The Ultimate hosts file for protecting your computer or device against over several hundred thousand bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
A hosts file for use on any operating system to block bad domains out of your servers or devices. Information gathered from multiple sources and merged into one massive hosts file and updated every day.
-
Version: V1.1428.2019.01.26
-
Total Bad Hosts in hosts file: 1,354,879
-
Total Bad IP's in hosts.deny file: 253,106
-
Total Bad Hosts and IP's in superhosts.deny file: 1,607,985
âť— Yes you did indeed read those numbers correctly âť—
Click the link below to see all the sources used as input data to create this hosts list.
The links below will direct you to the raw unzipped versions of the hosts files in this repo. (Files are updated daily)
File Name | Operating System | Format | Download Link |
---|---|---|---|
hosts | Unix/Linux | UNIX | Download |
hosts | Windows | CRLF/DOS | Download |
hosts.deny | Unix/Linux | UNIX | Download |
superhosts.deny | Unix/Linux | UNIX | Download |
domains.list | Any / Pi-Hole | UNIX | Download |
domains-dotted-format.list | DnsMasq | UNIX | Download |
ips.list | Any / Pi-Hole | UNIX | Download |
| [superhosts.deny Updater](https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist/blob/master/Installer-Linux/linux-superhosts.deny-updater.sh)
A hosts file, named hosts
(with no file extension), is a plain-text file used by all operating systems to map hostnames to IP addresses.
In most operating systems, the hosts
file is preferential to DNS
. Therefore if a domain name is resolved by the hosts
file, the request never leaves your computer.
Having a smart hosts
file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance web sites.
A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.
For example, to drop all requests to certain domains or servers, adding lines to your hosts file as below will achieve this for you. You can create your own custom hosts or simply use ours which covers you for well over 1 million bad domains and web sites out there.
# Block Bad Domains and Servers with Hosts File
0.0.0.0 doubleclick.net
0.0.0.0 18chinese.com
0.0.0.0 gatekeeper.tss.net
0.0.0.0 www.gatekeeper.tss.net
0.0.0.0 cdn.gatekeeper.tss.net
0.0.0.0 youporn.com
0.0.0.0 www.youporn.com
0.0.0.0 x-lime.net
0.0.0.0 www.x-lime.net
# etc ... etc .... etc ...
It is important to note that a hosts
file cannot understand wild card domains. So adding 0.0.0.0 *.doubleclick.net
will not work. You must specify each and every variation of a domain name that is in use and up to no good.
Lucky for you our massive hosts file compiled from over 25 independent data input sources already does this for you. So it is as simple as downloading our hosts
file and keeping it up to date as we update the hosts file several times a week as new threats emerg.
Most host files traditionally use 127.0.0.1 as the loopback address, to establish an IP connection to the local machine.
I prefer the use of 0.0.0.0, which is defined as a non-routable meta-address. Using 0.0.0.0 is also faster because there's no wait for a timeout resolution. It also does not interfere with any web servers that may be running on the local system.
For many windows operating systems however 127.0.0.1 does appear to work slightly better and which is why our Windows version of the hosts file uses 127.0.0.1 as the loopback address.
A hosts file, named hosts.deny
is a plain-text file for Linux/Unix based operating systems only which blocks a list of IP addresses on the outside of your network from gaining any access to your computer. A hosts.deny
file will not work on a Windows operating system.
The superhosts.deny file is simply named superhosts.deny
but is actually just a normal hosts.deny
file which is a plain-text file for Linux/Unix based operating systems which blocks a list of IP addresses or hosts (domains) on the outside of your network from gaining any access to your computer. If you want to user this superhosts.deny
file simply rename it to hosts.deny
and place it in your /etc/
folder on your Linux/Unix operating system. A hosts.deny
file will not work on a Windows operating system.
To modify your current hosts
file, look for it in the following places and modify it with a text editor.
PLEASE NOTE: On all operating systems you need administrative access to modify the hosts file. You can Google on how to do this for your particular operating system.
Linux, Mac OS X, iOS, Android: /etc/hosts
Linux, Mac OS X, iOS, Android: /etc/hosts.deny
Windows Systems: %SystemRoot%\system32\drivers\etc\hosts
Try the Windows Installer Batch Script
To keep this Github repo small, all files are provided in a zip only format. Some people however require their Pi-Holes or other systems to automatically download a raw file once a week or so as an update. For your convenience you can download these raw files at the following links. These links below will always contain the latest updated version of these files. (Files are updated daily)
File Name | Operating System | Format | Download Link |
---|---|---|---|
hosts | Unix/Linux | UNIX | Download |
hosts | Windows | CRLF/DOS | Download |
hosts.deny | Unix/Linux | UNIX | Download |
superhosts.deny | Unix/Linux | UNIX | Download |
domains.list | Any / Pi-Hole | UNIX | Download |
domains-dotted-format.list | DnsMasq | UNIX | Download |
ips.list | Any / Pi-Hole | UNIX | Download |
| [superhosts.deny Updater](https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist/blob/master/Installer-Linux/linux-superhosts.deny-updater.sh)
if you disagree with anything on this list or want to add any other bad web sites to the list.
This hosts files is generated from multiple input sources, collated, sorted for duplicates and merged into one single hosts file.
The sources of the input data information are as follows.
- 2o7.net
- Adblock No-Coin List
- Add_Risk
- Add_Spam
- Ads_Disconnect.me
- Airelle's Anti-Sex Hosts
- Anti-PopAds
- AnudeepND's blacklist (ad servers)
- Bad JAV Sites
- Badd Boyz Hosts
- BadIPS.com
- Barbock filter list
- Blocklist.de
- Cameleon
- DShield.org Suspicious Domain List (High)
- DShield.org Suspicious Domain List (Low)
- DShield.org Suspicious Domain List (Medium)
- Firehol
- Global Advert Servers Blocklist - Personal Edition
- hpHosts - GRM only
- Hosts ADBlock
- JustDomains
- KADHosts
- malc0de
- Malware Domain List
- Michael Trimm's Hosts
- MoaAB adblock.makala.is
- Phishing.Database
- pl-host file
- Quidsup NoTrack Malware
- Quidsup NoTrack
- Reddestdream's Minimal Hosts
- Ransomware Tracker Domain Blocklist
- ShallaList
- SMed79 - Various Lists
- somewhocares.org
- Spam404
- Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
- The Big List of Hacked Malware Web Sites
- Top Attacking Wordpress IP's
- uBlock Filters Plus
- WaLLy3K_Blacklist
- YousList
- YoYo.org
- ZeroDot1 - CoinBlocker Lists
- ZeroDot1 - CoinBlocker Lists (Browser)
- ZeroDot1 - CoinBlocker Lists (Optional)
- ZeusTracker
- https://github.com/dead-hosts
- https://github.com/funilrys/funceble
- https://github.com/funilrys/PyFunceble
- https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker
- https://github.com/mitchellkrogza/Badd-Boyz-Hosts
- https://github.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning
- https://github.com/mitchellkrogza/fail2ban-useful-scripts
- https://github.com/mitchellkrogza/linux-server-administration-scripts
- https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
- https://github.com/mitchellkrogza/Stop.Google.Analytics.Ghost.Spam.HOWTO
- https://github.com/mitchellkrogza/Travis-CI-for-Apache-For-Testing-Apache-and-PHP-Configurations
- https://github.com/mitchellkrogza/Travis-CI-Nginx-for-Testing-Nginx-Configuration
Come drop by and visit me at https://mitchellkrog.com
Copyright (c) 2017, 2018 Mitchell Krog - mitchellkrog@gmail.com
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.