AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing bitwire-it/ipblocklist in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Overview (README excerpt)
Crawler viewIP Blocklist This project provides aggregated IP blocklists for inbound and outbound traffic, updated every 2 hours. It includes exclusions for major public DNS resolvers to prevent legitimate services from being blocked. --- Live Statistics Live Dashboard --- How to Use These Lists These are standard text files and can be used with most modern firewalls, ad-blockers, and security tools. 🛡️ (Inbound Blocklist) • **What it is:** A list of IPs/networks with a bad reputation for *initiating* malicious connections. This includes sources of spam, scanning, brute-force attacks (SSH, RDP), and web exploits. • **Use Case:** Protect your public-facing servers and services (web servers, mail servers, game servers, etc.). • **How to use:** Apply this list to your firewall's **WAN IN** or **INPUT** chain to **DROP** or **REJECT** all incoming traffic *from* these sources. ☢️ (Outbound Blocklist) • **What it is:** A list of known malicious destination IPs. This includes C2 (Command & Control) servers, botnet controllers, malware drop sites, and phishing hosts. • **Use Case:** Prevent compromised devices on your *internal* network (like a laptop or IoT device) from *contacting* malicious servers. • **How to use:** Apply this list to your firewall's **LAN OUT** or **OUTPUT** chain to **BLOCK** or **LOG** all outgoing traffic *to* these destinations. --- Self-hosted runners The workflow take a lot of time to complete, for this reason i started a Self-hoster runner to pick up the job, if you want to setup the action please add it to your forked repository Setup Self-hosted runners --- Acknowledgements 🪨 **borestad** • *foundational blocklists* 🚀 **Code contributions** • David • Garrett Laman ❤️ **Our sponsors** • *making this project possible* • mraxu • Hareen • Alexandru Balmus • blockstreamtechnologies.llc License Code The source code (including ) is licensed under the **MIT License**. See LICENSE for details. Data The aggregated blocklists ( , , etc.) are derivative works containing data from multiple sources. **Usage of these lists is subject to the licenses of the original data providers.** - Many sources (e.g., Spamhaus) **prohibit commercial use** of their data without a separate agreement. • Therefore, the aggregated data in this repository is provided under the **Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)** license. **Attribution:** This project relies on data from: • borestad/blocklist-abuseipdb • borestad/firehol-mirror • stamparm/ipsum • ShadowWhisperer/IPs • romainmarcoux/malicious-ip • romainmarcoux/malicious-outgoing-ip • elliotwutingfeng/ThreatFox-IOC-IPs • binarydefense.com • bruteforceblocker.com • darklist.de • dan.me.uk Tor List • Emerging Threats • Spamhaus DROP • CINSscore • CriticalPathSecurity • C2 Tracker ---