Updated | Fueled By |
---|---|
Daily ✔️ | |
The Ultimate Hosts Blacklist is undoubtedly one of the world's largest curated Unified Hosts file for protecting your computer or device against over several hundred thousand bad web sites. Use this Hosts File to protect your network, your children and your family from gaining access to millions of bad web sites. Protect your wifi network, computers and smartphone devices from being infected with Malware or Ransomware.
Our hosts file is for use on any operating system to block bad domains out of your servers or devices. Information is gathered from multiple sources, tested regularly and merged into one massive hosts file and updated daily.
-
Version: V1.2195.2020.12.12
-
Total Bad Hosts in hosts file: 322,466
-
Total Bad IP's in hosts.deny file: 140,162
-
Total Bad Hosts and IP's in superhosts.deny file: 462,628
❗ Yes you did indeed read those numbers correctly ❗
Click the link below to see all the sources used as input data to create this hosts list.
Are our files too large for your machine or you can't touch your hosts file ? Use our DNS servers.
NOTICE: THIS IS THE RECOMMENDED METHOD FOR WINDOWS USER.
DNS Name | safedns.allover.co.za | safedns2.allover.co.za |
---|---|---|
IPv4 | 88.198.70.38 |
88.198.70.39 |
IPv6 | 2a01:4f8:140:5021::38 |
2a01:4f8:140:5021::39 |
The links below will direct you to the raw unzipped versions of the hosts files in this repo. (Files are updated daily)
File Name | Operating System | Format | Download Link |
---|---|---|---|
hosts | Unix/Linux | UNIX | Download |
hosts | Windows | CRLF/DOS | Download |
hosts.deny | Unix/Linux | UNIX | Download |
superhosts.deny | Unix/Linux | UNIX | Download |
domains.list | Any / Pi-Hole | UNIX | Download |
domains-dotted-format.list | DnsMasq | UNIX | Download |
ips.list | Any / Pi-Hole | UNIX | Download |
A hosts file, named hosts
(with no file extension), is a plain-text file used by all operating systems to map hostnames to IP addresses.
In most operating systems, the hosts
file is preferential to DNS
. Therefore if a domain name is resolved by the hosts
file, the request never leaves your computer.
Having a smart hosts
file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance web sites.
A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.
For example, to drop all requests to certain domains or servers, adding lines to your hosts file as below will achieve this for you. You can create your own custom hosts or simply use ours which covers you for well over 1 million bad domains and web sites out there.
# Block Bad Domains and Servers with Hosts File
0.0.0.0 doubleclick.net
0.0.0.0 18chinese.com
0.0.0.0 gatekeeper.tss.net
0.0.0.0 www.gatekeeper.tss.net
0.0.0.0 cdn.gatekeeper.tss.net
0.0.0.0 youporn.com
0.0.0.0 www.youporn.com
0.0.0.0 x-lime.net
0.0.0.0 www.x-lime.net
# etc ... etc .... etc ...
It is important to note that a hosts
file cannot understand wild card domains. So adding 0.0.0.0 *.doubleclick.net
will not work. You must specify each and every variation of a domain name that is in use and up to no good.
Lucky for you our massive hosts file compiled from over 25 independent data input sources already does this for you. So it is as simple as downloading our hosts
file and keeping it up to date as we update the hosts file several times a week as new threats emerg.
Most host files traditionally use 127.0.0.1
as the loopback address, to establish an IP connection to the local machine.
I prefer the use of 0.0.0.0
, which is defined as a non-routable meta-address. Using 0.0.0.0
is also faster because there's no wait for a timeout resolution. It also does not interfere with any web servers that may be running on the local system.
For many windows operating systems however 127.0.0.1
does appear to work slightly better and which is why our Windows version of the hosts file uses 127.0.0.1
as the loopback address.
A hosts file, named hosts.deny
is a plain-text file for Linux/Unix based operating systems only which blocks a list of IP addresses on the outside of your network from gaining any access to your computer. A hosts.deny
file will not work on a Windows operating system.
The superhosts.deny file is simply named superhosts.deny
but is actually just a normal hosts.deny
file which is a plain-text file for Linux/Unix based operating systems which blocks a list of IP addresses or hosts (domains) on the outside of your network from gaining any access to your computer. If you want to use this superhosts.deny
file simply rename it to hosts.deny
and place it in your /etc/
folder on your Linux/Unix operating system. A hosts.deny
file will not work on a Windows operating system.
To modify your current hosts
file, look for it in the following places and modify it with a text editor.
PLEASE NOTE: On all operating systems you need administrative access to modify the hosts file. You can Google on how to do this for your particular operating system.
Linux, Mac OS X, iOS, Android: /etc/hosts
Linux, Mac OS X, iOS, Android: /etc/hosts.deny
Windows Systems: %SystemRoot%\system32\drivers\etc\hosts
Try the Windows Installer Batch Script
Times are in UTC (Every day) | Start | End |
---|---|---|
Central Repository (GitHub) | ≈ 19:05 | ≈ 19:15 |
API / Search engine | 19:05 | ≈ 19:20 |
Central Mirror (hosts.ubuntu101.co.za) | 19:20 | ≈ 19:25 |
DNS Server (#590) | 19:20 | ≈ 19:30 |
if you want to add an entry to our infrastructure.
if you disagree with anything in our distributed content.
if you want to discuss anything in our infrastructure
This hosts files is generated from multiple input sources, collated, sorted for duplicates and merged into one single hosts file.
The sources of the input data information are as follows.
- 2o7.net
- Adblock No-Coin List
- Add_Risk
- Add_Spam
- Ads_Disconnect.me
- Airelle's Anti-Sex Hosts
- Anti-PopAds
- AnudeepND's blacklist (ad servers)
- Bad JAV Sites
- Badd Boyz Hosts
- BadIPS.com
- Barbock filter list
- Blocklist.de
- Cameleon
- CHEF-KOCH's Spotify-Ad-free
- DShield.org Suspicious Domain List (High)
- DShield.org Suspicious Domain List (Low)
- DShield.org Suspicious Domain List (Medium)
- Firehol
- Global Advert Servers Blocklist - Personal Edition
- hpHosts - GRM only
- Hosts ADBlock
- JustDomains
- KADHosts
- lightswitch05 (Daniel)'s hosts
- malc0de
- Malware Domain List
- Michael Trimm's Hosts
- MoaAB adblock.makala.is
- Phishing.Database
- pl-host file
- Quidsup NoTrack Malware
- Quidsup NoTrack
- Reddestdream's Minimal Hosts
- Ransomware Tracker Domain Blocklist
- ShallaList
- SMed79 - Various Lists
- somewhocares.org
- Spam404
- Suspicious.Snooping.Sniffing.Hacking.IP.Addresses
- The Big List of Hacked Malware Web Sites
- Top Attacking Wordpress IP's
- uBlock Filters Plus
- WaLLy3K_Blacklist
- YousList
- YoYo.org
- ZeroDot1 - CoinBlocker Lists
- ZeroDot1 - CoinBlocker Lists (Browser)
- ZeroDot1 - CoinBlocker Lists (Optional)
- ZeusTracker
- UHBW - Ultimate Hosts Blacklist Whitelist
- A - global - whitelisting tool (not limited to our infrastructure).
- UHBIRU - Ultimate Hosts Blacklist Input Repo Updater
- The tool to update/test our input source repositories.
- UHBCRU - Ultimate Hosts Blacklist Central Repo Updater
- The tool to update this repository.
- UHBC - Ultimate Hosts Blacklist Comparison
- The comparison tool of the Ultimate Hosts Blacklist project.
- PyFunceble
- The tool to check the availability or syntax of domain, IP or URL.
- Dead-Hosts
- NGINX Ultimate Bad Blocker
- Apache Ultimate Bad Bot Blocker
- Fail2Ban Blacklist JAIL for Repeat Offenders
- Phishing Database
- Stop Google Analytics Ghost Spam HOWTO
Come drop by and visit Mitchell's Portfolio.
MIT License
Copyright (c) 2020 Ultimate Hosts Blacklist - @Ultimate-Hosts-Blacklist
Copyright (c) 2017, 2018, 2019, 2020 Mitchell Krog - @mitchellkrogza
Copyright (c) 2017, 2018, 2019, 2020 Nissar Chababy - @funilrys
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.