Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/elliotwutingfeng/inversion-dnsbl-blocklists
Malicious URLs identified by scanning various public URL sources using the Google Safe Browsing API (over 6 billion URLs scanned daily)
https://github.com/elliotwutingfeng/inversion-dnsbl-blocklists
adguard aiohttp blocklist dnsbl domains-project domcop ec2 firewall google-safe-browsing icann pfblockerng pi-hole pihole python3 ray safebrowsing sqlite3 tldextract top1m trancolist
Last synced: about 15 hours ago
JSON representation
Malicious URLs identified by scanning various public URL sources using the Google Safe Browsing API (over 6 billion URLs scanned daily)
- Host: GitHub
- URL: https://github.com/elliotwutingfeng/inversion-dnsbl-blocklists
- Owner: elliotwutingfeng
- License: other
- Created: 2022-03-07T06:17:42.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-05-28T10:52:41.000Z (4 months ago)
- Last Synced: 2024-05-29T02:33:48.288Z (4 months ago)
- Topics: adguard, aiohttp, blocklist, dnsbl, domains-project, domcop, ec2, firewall, google-safe-browsing, icann, pfblockerng, pi-hole, pihole, python3, ray, safebrowsing, sqlite3, tldextract, top1m, trancolist
- Homepage:
- Size: 631 MB
- Stars: 45
- Watchers: 5
- Forks: 1
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
Inversion DNSBL (Domain Name System-based blackhole list) Blocklists
Malicious URL blocklists for DNSBL applications like pfBlockerNG or Pi-hole, automatically updated every 24 hours. These blocklists are automatically generated by scanning various public URL sources using the Safe Browsing API from Google.
## Blocklists
### Light
Malicious hostnames detected from [Tranco TOP1M](https://tranco-list.eu), [DomCop TOP10M](https://www.domcop.com/top-10-million-domains) and [Google Threat Analysis Group](https://blog.google/threat-analysis-group).
| File | Download |
|:-:|:-:|
| Google_hostnames_light.txt | [:floppy_disk:](Google_hostnames_light.txt?raw=true) |
| Google_hostnames_light_ABP.txt | [:floppy_disk:](Google_hostnames_light_ABP.txt?raw=true) |
| Google_hostnames_light_UBO.txt | [:floppy_disk:](Google_hostnames_light_UBO.txt?raw=true) |### Full
Malicious hostnames and IPv4 addresses detected from [all sources](https://github.com/elliotwutingfeng/Inversion-DNSBL-Generator#url-sources).
| File | Download |
|:-:|:-:|
| Google_hostnames.txt | [:floppy_disk:](Google_hostnames.txt?raw=true) |
| Google_hostnames_ABP.txt | [:floppy_disk:](Google_hostnames_ABP.txt?raw=true) |
| Google_hostnames_UBO.txt | [:floppy_disk:](Google_hostnames_UBO.txt?raw=true) |
| Google_ipv4.txt | [:floppy_disk:](Google_ipv4.txt?raw=true) |## Blocklist Generator
The blocklist generator source code is available [here](https://github.com/elliotwutingfeng/Inversion-DNSBL-Generator)
## Safe Browsing API vendor
| |
|:-:|
|[Google](https://developers.google.com/safe-browsing)|
|[Terms-of-Service](https://developers.google.com/safe-browsing/terms)|## Disclaimer
- This project is not sponsored, endorsed, or otherwise affiliated with Google.
- Google works to provide the most accurate and up-to-date information about unsafe web resources. However, Google cannot guarantee that its information is comprehensive and error-free: some risky sites may not be identified, and some safe sites may be identified in error.
- URLs detected with the Safe Browsing API usually have a malicious validity period of about 5 minutes. As the blocklists are updated only once every 24 hours, the blocklists must not be used to display user warnings.
**More information on Google Safe Browsing API usage limits:** https://developers.google.com/safe-browsing/v4/usage-limits
These files are provided "AS IS", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, arising from, out of or in connection with the files or the use of the files.
Any and all trademarks are the property of their respective owners.