Home

Awesome

The Ultimate Hosts Blacklist - Largest Unified Hosts File in the Universe

Ultimate Hosts Blacklist

The Ultimate Hosts Blacklist (UHB) is undoubtedly one of the world's largest curated and unified hosts file to protect your network, computer, device, children, or family against over several hundred thousand malicious actors.

All our information is gathered from multiple sources, tested regularly and merged into one massive file which is updated daily. Our hosts can be used on almost all operating system but we also propose 2 DNS servers that ingest and block the bad actor as good - if not better - than a hosts file.


UpdatedDaily :heavy_check_mark:
Fueled ByHosts File - Ultimate Hosts Blacklist


WHERE TO REPORT OR DISCUSS ABOUT SOMETHING ?

Because we work from so many places within our GitHub organization, please use this table to learn about where to discuss or report something.

ActionTypeLink PlatformLink
QuestiongeneralGitHub:link:
DiscussiongeneralGitHub:link:
IssuegeneralGitHub:link:
QuestioninfrastructureGitHub:link:
DiscussioninfrastructureGitHub:link:
IssueinfrastructureGitHub:link:
AddlistGitHub:link:
RemovelistGitHub:link:
AdddomainGitHub:link:
RemovedomainGitHub:link:
AddIPGitHub:link:
RemoveIPGitHub:link:

For everything that is not listed above, please submit an issue here.


WHEN IS THE LIST UPDATED ?

Times are in UTC (Every day)StartEnd
Central Repository (GitHub)≈ 19:05≈ 19:15
API / Search engine19:05≈ 19:20
Official Mirror (hosts.ubuntu101.co.za)19:30≈ 19:35
DNS Server (#590)19:30≈ 19:40

DNS SERVER

If all our files are too large for your device to ingest or if you don't want to think about updating the hosts file every night, you can use our DNS servers.

They are not logging anything and are available round the clock.

From time to time we may need to process some maintenance that requires a downtime of less than 120 seconds.

We will never put downtime on both servers at the same time. But, if you want to get informed about when downtime is scheduled, please follow/subscribe to the Maintenance Thread.

NOTICE: THIS IS THE RECOMMENDED METHOD FOR WINDOWS USER.

DNS Namesafedns.allover.co.zasafedns2.allover.co.zaPorts
IPv488.198.70.3888.198.70.3953, 5353
IPv62a01:4f8:140:5021::382a01:4f8:140:5021::3953, 5353

RAW FILE SOURCES

The links below will direct you to the raw unzipped versions of the hosts files in this repo. (Files are updated daily)

File NameOperating SystemFormatOfficial Mirror
hostsUnix/LinuxUNIXDownload
hostsWindowsCRLF/DOSDownload
hosts.denyUnix/LinuxUNIXDownload
superhosts.denyUnix/LinuxUNIXDownload
domains.listAny / Pi-HoleUNIXDownload
domains-dotted-format.listDnsMasqUNIXDownload
ips.listAny / Pi-HoleUNIXDownload

INSTALLERS, UPDATERS AND UNINSTALLER SCRIPTS

:warning::warning: WE DO NOT RECOMMEND THE USAGE OF THE HOSTS FILE INSIDE A WINDOWS MACHINE! :warning::warning:

:warning::warning: WINDOWS USER ARE RECOMMENDED TO USE THE DNS SERVER INSTEAD :warning::warning:

LinuxWindows
hosts Installerhosts Installer
hosts UnInstallerhosts Updater
hosts Updaterhosts UnInstaller
hosts.deny Installer
hosts.deny UnInstaller
hosts.deny Updater
superhosts.deny Installer
superhosts.deny UnInstaller
superhosts.deny Updater

WHAT IS A HOSTS FILE?

A hosts file, named hosts (with no file extension), is a plain-text file used by all operating systems to map a hostname to IP addresses.

In most operating systems, the hosts file is preferential to DNS. Therefore if a domain name is resolved by the hosts file, the request never leaves your computer.

Having a smart hosts file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance domains.

A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.

For example, to drop all requests to certain domains or servers, adding lines to your hosts file as below will achieve this for you. You can create your custom hosts or simply use ours which covers you for well over 539,844 bad domains.

# Block Bad Domains and Servers with Hosts File
0.0.0.0 doubleclick.net
0.0.0.0 18chinese.com
0.0.0.0 gatekeeper.tss.net
0.0.0.0 www.gatekeeper.tss.net
0.0.0.0 cdn.gatekeeper.tss.net
0.0.0.0 youporn.com
0.0.0.0 www.youporn.com
0.0.0.0 x-lime.net
0.0.0.0 www.x-lime.net
# etc ... etc .... etc ...

It is important to note that a hosts file cannot understand wild card domains. So adding 0.0.0.0 *.doubleclick.net will not work. You must specify every variation of a domain name that is in use and up to no good.

Lucky for you our massive hosts file compiled from over several input sources already does this for you. So it is as simple as downloading our hosts file and keeping it up to date as we update the hosts file several times a week as new threats emerge.


RECOMMENDATION FOR USING 0.0.0.0 INSTEAD OF 127.0.0.1

Most host files traditionally use 127.0.0.1 as the loopback address, to establish an IP connection to the local machine.

I prefer the use of 0.0.0.0, which is defined as a non-routable meta-address. Using 0.0.0.0 is also faster because there's no wait for a timeout resolution. It also does not interfere with any web servers that may be running on the local system.

For many Windows versions however, 127.0.0.1 does appear to work slightly better and which is why our Windows version of the hosts file uses 127.0.0.1 as the loopback address.


WHAT IS A HOSTS.DENY FILE?

A hosts file, named hosts.deny is a plain-text file for Linux/Unix based operating systems only which blocks a list of IP addresses on the outside of your network from gaining any access to your computer. A hosts.deny file will not work on a Windows operating system.


WHAT IS A SUPERHOSTS.DENY FILE? I've never heard of such a thing ??

The superhosts.deny file is simply named superhosts.deny but is just a normal hosts.deny file which is a plain-text file for Linux/Unix based operating systems that blocks a list of IP addresses or hosts (domains) on the outside of your network from gaining any access to your computer. If you want to use this superhosts.deny file simply rename it to hosts.deny and place it in your /etc/ folder on your Linux/Unix operating system. A hosts.deny file will not work on a Windows operating system.


WHERE DO I PUT THIS ON MY COMPUTER?

To modify your current hosts file, look for it in the following places and modify it with a text editor.

PLEASE NOTE: On all operating systems you need administrative access to modify the hosts file.

Linux, Mac OS X, iOS, Android: /etc/hosts

Linux, Mac OS X, iOS, Android: /etc/hosts.deny

Windows Systems (NOT RECOMMENDED: PREFER DNS SERVER): %SystemRoot%\system32\drivers\etc\hosts Try the Windows Installer Batch Script


CREDITS & THANKS

Our hosts file is generated from multiple input sources, collated, sorted for duplicates and merged into one single hosts file.

The sources of the input data information are as follows.

Downstream NameDownstream LinkUpstream Link
2o7.netLinkLink
adblock-nocoin-listLinkLink
Add_RiskLinkLink
Add_SpamLinkLink
Ads_Disconnect.meLinkLink
antipopadsLinkLink
anudeepND_blacklist_ad_serverLinkLink
Bad_JAV_SitesLinkLink
BaddBoyzHostsLinkLink
BadIPs.com_KEYLinkLink
BadIPs.com_Level_3LinkLink
BadIPs.com_Level_4LinkLink
BadIPs.com_Level_5LinkLink
blacklistLinkLink
cameleon_at_sysctl.orgLinkLink
Cyveillance_BlocksLinkLink
firehol_level1LinkLink
hostsVNLinkLink
justdomains_mirror1.malwaredomains.comLinkLink
KADhosts_azet12LinkLink
lightswitch05_hosts_ads-and-tracking-extendedLinkLink
malc0de.comLinkLink
MalwareDomainList.comLinkLink
Michael_Trimms_HostsLinkLink
MinimalHostsBlockerLinkLink
Mitchell_Krog_Snooping_IPSLinkLink
Phishing.DatabaseLinkLink
pl-host-fileLinkLink
quidsup_malicious-sitesLinkLink
quidsup_notrack_trackersLinkLink
smed79_blacklistLinkLink
someonewhocares.orgLinkLink
Spam404LinkLink
SSH_attackers_probersLinkLink
Suspicious.Snooping.Sniffing.Hacking.IP.AddressesLinkLink
The-Big-List-of-Hacked-Malware-Web-SitesLinkLink
Top-Attacking-IP-Addresses-Against-Wordpress-SitesLinkLink
WaLLy3K_BlacklistLinkLink
Wiggum27_BlockersLinkLink
www.blocklist.deLinkLink
YousListLinkLink
yoyo.org_domainsLinkLink
yoyo.org_ipsLinkLink
ZeroDot1_CoinBlockerListsLinkLink
ZeroDot1_CoinBlockerLists_browserLinkLink

AWESOME TOOLS WE WROTE


AWESOME TOOLS WE USE


SOME OTHER AWESOME TOOLS/PROJECTS


SUPPORT THIS PROJECT AND ITS INFRASTRUCTURE

:sparkling_heart: Buy Mitchell a Coffee :point_down:

Buy Mitchell some Coffee

:sparkling_heart: Support Nissar :point_down:

Buy Nissar some Coffee

:heart: Sponsor Nissar on GitHub


Into Photography?

Come drop by and visit Mitchell's Portfolio.


License

MIT License

Copyright (c) 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024 Ultimate Hosts Blacklist - @Ultimate-Hosts-Blacklist Contributors
Copyright (c) 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024 Mitchell Krog - @mitchellkrogza
Copyright (c) 2017, 2018, 2019, 2020, 2021, 2022, 2023, 2024 Nissar Chababy - @funilrys

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.

⇈ Back to Top