A hosts file for use on any operating system to block bad domains out of your servers or devices.
- Here's the RAW hosts file
- Here's the DNSMASQ hosts file for DD-WRT
- Copyright: https://github.com/mitchellkrogza
# Generated by PyFunceble (v4.0.0b47.dev) / https://git.io/vpZoI
# Date of generation: 2021-05-07T18:10:53.468890
Status Percentage Amount
----------- ------------ ------------
ACTIVE 93% 1386
INACTIVE 7% 109
INVALID 0% 0
- You are free to copy and distribute this file for non-commercial uses, as long the original URL and attribution is included.
Please forward any additions, corrections or false positives by:
or send a PULL REQUEST on the domains.txt file in the PULL_REQUESTS folder.
This list of hosts is compiled from real server logs on my own servers where I run a number of very busy web sites.
This list originated from the list of bad referrers domain lists for:
The list has now been separated from those projects as it contains certain domains which do not actually belong in a hosts file.
A hosts file, named hosts
(with no file extension), is a plain-text file
used by all operating systems to map hostnames to IP addresses.
In most operating systems, the hosts
file is preferential to DNS
.
Therefore if a domain name is resolved by the hosts
file, the request never
leaves your computer.
Having a smart hosts
file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance web sites.
A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.
To modify your current hosts
file, look for it in the following places and modify it with a text
editor.
Linux, Mac OS X, iOS, Android: /etc/hosts
folder.
Windows Systems: %SystemRoot%\system32\drivers\etc\hosts
folder.
A lot of lists out there put funny domains into their hosts file. Your hosts file and DNS will not understand this. This list uses converted domains which are in the correct DNS format to be understood by any operating system.
For instance The domain:
lifehacĸer.com
(note the K)
actually translates to:
xn--lifehacer-1rb.com
You can do an nslookup on any operating system and it will resolve correctly.
nslookup xn--lifehacer-1rb.com
origin = dns1.yandex.net
mail addr = iskalko.yandex.ru
serial = 2016120703
refresh = 14400
retry = 900
expire = 1209600
minimum = 14400
xn--lifehacer-1rb.com mail exchanger = 10 mx.yandex.net.
Name: xn--lifehacer-1rb.com
Address: 78.110.60.230
xn--lifehacer-1rb.com nameserver = dns2.yandex.net.
xn--lifehacer-1rb.com text = "v=spf1 redirect=_spf.yandex.net"
xn--lifehacer-1rb.com nameserver = dns1.yandex.net.
- Look at: https://www.charset.org/punycode for more info on this.
- Check Out The Amazing
- Nissar Chababy - https://github.com/funilrys/PyFunceble (Excellent script for checking ACTIVE, INACTIVE and EXPIRED Domain Names)
- https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
- https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker
- https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist
- https://github.com/mitchellkrogza/Stop.Google.Analytics.Ghost.Spam.HOWTO
- https://github.com/mitchellkrogza/fail2ban-useful-scripts
- https://github.com/mitchellkrogza/linux-server-administration-scripts
- https://github.com/mitchellkrogza/Travis-CI-Nginx-for-Testing-Nginx-Configuration
- https://github.com/mitchellkrogza/Travis-CI-for-Apache-For-Testing-Apache-and-PHP-Configurations
- https://github.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning
- https://github.com/funilrys/funceble
- https://github.com/funilrys/PyFunceble
Come drop by and visit me at https://mitchellkrog.com