Wellcome on the CoinBlockerLists Homepage!
Quick navigation:
- What are the CoinBlockerLists?
- What is cryptojacking?
- List of applications and projects that uses the CoinBlockerLists.
- Latest News!
- Follow @zero_dot1
What are the CoinBlockerLists?
CoinBlockerLists are a type of blacklist that can be used to block unwanted
traffic in computer networks. These lists are specifically designed to block
known malicious domains and IP addresses associated with various types of cyber
attacks and online scams. The CoinBlockerLists can be imported and used in a
variety of firewall solutions, such as pfSense and Pi-Hole, and can help
organizations protect their IT infrastructure from a wide range of threats.
The CoinBlockerLists project was started in 2017 by ZeroDot1 and is currently
managed by the same individual. The lists are updated regularly, and users can
also contribute to the project by submitting pull requests via Gitlab.
One of the main benefits of using CoinBlockerLists is that they can help
organizations reduce the risk of cyber attacks by blocking known malicious
domains and IP addresses. This can be particularly useful for companies that
rely heavily on computer networks for their operations, as it can help protect
sensitive data and prevent disruptions to business operations.
It's worth noting that while the CoinBlockerLists are primarily used by
companies, they can also be used by individuals to protect their own personal
networks. Additionally, users of the CoinBlockerLists can create their own
whitelist in their firewall to allow specific domains or IP addresses through,
in case of any problems.
In summary, CoinBlockerLists are a powerful tool for protecting computer
networks from malicious domains and IP addresses. They can be used in a variety
of firewall solutions, and are regularly updated to ensure that they continue to
provide effective protection against the latest threats. If you are an IT
professional in a company, you might want to consider using CoinBlockerLists to
improve the security of your network.
Another key feature of the CoinBlockerLists is their ability to block domains
associated with cryptocurrency-related scams and fraud. As the name suggests,
CoinBlockerLists are specifically designed to target domains and IP addresses
that are known to be associated with cryptocurrency scams and other types of
online fraud. This can help organizations protect their employees and customers
from falling victim to these types of scams, which can be particularly prevalent
in the fast-paced and rapidly-evolving world of cryptocurrency.
In addition to providing protection against malicious domains and IP addresses,
the CoinBlockerLists can also help organizations improve their overall network
performance. By blocking unwanted traffic, the CoinBlockerLists can help reduce
the amount of bandwidth and other resources that are consumed by unwanted
traffic. This can help organizations improve their network speeds and reduce the
risk of bottlenecks and other performance issues.
One of the main advantages of CoinBlockerLists is that they are open-source,
meaning that anyone can access the source code and make modifications as needed.
This makes it easy for organizations to customize the lists to suit their
specific needs and to contribute to the project by submitting pull requests.
Another advantage of CoinBlockerLists is that they are easy to use and integrate
with existing firewall solutions. The lists can be imported and used in a
variety of firewall solutions, such as pfSense and Pi-Hole, and can be easily
configured to block unwanted traffic. This makes it easy for organizations to
set up and use the CoinBlockerLists without needing to have extensive technical
expertise.
In conclusion, CoinBlockerLists are a valuable tool for protecting computer
networks from malicious domains and IP addresses. They are regularly updated to
ensure that they continue to provide effective protection against the latest
threats. They can help organizations improve their network performance and
protect their employees and customers from falling victim to cryptocurrency
scams and other types of online fraud. Additionally, the open-source nature of
CoinBlockerLists allows organizations to customize the lists to suit their
specific needs and contribute to the project.
The project is primarily designed for companies, universities and other
networks to provide better network protection.
The CoinBlockerLists are used worldwide and already protect thousands of
computers and other devices,
DOWNLOAD
the CoinBlockerLists today and make your network safer.
In the list below are listed projects and applications where the
CoinBlockerLists are used.
Do you want to know which companies use the CoinBlockerLists, then check out the
partners page
to find a list of companies that use the CoinBlockerLists.
The CoinBlockerLists are open source and are licensed under the
AGPL
license.
What is cryptojacking?
Cryptojacking, also known as cryptocurrency mining malware or crypto-mining
malware, is a cyberattack where malicious actors hijack a computer's processing
power to mine cryptocurrencies without the owner's knowledge or consent. The
term "cryptojacking" is a combination of "cryptocurrency" and "hijacking."
Cryptocurrency mining involves solving complex mathematical puzzles to validate
transactions and add them to a blockchain. This process requires significant
computational power and electricity. Instead of using their own resources,
cybercriminals employ various techniques to infect computers, servers, or even
mobile devices with crypto-mining malware.
Here's how cryptojacking usually works:
Infection:
The attackers infect a victim's device with crypto-mining malware. They may use
methods like phishing emails, malicious downloads, compromised websites, or
exploiting software vulnerabilities to deliver the malware.
Background Mining:
Once the malware is installed, it operates silently in the background without
the user's knowledge. It uses the infected device's processing power and
resources to mine cryptocurrencies.
Mining Rewards:
The mining rewards, which include newly created coins and transaction fees, are
sent to the attacker's cryptocurrency wallet.
Cryptojacking can be very profitable for cybercriminals, as they can leverage
the combined processing power of numerous infected devices to mine
cryptocurrencies on a large scale. However, the unauthorized use of a victim's
computing resources can cause significant performance issues, increased energy
consumption, and even hardware damage in extreme cases.
Users can protect themselves from cryptojacking by following these precautions:
Keep Software Updated:
Regularly update your operating system, antivirus software, and web browsers to
patch any known vulnerabilities.
Exercise Caution with Links and Downloads:
Avoid clicking on suspicious links or downloading files from untrusted sources,
especially in emails or on websites.
Use AdBlockers:
Some cryptojacking scripts are delivered through malicious ads. Using ad
blockers can reduce this risk.
Install the CoinBlockerLists:
This can help detect and block cryptojacking scripts and malware.
Monitor CPU Usage:
Keep an eye on your device's CPU usage to identify any unusual spikes that could
indicate cryptojacking.
Use Security Software:
Employ reputable security software that can detect and block crypto-mining
malware.
By taking these precautions, users can mitigate the risk of falling victim to
cryptojacking and protect their computing resources from being exploited for
unauthorized cryptocurrency mining.
List of applications and projects that uses the CoinBlockerLists.
Your project is not on the list please contact me and I will add your project to the list.
- The CoinBlockerLists are used by Pulsedive
- The CoinBlockerLists are used by APIVoid (Domain Reputation Check)
- The CoinBlockerLists are used by Safing - Portmaster
- The CoinBlockerLists are used by RethinkDNS and RethinkFirewall
- The CoinBlockerLists are used by PyFunceble
- The CoinBlockerLists are used by NextDNS
- MISP - Malware Information Sharing Platform and Threat Sharing
- Blokada - Free ad blocker for Android with the best open source community.
- DNSCrypt-Proxy - A flexible DNS proxy, with support for encrypted DNS protocols.
- Hostsblock - An ad- and malware-blocking script for Linux
- pfBlockerNG: A Firewall - IP and Domain Management package!
- Wally3k.github.io - The Big Blocklist Collection
- update-hosts - This script, designed for GNU/Linux, generates a hosts file based on multiple sources.
- The Ultimate hosts file for protecting your computer or device against over a million bad web sites.
- smokingwheels - Pi-hole/allhosts
- Nolovia - is an ad/malware blocking configuration file generator for bind, NSD, and other DNS resolvers
- Minesweeper - A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 14000+ malicious cryptocurrency mining domains(cryptojacking).
- CoinHive-Block - To block the malware domains of coin-hive systemwide.
- Dr. Mine - is a node script written to aid automatic detection of in-browser cryptojacking.
- The CoinBlockerLists are used by Pannonia IT
- The CoinBlockerLists are used by Omri Moyal
Latest News!
Latest News: 14.10.2023
Complete Website Update - New Look and Content
Dear valued visitors, We are thrilled to announce the completion of a comprehensive update to our website! We have given our online presence a complete makeover, including a brand new theme and entirely rewritten content, to enhance your browsing experience and provide you with even more valuable information.
A new logo was created and added.
Today is a very good day, @euphoricfall has created a beautiful piece of art for me in the form of a new logo.@euphoricfall has created exactly the logo I had in my mind.
— ZeroDot1🍀 (@zero_dot1) May 1, 2021
Maybe she can read thoughts, thank you very much for your incredibly good work. 💕💕 pic.twitter.com/lJJBv871HM