This repository provides IP block lists designed to protect your systems from various online threats. The lists target malicious entities such as malware, bots, hackers, and sniffers. By using these block lists, you can enhance your security measures and reduce the risk of attacks.
- Comprehensive Coverage: The lists cover a wide range of threats, including botnets and brute-force attacks.
- Regular Updates: We update the lists regularly to include the latest malicious IPs.
- Compatibility: Works seamlessly with tools like Fail2Ban, iptables, and ipset.
- Blocklist: A collection of IPs known for malicious activity.
- Botnet: Identifies IPs associated with botnet operations.
- Brute-Force: Targets IPs that engage in brute-force attacks.
- CNC: Addresses command and control server IPs.
- Compromised: Lists IPs of compromised devices.
- Security: Enhances overall network security.
To begin using the IP block lists, you can download the latest release from the Releases section. After downloading, follow the instructions provided in the release notes to execute the necessary commands for implementation.
-
Download the Latest Release:
- Visit the Releases section to get the latest files.
-
Extract the Files:
- Use your preferred method to extract the downloaded files.
-
Implement the Block Lists:
- Follow the instructions in the release notes for executing the block lists with your firewall or security tools.
Hereβs how you can use the IP block lists with iptables:
# Load the block list into iptables
iptables -A INPUT -s <IP_ADDRESS> -j DROPReplace <IP_ADDRESS> with the actual IP you want to block.
Fail2Ban is a great tool to use alongside these block lists. You can configure it to automatically ban IPs that show malicious behavior.
-
Install Fail2Ban:
sudo apt-get install fail2ban
-
Configure Fail2Ban:
- Add the block lists to the configuration file.
Iptables allows you to manage network traffic effectively. You can load the block lists directly into iptables to prevent unwanted access.
IPSet can be used to manage large sets of IP addresses efficiently. You can load the block lists into IPSet and then apply them to iptables.
The block lists are provided in a simple text format, making it easy to integrate into your existing systems. Each line contains a single IP address or CIDR notation.
192.0.2.0/24
203.0.113.5
198.51.100.0/24
We welcome contributions from the community. If you have suggestions or would like to add to the block lists, please follow these steps:
- Fork the Repository: Click on the "Fork" button at the top right corner of the page.
- Create a New Branch:
git checkout -b feature/your-feature-name
- Make Your Changes: Add your IPs or modify the existing lists.
- Commit Your Changes:
git commit -m "Add new IPs to block list" - Push to Your Branch:
git push origin feature/your-feature-name
- Create a Pull Request: Go to the original repository and submit a pull request.
This project is licensed under the MIT License. See the LICENSE file for details.
If you encounter any issues or have questions, feel free to open an issue in the repository. We appreciate your feedback and aim to provide timely responses.
For more information, check the Releases section for the latest updates and files.
This image represents the security that comes with using effective block lists. It serves as a reminder of the importance of safeguarding your network.
By utilizing the IP block lists provided in this repository, you can significantly enhance your security posture. Regular updates and integration with popular security tools ensure that you stay protected against evolving threats.
Remember to keep an eye on the Releases section for the latest updates.
