Skip to content

Latest commit

 

History

History
131 lines (97 loc) · 12.1 KB

README.md

File metadata and controls

131 lines (97 loc) · 12.1 KB

Additional Undesired Hosts

License GitHub last commit GitHub commit activity the past year Github file size

Introduction

This is a list of categorized domains, with additional entries for wildcard blocking. The domains are documented as to keep a record of what is being blocked or allowed. The primary focus is to maximize blocking unwanted hosts while guaranteeing not to break any useful services or legitimate websites.

Each domain is only added after through research and tests in order to make sure it should be intentionally blocked. If you found any domains that shouldn't be on these lists, please feel free to open an issue.

Thanks for reporting issues, and using my lists! ❤️

Blacklist Domains

List Title Description Download List
Ad and tracker servers Blocks advertisement and trackers, and anything inbetween.
Pop Ups, Pop Unders, Gif Banners, Game Ads, Ads CDNs, etc.
📝 adservers-and-trackers.txt
Activation servers Blocks license verification and software activation.
This list is intended to prevent products from expiring when they detect an invalid license.
📝 activation.txt
Fake domains Blocks copycat, scam and fake domains.
These domains may imitate other well-known websites for various reasons, or promise to provide a functionality that they actually don't do.
📝 fake-domains.txt
Search blacklist Blocks useless, shady and annoying domains from from appearing in search engine results. 📝 search-blacklist.txt
Unwanted Iranian domains Blocks various regional scams and popups specific to Iranian websites.
e.g. Pop Ups, Fake Download Buttons, Scam Landing Pages, Trackers, etc.
📝 unwanted-iranian.txt

It is recommended that these lists be used in CNAME, Wildcard blocking mode.

👉 NOTE: Additional wildcard domains are present in the 📁 /wildcard-domains/blacklist directory.

Whitelist Domains

The whitelist domains that I use – which are also hand-picked – are being categorized, and will be published under the 📁 /domains/whitelist directory when released.
In the meantime, please contact me if you'd like to receive information about my whitelists.

Format

The lists are provided only in domains format at the moment, with the following properties:

  • The # or ! denotes a comment, and may come at at the beginning of a line, or after an entry.
  • Lines only contain a single hostname.
  • The * character represents a wild-card (which Pi-hole might not support, but DNSCrypt-proxy will – which is what I'm using at the moment.)
  • All whitespace (including new line, tabs, spaces, etc) should be ignored.

Other lists can feel free to remove all whitespace and comments from my lists when/if mine are included.

👉 NOTE: If you would like to use my lists as your /etc/hosts file, first you would need to convert the domains format to IPv4 (i.e. 127.0.0.1 or 0.0.0.0) format. However, since the hosts file does not support wildcard and/or CNAME blocking, I haven't provided this format for download. A conversion is needed (adding the required 0.0.0.0 prefix), before it can be used as a HOSTS file.

Sources

The domain entries on this list are hand-picked, and mainly added by analyzing the traffic generated by the devices I use. I intend to focus on domains related to both websites and mobile apps. This will include the obvious pop-ups and pop-unders, frame-based ads, 3rd party image and video ads, mobile in-app banners -- as well as hidden tracking and other unnecessary bloated spyware that is ususally bundled with common apps that are downloaded, and the websites you visit.

Software

The provided lists are compatible with:

You can use it on either a server, or using browser extensions, you can filter sites on the client side.

🕳 Read Olivier Butterbach's excellent post on Medium to set up Pi-hole:
https://medium.com/@obutterbach/unlock-the-full-potential-of-pihole-e795342e0e36

Aggregated lists

The following aggregated lists automatically includes the domains in my lists. You can use the aggregated lists such as:

  • 1Hosts (Pro) – includes adservers-and-trackers and unwanted-iranian lists
  • oisd.nl – includes adservers-and-trackers and unwanted-iranian lists

I used to use this python script alongside DNScrypt on my VPS instead of running Pi-hole.

✍ Note: You're welcome to use and include my lists in your aggregated lists and redistribute them. Please tell me if you do so, so I can mention your list here as well.

Sources to use alongside mine

These are some of the other lists that you should definitely be using alongside with mine:

Set-Up / Configuration

I combine my lists with some other lists and generate a final domains-blacklist.txt file, that is used on the two servers that I run (one as a redundant).
The source list includes ~1500 links, and resolves to about 80 million records (14 million unique top-level domains). The servers both have 8GBs of RAM, and for my usecase about ~15% CPU load on average.

P.S. Personally I haven't ran into any major issues blocking this many domains, altough some people consider blocking any amount over >1M domains to be overkill.

Here's a diagram of software setup on both of the servers:

                    ╭────────────────╮   ╭──────────────────╮
╔═════════════╗     │                │   │                  │
║  DoH / DoT  ║     │                │   │                  │ UDP Tunnel    ┌─────────┐
║             ║  →  │ DNSCrypt-Proxy │ → │ Unbound resolver │ … … … … … … → │ Clients │
║  Providers  ║     │                │   │                  │               └─────────┘
╚═════════════╝     │                │   │                  │
                    ╰────────────────╯   ╰──────────────────╯

The clients can connect over a secure UDP tunnel (e.g. either on Desktop or mobile).

Report domains

If you notice any domains that you believe should be included in my lists, please report it to me here.

A great deal of care is taken to avoid any type of false positives. However, in the event that you see something legitamate is being blocked, missing content and/or breaking functionality, please report false positives by creating an issue here.

This could be because the domain names that serve those type of ads could potentially be also used to serve legitimate content, which means blocking them will result in an app or website missing content or losing functionality.

These lists are personaly used by me, with no side-effects. I have kept the lists short and lightweight, while adding as much as possible to each list.

Updates

In order to get notified of an update, you can mark my repository as "watched". I update this list on a weekly or monthly basis.

Subscribe to FilterLists entries:

License

This repository is licensed under MIT License © 2019-2020 David Refoua. All re-distribution of my lists, provided that you credit my name and work, are welcome and encouraged.