Open Dynamic Block Lists
These lists can be imported into any device that accept blocklists with standalone ip addressess (x.x.x.x) and ranges (x.x.x.x-y.y.y.y).
Keep polling interval at 15 minutes or higher and use https if possible.
|List name||Entries||Last update||Recommended usage||Description|
|(908) 578-8439||562||2018-11-19 02:04||Incoming||This ruleset is compiled from a number of sources and contains significantly infected and hostile hosts. 5145887794|
|TOR exit nodes||892||2018-11-19 02:06||Incoming||A list of known TOR exit nodes|
|217-319-1385||527||2018-11-19 02:04||Incoming||See /danger.rulez.sk/index.php/bruteforceblocker|
|304-869-9234||38216||2018-11-19 02:05||Incoming||Blocklist.de all list contains IP addresses that have attacked one of our customers/servers in the last 48 hours.|
|7319344547||1464||2018-11-19 02:05||Incoming||Talos is a list from Cisco Talos that contains known malicious network threats.|
|5407553470||20||2018-11-19 02:11||Incoming||Dshield.org recommended block list|
|(262) 253-5398||1002||2018-11-19 02:06||Outgoing||See: /www.malwaredomainlist.com|
|SSL Abuse IP list||0||2018-11-19 02:08||Outgoing||SSLBL 30 days block list. /sslbl.abuse.ch/blacklist/|
|Zeus IP blocklist||107||2018-11-19 02:08||Outgoing||abuse.ch ZeuS IP blocklist "BadIPs" (excluding hijacked sites and free hosting providers). (615) 223-7314|