Open Dynamic Block Lists
These lists can be imported into any device that accept blocklists with standalone ip addressess (x.x.x.x) and ranges (x.x.x.x-y.y.y.y).
Keep polling interval at 15 minutes or higher and use https if possible.
|List name||Entries||Last update||Recommended usage||Description|
|Emerging Threats: Known Compromised Hosts||7017||2020-12-05 02:03||Incoming||This ruleset is compiled from a number of sources and contains significantly infected and hostile hosts. Read more|
|TOR exit nodes||1338||2020-12-05 02:06||Incoming||A list of known TOR exit nodes|
|BruteforceBlocker||6594||2020-12-05 02:02||Incoming||See http://danger.rulez.sk/index.php/bruteforceblocker|
|Blocklist.de All||28436||2020-12-05 02:04||Incoming||Blocklist.de all list contains IP addresses that have attacked one of our customers/servers in the last 48 hours.|
|Talos||0||2020-12-05 00:00||Incoming||Talos is a list from Cisco Talos that contains known malicious network threats.|
|Dshield||20||2020-12-05 02:12||Incoming||Dshield.org recommended block list|
|Malware Domain List||0||2020-12-05 02:09||Outgoing||See: http://www.malwaredomainlist.com|
|SSL Abuse IP list||84||2020-12-05 02:10||Outgoing||SSLBL 30 days block list. https://sslbl.abuse.ch/blacklist/|