Skip to content

ipfilterX

by Nexus23 Brotherhood

  • Privacy Policy
  • About
  • ipfilterX SERIES
    • ipfilterHTX
    • ipfilterX2/X4 Details
    • A-MOD Package Blacklists
  • Instructions
    • ipfilterX in Routers
    • MAC and LINUX
    • X F.A.Q.
    • ipfilterX Mirror Website
  • XKey Features
    • ipfilterX AP2P List
    • ipfilterX Malware List
    • ipfilterX Surveillance List
  • XScreeenshots
  • Extended Ideal Use of ipfilterX
  • ipfilterX and VPN
  • ipfilterX for ANDROID
  • XCompatibility
  • Subscription Plans
    • SubscribE using Bitcoin or Monero
  • XLinks
  • XSupport
  • Hydra Blacklist Data Board
  • Free Blacklists
  • Privacy Policy
  • Terms and Conditions
  • Refund Policy

Instructions

ipfilterX Instructions

Alternatives to PeerBlock for Mac OSX and Linux users


NOTE :
All the users that load ipfilterX2 don’t need to load ipfilterX
because ipfilterX2 already contains ipfilterX ranges .

Automatic Update Link is now added with an unique
generated secret key,
it means that you may use a secret link to update ipfilterX
in your client . (Disabled for Https/SSL upgrade).

Update News come with our free public page on Twitter :
https://twitter.com/Nexus23_Labs
and/or
Subscribing on FOLLOW at http://p2pblocklist.wordpress.com/
You will receive an eMail instantly after
we’ve released a new ipfilterX Version .

Security Ratings Legend :

[LOW – MEDIUM – HIGH – CRITICAL – HIGHLY / HEAVY CRITICAL]

with proper relevance of detection of security levels in specified countries

Usage in Peerblock :

SNAPS AND PEERBLOCK RELEASES WIN32/WIN64 HERE

Remember : use one path to load ipfilter file, so next time when you will overwrite old ipfilter, the program will load the new where the old one was found in first instance.


Then close the window and get the result:

All well.


> Usage in eMule :

– Paste ipfilter.dat into :

  • C:eMule0.49a_BETA1eMuleconfig

– OPTIONS – SECURITY – then RELOAD if you added or downloaded a new ipfilter.dat file

IPFILTER UPDATER FOR uTorrent

>Usage in uTorrent :

Be sure that you go to Preferences -> Advanced

and down the list you find the value “ipfilter.enable” then set it to “true”

(You have to make this operation only one time , but check from time to time after upgrading to new UTorrent Version)

PATH:

WINDOWS 7 – 8 – VISTA :

– Add ipfilter.dat at path example :

– C:UsersYourUserNameAppDataRoaminguTorrent (if hidden just set show hidden folder in Folder Options)

Windows XP :

-Add ipfilter.dat at path example :

– C:Documents and SettingsBillGatesApplication DatauTorrent

-Copy in the folder above then restart program ;

-Click Options
-Click Preferences
-Click Advanced
-Make sure ipfilter.enable = true

read uTorrent Ipfilter FAQ as further instructions
–Windows sVISTA / Windows 7 Seven :

  1. Download the file to C:UsersusernameAppDataRoamingutorrent
  2. Open uTorrent
  3. Click Options
  4. Click Preferences
  5. Click Advanced
  6. Make sure ipfilter.enable = true

If ipfilter.enable was false you will have to restart uTorrent after changing it to true.

-SYMANTEC FIREWALL: How to block range of IP addresses (Subnets) using Symantec Endpoint protection Firewall rule

Some times we might want to block IP addresses ranges using Firewall rules
For example you might want to use specific firewall policies just for IPs from 10.0.0.1 to 10.0.0.220
The existing default firewall policies does not allow you to add multiple IP addresses
We just get one IP address to add
In order to use my custom IP range in firewall rules I need to create HOST GROUPS
HOST GROUPS in simple terms.
Host group is a collection of DNS domain names, DNS host names, IP addresses, IP ranges, MAC addresses, or subnets that are grouped under one name so that you don’t need add IPs individually
ADDING HOST GROUPS (Step 1):
In the console, click Policies.
Expand Policy Components, and then click Host Groups.
Under Tasks, click Add a Host Group.
In the Host Group dialog box, type a name, and then click Add.
In the Host dialog box, in the Type drop-down list, select one of the following hosts:
IP range
Enter the information for each host type.
Click OK.
Using Host Groups in Firewall Policy:
Once you have Created host groups
open console, click policies
Select Firewall policy
Select rules
Create a blank rule
I made it as BLock IP Range
Double click on the Host (By default it will be any)
Now you will see your host group what you added in Step1
Define host relationship
Select if you want to make it local/remote or source or destination
(Source/Destination is dependent on the direction of traffic. In one case the local client computer might be the source, whereas in another case the remote computer might be the source)
(Local and remote :The local host is always the local client computer, and the remote host is always a remote computer)
Check the host group
Click Ok
Select the action as Block
Click Ok
Apply the policy
That’s it we should good with our rule for that particular IP ranges.

Windows Firewall Import rules feature:

To import deny rules (blocklist) in Windows firewall you have to install Powershell

then follow these instructions:

LINK 1

LINK 2

Windows Firewall Script To Block IP Addresses And Country Network Ranges

The host-based Windows Firewall is easily managed through scripts and the NETSH.EXE command-line tool. This article is about a simple PowerShell script which can create rules to block inbound and outbound access to thousands of IP addresses and network ID ranges, such as for attackers and unwanted countries.

To get the script, download the SEC505 zip file here or from the Downloads page, open the zip and look in the “Day5-IPSec” folder for the script named Import-Firewall-Blocklist.ps1 (and the sample BlockList.txt file too). Like all the other scripts in the zip file, this script is free and in the public domain.

The script can also create firewall rules which apply only to certain interface profile types (public, private, domain, any) and/or only to certain interface media types (wireless, ras, lan, any); for example, you might wish to only block packets going through an 802.11 NIC (wireless) but only while not at home or at the office (public). The script is just a convenient wrapper around the built-in NETSH.EXE tool.

Requirements

The script requires PowerShell 1.0 or later.

You must be a member of the local Administrators group.

The script runs on Windows Server 2008, Windows Vista, and later operating systems.

A text file containing addresses to block must be passed into the script as an argument. This file must have one entry per line, each line containing either a single IP address, a network ID using CIDR notation, or an IP address range in the form of StartIP–EndIP, for example, “10.4.0.0-10.4.255.254”. Both IPv4 and IPv6 are supported. Blank lines and comment lines are ignored; a comment line is any line that does not begin with a number or hex letter. Even if the input file was originally created for Apache or iptables, it can still be used as long as the formatting is compatible (or made compatible with a bit of scripting).

Note: If you want similar scripts for Windows XP and Server 2003, that same zip file above also contains VBS and BAT scripts that all begin with the word “Firewall_*”. Look in the VBScript directory.

HOW TO BLOCK IP ADDRESSES IN WINDOWS USING IPSEC

 

 

>NEW !!! TRANSMISSION – UPDATE YOUR ipfilterX OFFLINE :

WINDOWS – MAC : Go to C:UsersNAMEAppDataRoamingtransmissionblocklists

You will find a file named blocklist.bin , 0 bytes ,

update with ipfilterX url that field , first extension .dat of the two lines of files,

it will be autorenamed and/or converted to blocklist.bin , the file needed , done !

DELUGE

Deluge works with Autoupdate link ipfilterX feature , thus it supports SSL Connections.

Just go to EDIT > PREFERENCES > PLUGIN > CHECK/ENABLE BLOCKLIST PLUGIN

ADD your ipfilterX LINK+KEY ID > Wait until download will be complete > DONE

ipfilterX extension that works in Deluge is .gz <


>Download Pages at :

  • https://ipfilterX.com
  • https://ipfilterx.com
  • https://p2pblocklist.wordpress.com/

Please report any problem encountered to nexus23 [at] protonmail[dot] com

OR [email protected]

Made by Nexus23 Brotherhood

ipfilterX L2 Series Build

nightbuild Charon_[]
______________________
Updated::[06 February 2023]
Threats_:
Blocked:[42]
Updated_M:[3]:AP2P:[0]:S[3]
Deleted:[6]
IP Record:[+4K]
Level:[MEDIUM-HIGH]
Extended X4:[N]
______________________

Latest AP2P-Malware-Surveillance blocked and updated:

–

 

_[AP2P]_

 

_[Malware]_
–

_[Surveillance]_

AMOD Blacklists Status

_Malware_:[06 February 2023]

_NSA_:[06 February 2023]

_Intruder_[23 January 2022]

-WHTX_[04 January 2023]
_____________________________

en English
ar Arabiczh-CN Chinese (Simplified)en Englishfr Frenchde Germanja Japanesept Portugueseru Russiansr Serbianes Spanishsv Swedish

Compatibility and Instructions

#ipfilterX Instructions Page –
#ipfilterX Router Guide Page to: Symantec Firewall – Windows Firewall – Windows IPSec – Bit Torrent Mods – New Peerblock and Peerguardian Screenshots (Linux, Mac OSX) – Mikrotik Router

Peerblock Alternative for Windows, Mac and linux

Tweets by vxunderground

ipfilterX Free Blacklists:

Available:
ipfilterHTX for Webserver

Mass Blocklist: Facebook – Google – Microsoft – Sungard-[Not Available]

*Amazon Blocklist available only on ipfilterX4 (thus included in ipfilterX3 Subscription)

Tags

agencies (37) antip2p (86) AntiPiracy (28) ap2p (20) apache (10) army (9) assets (38) attackers (43) blocklist (11) botnet (31) c2 (17) cia (9) contractors (17) copyright (17) crimeware (47) cryptoware (12) dridex (11) emotet (10) Flooders (67) gov (79) htaccess (11) ipfilter (32) ipfilterHTX (10) ipfilterX (26) irdeto (10) LOCKY (15) loki (27) Malvertising (38) Malware (210) mil (72) nsa (39) P2P (12) PeerBlock (45) Phishing (35) pony (14) ranges (11) ransomware (58) rat (11) Scammers (21) Spammers (72) spyware (11) tracking (37) update (11) updates (21) ursnif (12)

eMail powered by Protonmail

ipfilterX – Copyright 2003-2021
…

ipfilterX Website RPM

Proudly powered by WordPress | Theme: micro, developed by DevriX.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT