Skip to content

Latest commit

 

History

History
354 lines (264 loc) · 24.2 KB

README.md

File metadata and controls

354 lines (264 loc) · 24.2 KB

The Ultimate Hosts Blacklist - Largest Unified Hosts File in the Universe

Ultimate Hosts Blacklist

The Ultimate Hosts Blacklist (UHB) is undoubtedly one of the world's largest curated and unified hosts file to protect your network, computer, device, children, or family against over several hundred thousand malicious actors.

All oue information is gathered from multiple sources, tested regularly and merged into one massive file which is updated daily. Our hosts can be used on almost all operating system but we also propose 2 DNS servers that ingest and block the bad actor as good - if not better - than a hosts file.


Updated Daily ✔️
Fueled By Hosts File - Ultimate Hosts Blacklist

  • Version: V2.358.2021.12.21

  • Total Bad domains in hosts file: 585,192

  • Total Bad IP in hosts.deny file: 140,657

  • Total Bad domains and IP in superhosts.deny file: 725,849

    Yes you did indeed read those numbers correctly


WHERE TO REPORT OR DISCUSS ABOUT SOMETHING ?

Because we work from so many places within our GitHub organization, please use this table to learn about where to discuss or report something.

Action Type Link Platform Link
Question general GitHub 🔗
Discussion general GitHub 🔗
Issue general GitHub 🔗
Question infrastructure GitHub 🔗
Discussion infrastructure GitHub 🔗
Issue infrastructure GitHub 🔗
Add list GitHub 🔗
Remove list GitHub 🔗
Add domain GitHub 🔗
Remove domain GitHub 🔗
Add IP GitHub 🔗
Remove IP GitHub 🔗

For everything that is not listed above, please submit an issue here.


WHEN IS THE LIST UPDATED ?

Times are in UTC (Every day) Start End
Central Repository (GitHub) ≈ 19:05 ≈ 19:15
API / Search engine 19:05 ≈ 19:20
Official Mirror (hosts.ubuntu101.co.za) 19:30 ≈ 19:35
DNS Server (#590) 19:30 ≈ 19:40

DNS SERVER

If all our files are too large for your device to ingest or if you don't want to think about updating the hosts file every night, you can use our DNS servers.

They are not logging anything and are available round the clock.

From time to time we may need to process some maintenance that requires a downtime of less than 120 seconds.

We will never put downtime on both servers at the same time. But, if you want to get informed about when downtime is scheduled, please follow/subscribe to the Maintenance Thread.

NOTICE: THIS IS THE RECOMMENDED METHOD FOR WINDOWS USER.

DNS Name safedns.allover.co.za safedns2.allover.co.za
IPv4 88.198.70.38 88.198.70.39
IPv6 2a01:4f8:140:5021::38 2a01:4f8:140:5021::39

RAW FILE SOURCES

The links below will direct you to the raw unzipped versions of the hosts files in this repo. (Files are updated daily)

File Name Operating System Format Official Mirror
hosts Unix/Linux UNIX Download
hosts Windows CRLF/DOS Download
hosts.deny Unix/Linux UNIX Download
superhosts.deny Unix/Linux UNIX Download
domains.list Any / Pi-Hole UNIX Download
domains-dotted-format.list DnsMasq UNIX Download
ips.list Any / Pi-Hole UNIX Download

INSTALLERS, UPDATERS AND UNINSTALLER SCRIPTS

⚠️⚠️ WE DO NOT RECOMMEND THE USAGE OF THE HOSTS FILE INSIDE A WINDOWS MACHINE! ⚠️⚠️

⚠️⚠️ WINDOWS USER ARE RECOMMENDED TO USE THE DNS SERVER INSTEAD ⚠️⚠️

Linux Windows
hosts Installer hosts Installer
hosts UnInstaller hosts Updater
hosts Updater hosts UnInstaller
hosts.deny Installer
hosts.deny UnInstaller
hosts.deny Updater
superhosts.deny Installer
superhosts.deny UnInstaller
superhosts.deny Updater

WHAT IS A HOSTS FILE?

A hosts file, named hosts (with no file extension), is a plain-text file used by all operating systems to map a hostname to IP addresses.

In most operating systems, the hosts file is preferential to DNS. Therefore if a domain name is resolved by the hosts file, the request never leaves your computer.

Having a smart hosts file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance domains.

A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.

For example, to drop all requests to certain domains or servers, adding lines to your hosts file as below will achieve this for you. You can create your custom hosts or simply use ours which covers you for well over 585,192 bad domains.

# Block Bad Domains and Servers with Hosts File
0.0.0.0 doubleclick.net
0.0.0.0 18chinese.com
0.0.0.0 gatekeeper.tss.net
0.0.0.0 www.gatekeeper.tss.net
0.0.0.0 cdn.gatekeeper.tss.net
0.0.0.0 youporn.com
0.0.0.0 www.youporn.com
0.0.0.0 x-lime.net
0.0.0.0 www.x-lime.net
# etc ... etc .... etc ...

It is important to note that a hosts file cannot understand wild card domains. So adding 0.0.0.0 *.doubleclick.net will not work. You must specify every variation of a domain name that is in use and up to no good.

Lucky for you our massive hosts file compiled from over several input sources already does this for you. So it is as simple as downloading our hosts file and keeping it up to date as we update the hosts file several times a week as new threats emerge.


RECOMMENDATION FOR USING 0.0.0.0 INSTEAD OF 127.0.0.1

Most host files traditionally use 127.0.0.1 as the loopback address, to establish an IP connection to the local machine.

I prefer the use of 0.0.0.0, which is defined as a non-routable meta-address. Using 0.0.0.0 is also faster because there's no wait for a timeout resolution. It also does not interfere with any web servers that may be running on the local system.

For many Windows versions however, 127.0.0.1 does appear to work slightly better and which is why our Windows version of the hosts file uses 127.0.0.1 as the loopback address.


WHAT IS A HOSTS.DENY FILE?

A hosts file, named hosts.deny is a plain-text file for Linux/Unix based operating systems only which blocks a list of IP addresses on the outside of your network from gaining any access to your computer. A hosts.deny file will not work on a Windows operating system.


WHAT IS A SUPERHOSTS.DENY FILE? I've never heard of such a thing ??

The superhosts.deny file is simply named superhosts.deny but is just a normal hosts.deny file which is a plain-text file for Linux/Unix based operating systems that blocks a list of IP addresses or hosts (domains) on the outside of your network from gaining any access to your computer. If you want to use this superhosts.deny file simply rename it to hosts.deny and place it in your /etc/ folder on your Linux/Unix operating system. A hosts.deny file will not work on a Windows operating system.


WHERE DO I PUT THIS ON MY COMPUTER?

To modify your current hosts file, look for it in the following places and modify it with a text editor.

PLEASE NOTE: On all operating systems you need administrative access to modify the hosts file.

Linux, Mac OS X, iOS, Android: /etc/hosts

Linux, Mac OS X, iOS, Android: /etc/hosts.deny

Windows Systems (NOT RECOMMENDED: PREFER DNS SERVER): %SystemRoot%\system32\drivers\etc\hosts Try the Windows Installer Batch Script



CREDITS & THANKS

Our hosts file is generated from multiple input sources, collated, sorted for duplicates and merged into one single hosts file.

The sources of the input data information are as follows.

Downstream Name Downstream Link Upstream Link
2o7.net Link Link
adblock-nocoin-list Link Link
Add_Risk Link Link
Add_Spam Link Link
Ads_Disconnect.me Link Link
antipopads Link Link
anudeepND_blacklist_ad_server Link Link
Bad_JAV_Sites Link Link
BaddBoyzHosts Link Link
BadIPs.com_KEY Link Link
BadIPs.com_Level_3 Link Link
BadIPs.com_Level_4 Link Link
BadIPs.com_Level_5 Link Link
blacklist Link Link
cameleon_at_sysctl.org Link Link
Cyveillance_Blocks Link Link
firehol_level1 Link Link
hostsVN Link Link
justdomains_mirror1.malwaredomains.com Link Link
KADhosts_azet12 Link Link
lightswitch05_hosts_ads-and-tracking-extended Link Link
malc0de.com Link Link
MalwareDomainList.com Link Link
Michael_Trimms_Hosts Link Link
MinimalHostsBlocker Link Link
Mitchell_Krog_Snooping_IPS Link Link
Phishing.Database Link Link
pl-host-file Link Link
quidsup_malicious-sites Link Link
quidsup_notrack_trackers Link Link
smed79_blacklist Link Link
Spam404 Link Link
SSH_attackers_probers Link Link
Suspicious.Snooping.Sniffing.Hacking.IP.Addresses Link Link
The-Big-List-of-Hacked-Malware-Web-Sites Link Link
Top-Attacking-IP-Addresses-Against-Wordpress-Sites Link Link
WaLLy3K_Blacklist Link Link
www.blocklist.de Link Link
YousList Link Link
yoyo.org_domains Link Link
yoyo.org_ips Link Link
ZeroDot1_CoinBlockerLists Link Link
ZeroDot1_CoinBlockerLists_browser Link Link

AWESOME TOOLS WE WROTE

AWESOME TOOLS WE USE

  • PyFunceble
    • The tool to check the availability or syntax of domain, IP or URL.

SOME OTHER AWESOME TOOLS/PROJECTS


SUPPORT THIS PROJECT AND ITS INFRASTRUCTURE

💖 Buy Mitchell a Coffee 👇

Buy Mitchell some Coffee

💖 Support Nissar 👇

Buy Nissar some Coffee

❤️ Sponsor Nissar on GitHub


Into Photography?

Come drop by and visit Mitchell's Portfolio.


License

MIT License

Copyright (c) 2017, 2018, 2019, 2020, 2021 Ultimate Hosts Blacklist - @Ultimate-Hosts-Blacklist
Copyright (c) 2017, 2018, 2019, 2020, 2021 Mitchell Krog - @mitchellkrogza
Copyright (c) 2017, 2018, 2019, 2020, 2021 Nissar Chababy - @funilrys

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.