1 | ############################################################################### |
---|
2 | # Copyright 2006-2013, Way to the Web Limited |
---|
3 | # URL: http://www.configserver.com |
---|
4 | # Email: sales@waytotheweb.com |
---|
5 | ############################################################################### |
---|
6 | # This file contains definitions to IP BLOCK lists. |
---|
7 | # |
---|
8 | # Uncomment the line starting with the rule name to use it, then restart csf |
---|
9 | # and then lfd |
---|
10 | # |
---|
11 | # Each block list must be listed on per line: as NAME|INTERVAL|MAX|URL |
---|
12 | # NAME : List name with all uppercase alphabetic characters with no |
---|
13 | # spaces and a maximum of 9 characters - this will be used as the |
---|
14 | # iptables chain name |
---|
15 | # INTERVAL: Refresh interval to download the list, must be a minimum of 3600 |
---|
16 | # seconds (an hour), but 86400 (a day) should be more than enough |
---|
17 | # MAX : This is the maximum number of IP addresses to use from the list, |
---|
18 | # a value of 0 means all IPs |
---|
19 | # URL : The URL to download the list from |
---|
20 | # |
---|
21 | # Note: Some of thsese lists are very long (thousands of IP addresses) and |
---|
22 | # could cause serious network and/or performance issues, so setting a value for |
---|
23 | # the MAX field should be considered |
---|
24 | # |
---|
25 | # After making any changes to this file you must restart csf and then lfd |
---|
26 | # |
---|
27 | # If you want to redownload a blocklist you must first delete |
---|
28 | # /etc/csf/csf.block.NAME and then restart csf and then lfd |
---|
29 | # |
---|
30 | # Each URL is scanned for an IPv4/CIDR address per line and if found is blocked |
---|
31 | |
---|
32 | # Spamhaus Don't Route Or Peer List (DROP) |
---|
33 | # Details: http://www.spamhaus.org/drop/ |
---|
34 | SPAMDROP|86400|0|http://www.spamhaus.org/drop/drop.lasso |
---|
35 | |
---|
36 | # Spamhaus Extended DROP List (EDROP) |
---|
37 | # Details: http://www.spamhaus.org/drop/ |
---|
38 | SPAMEDROP|86400|0|http://www.spamhaus.org/drop/edrop.lasso |
---|
39 | |
---|
40 | # DShield.org Recommended Block List |
---|
41 | # Details: http://dshield.org |
---|
42 | DSHIELD|86400|0|http://feeds.dshield.org/block.txt |
---|
43 | |
---|
44 | # TOR Exit Nodes |
---|
45 | # Details: https://trac.torproject.org/projects/tor/wiki/doc/TorDNSExitList |
---|
46 | #TOR|86400|0|http://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=1.1.1.1 |
---|
47 | |
---|
48 | # BOGON list |
---|
49 | # Details: http://www.team-cymru.org/Services/Bogons/ |
---|
50 | BOGON|86400|0|http://www.cymru.com/Documents/bogon-bn-agg.txt |
---|
51 | |
---|
52 | # Project Honey Pot Directory of Dictionary Attacker IPs |
---|
53 | # Details: http://www.projecthoneypot.org |
---|
54 | HONEYPOT|86400|0|http://www.projecthoneypot.org/list_of_ips.php?t=d&rss=1 |
---|
55 | |
---|
56 | # C.I. Army Malicious IP List |
---|
57 | # Details: http://www.ciarmy.com |
---|
58 | #CIARMY|86400|0|http://www.ciarmy.com/list/ci-badguys.txt |
---|
59 | |
---|
60 | # BruteForceBlocker IP List |
---|
61 | # Details: http://danger.rulez.sk/index.php/bruteforceblocker/ |
---|
62 | BFB|86400|0|http://danger.rulez.sk/projects/bruteforceblocker/blist.php |
---|
63 | |
---|
64 | # Emerging Threats - Russian Business Networks List |
---|
65 | # Details: http://doc.emergingthreats.net/bin/view/Main/RussianBusinessNetwork |
---|
66 | #RBN|86400|0|http://rules.emergingthreats.net/blockrules/rbn-ips.txt |
---|
67 | |
---|
68 | # OpenBL.org 30 day List |
---|
69 | # Details: http://www.openbl.org |
---|
70 | OPENBL|86400|0|http://www.us.openbl.org/lists/base_30days.txt |
---|
71 | |
---|
72 | # Autoshun Shun List |
---|
73 | # Details: http://www.autoshun.org/ |
---|
74 | AUTOSHUN|86400|0|http://www.autoshun.org/files/shunlist.csv |
---|
75 | |
---|
76 | # MaxMind GeoIP Anonymous Proxies |
---|
77 | # Details: https://www.maxmind.com/en/anonymous_proxies |
---|
78 | #MAXMIND|86400|0|https://www.maxmind.com/en/anonymous_proxies |
---|