The Ultimate Hosts Blacklist (UHB) is undoubtedly one of the world's largest curated and unified hosts file to protect your network, computer, device, children, or family against over several hundred thousand malicious actors.
All oue information is gathered from multiple sources, tested regularly and merged into one massive file which is updated daily. Our hosts can be used on almost all operating system but we also propose 2 DNS servers that ingest and block the bad actor as good - if not better - than a hosts file.
Updated | Daily ✔️ |
---|---|
Fueled By |
-
Version: V2.1046.2022.11.21
-
Total Bad domains in
hosts
file: 636,196 -
Total Bad IP in
hosts.deny
file: 140,481 -
Total Bad domains and IP in
superhosts.deny
file: 776,677❗ Yes you did indeed read those numbers correctly ❗
Because we work from so many places within our GitHub organization, please use this table to learn about where to discuss or report something.
Action | Type | Link Platform | Link |
---|---|---|---|
Question | general | GitHub | 🔗 |
Discussion | general | GitHub | 🔗 |
Issue | general | GitHub | 🔗 |
Question | infrastructure | GitHub | 🔗 |
Discussion | infrastructure | GitHub | 🔗 |
Issue | infrastructure | GitHub | 🔗 |
Add | list | GitHub | 🔗 |
Remove | list | GitHub | 🔗 |
Add | domain | GitHub | 🔗 |
Remove | domain | GitHub | 🔗 |
Add | IP | GitHub | 🔗 |
Remove | IP | GitHub | 🔗 |
For everything that is not listed above, please submit an issue here.
Times are in UTC (Every day) | Start | End |
---|---|---|
Central Repository (GitHub) | ≈ 19:05 | ≈ 19:15 |
API / Search engine | 19:05 | ≈ 19:20 |
Official Mirror (hosts.ubuntu101.co.za) | 19:30 | ≈ 19:35 |
DNS Server (#590) | 19:30 | ≈ 19:40 |
If all our files are too large for your device to ingest or if you don't want
to think about updating the hosts
file every night, you can use
our DNS servers.
They are not logging anything and are available round the clock.
From time to time we may need to process some maintenance that requires a downtime of less than 120 seconds.
We will never put downtime on both servers at the same time. But, if you want to get informed about when downtime is scheduled, please follow/subscribe to the Maintenance Thread.
NOTICE: THIS IS THE RECOMMENDED METHOD FOR WINDOWS USER.
DNS Name | safedns.allover.co.za | safedns2.allover.co.za |
---|---|---|
IPv4 | 88.198.70.38 |
88.198.70.39 |
IPv6 | 2a01:4f8:140:5021::38 |
2a01:4f8:140:5021::39 |
The links below will direct you to the raw unzipped versions of the hosts files in this repo. (Files are updated daily)
File Name | Operating System | Format | Official Mirror |
---|---|---|---|
hosts | Unix/Linux | UNIX | Download |
hosts | Windows | CRLF/DOS | Download |
hosts.deny | Unix/Linux | UNIX | Download |
superhosts.deny | Unix/Linux | UNIX | Download |
domains.list | Any / Pi-Hole | UNIX | Download |
domains-dotted-format.list | DnsMasq | UNIX | Download |
ips.list | Any / Pi-Hole | UNIX | Download |
A hosts file, named hosts
(with no file extension), is a plain-text file used
by all operating systems to map a hostname to IP addresses.
In most operating systems, the hosts
file is preferential to DNS
.
Therefore if a domain name is resolved by the hosts
file,
the request never leaves your computer.
Having a smart hosts
file goes a long way towards blocking malware, adware,
ransomware, porn and other nuisance domains.
A hosts
file like this causes any lookups to any of the listed domains to
resolve back to your localhost so it prevents any outgoing connections to the
listed domains.
For example, to drop all requests to certain domains or servers, adding lines
to your hosts
file as below will achieve this for you.
You can create your custom hosts or simply use ours which covers you for
well over 636,196 bad domains.
# Block Bad Domains and Servers with Hosts File
0.0.0.0 doubleclick.net
0.0.0.0 18chinese.com
0.0.0.0 gatekeeper.tss.net
0.0.0.0 www.gatekeeper.tss.net
0.0.0.0 cdn.gatekeeper.tss.net
0.0.0.0 youporn.com
0.0.0.0 www.youporn.com
0.0.0.0 x-lime.net
0.0.0.0 www.x-lime.net
# etc ... etc .... etc ...
It is important to note that a hosts
file cannot understand wild card domains.
So adding 0.0.0.0 *.doubleclick.net
will not work. You must specify every
variation of a domain name that is in use and up to no good.
Lucky for you our massive hosts
file compiled from over
several input sources already does this for you. So it is as simple as
downloading our hosts
file and keeping it up to date as we update the hosts
file several times a week as new threats emerge.
Most host files traditionally use 127.0.0.1
as the loopback address,
to establish an IP connection to the local machine.
I prefer the use of 0.0.0.0
, which is defined as a non-routable meta-address.
Using 0.0.0.0
is also faster because there's no wait for a timeout resolution.
It also does not interfere with any web servers that may be running on the
local system.
For many Windows versions however, 127.0.0.1
does appear to work slightly
better and which is why our Windows version of the hosts
file uses
127.0.0.1
as the loopback address.
A hosts
file, named hosts.deny
is a plain-text file for Linux/Unix based
operating systems only which blocks a list of IP addresses on the outside of
your network from gaining any access to your computer.
A hosts.deny
file will not work on a Windows operating system.
The superhosts.deny
file is simply named superhosts.deny
but is just a
normal hosts.deny
file which is a plain-text file for Linux/Unix based
operating systems that blocks a list of IP addresses or hosts (domains) on the
outside of your network from gaining any access to your computer.
If you want to use this superhosts.deny
file simply rename it to
hosts.deny
and place it in your /etc/
folder on your Linux/Unix
operating system.
A hosts.deny
file will not work on a Windows operating system.
To modify your current hosts
file, look for it in the following places
and modify it with a text editor.
PLEASE NOTE: On all operating systems you need administrative access to
modify the hosts
file.
Linux, Mac OS X, iOS, Android: /etc/hosts
Linux, Mac OS X, iOS, Android: /etc/hosts.deny
Windows Systems (NOT RECOMMENDED: PREFER DNS SERVER): %SystemRoot%\system32\drivers\etc\hosts
Try the Windows Installer Batch Script
Our hosts
file is generated from multiple input sources, collated, sorted for
duplicates and merged into one single hosts file.
The sources of the input data information are as follows.
Downstream Name | Downstream Link | Upstream Link |
---|---|---|
2o7.net | Link | Link |
adblock-nocoin-list | Link | Link |
Add_Risk | Link | Link |
Add_Spam | Link | Link |
Ads_Disconnect.me | Link | Link |
antipopads | Link | Link |
anudeepND_blacklist_ad_server | Link | Link |
Bad_JAV_Sites | Link | Link |
BaddBoyzHosts | Link | Link |
BadIPs.com_KEY | Link | Link |
BadIPs.com_Level_3 | Link | Link |
BadIPs.com_Level_4 | Link | Link |
BadIPs.com_Level_5 | Link | Link |
blacklist | Link | Link |
cameleon_at_sysctl.org | Link | Link |
Cyveillance_Blocks | Link | Link |
firehol_level1 | Link | Link |
hostsVN | Link | Link |
justdomains_mirror1.malwaredomains.com | Link | Link |
KADhosts_azet12 | Link | Link |
lightswitch05_hosts_ads-and-tracking-extended | Link | Link |
malc0de.com | Link | Link |
MalwareDomainList.com | Link | Link |
Michael_Trimms_Hosts | Link | Link |
MinimalHostsBlocker | Link | Link |
Mitchell_Krog_Snooping_IPS | Link | Link |
Phishing.Database | Link | Link |
pl-host-file | Link | Link |
quidsup_malicious-sites | Link | Link |
quidsup_notrack_trackers | Link | Link |
smed79_blacklist | Link | Link |
Spam404 | Link | Link |
SSH_attackers_probers | Link | Link |
Suspicious.Snooping.Sniffing.Hacking.IP.Addresses | Link | Link |
The-Big-List-of-Hacked-Malware-Web-Sites | Link | Link |
Top-Attacking-IP-Addresses-Against-Wordpress-Sites | Link | Link |
WaLLy3K_Blacklist | Link | Link |
Wiggum27_Blockers | Link | Link |
www.blocklist.de | Link | Link |
YousList | Link | Link |
yoyo.org_domains | Link | Link |
yoyo.org_ips | Link | Link |
ZeroDot1_CoinBlockerLists | Link | Link |
ZeroDot1_CoinBlockerLists_browser | Link | Link |
- UHBW - Ultimate Hosts Blacklist Whitelist
- A - global - whitelisting tool (not limited to our infrastructure).
- UHBIRU - Ultimate Hosts Blacklist Test Launcher
- The tool to update/test our input source repositories.
- UHBCRU - Ultimate Hosts Blacklist Central Repo Updater
- The tool to update this repository.
- PyFunceble
- The tool to check the availability or syntax of domain, IP or URL.
- Dead-Hosts
- NGINX Ultimate Bad Blocker
- Apache Ultimate Bad Bot Blocker
- Fail2Ban Blacklist JAIL for Repeat Offenders
- Phishing Database
- Stop Google Analytics Ghost Spam HOWTO
Come drop by and visit Mitchell's Portfolio.
MIT License
Copyright (c) 2017, 2018, 2019, 2020, 2021, 2022 Ultimate Hosts Blacklist - @Ultimate-Hosts-Blacklist
Copyright (c) 2017, 2018, 2019, 2020, 2021, 2022 Mitchell Krog - @mitchellkrogza
Copyright (c) 2017, 2018, 2019, 2020, 2021, 2022 Nissar Chababy - @funilrys
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.