Abuse.ch Zeus tracker badips includes IPv4 addresses that are used by the ZeuS trojan. It is the recommened blocklist if you want to block only ZeuS IPs. It excludes IP addresses that ZeuS Tracker believes to be hijacked (level 2) or belong to a free web hosting provider (level 3). Hence the false postive rate should be much lower compared to the standard ZeuS IP blocklist. |
ipv4 hash:ip |
disabled |
updated every 30 mins from this link |