1
0
Fork 0
Information used to block multiple DNS provider to prevent security bypass.
Find a file
2026-03-05 16:50:10 +01:00
all_DNS_port.txt Upload files to "/" 2026-03-05 16:50:01 +01:00
dns_ip4.txt Upload files to "/" 2026-03-05 16:50:01 +01:00
dns_ip6.txt Upload files to "/" 2026-03-05 16:50:01 +01:00
LICENSE Initial commit 2026-03-05 16:49:28 +01:00
README.md Upload files to "/" 2026-03-05 16:50:01 +01:00
rootserver_ip4.txt Upload files to "/" 2026-03-05 16:50:01 +01:00
rootserver_ip6.txt Upload files to "/" 2026-03-05 16:50:10 +01:00

DNS Security: Blocking Multiple DNS Providers

This repository contains a set of lists that are used to block multiple DNS providers in order to enhance security by preventing potential security bypass.

Important Note:

The blocklists provided in this repository (namely all_DNS_port.txt, dns_ip4.txt, dns_ip6.txt, rootserver_ip4.txt, and rootserver_ip6.txt) are intended to be highly intrusive by design. This means they may inadvertently break some functionalities or services on your network due to their aggressive nature. By using these lists, you acknowledge that the author is not responsible for any unintended consequences, including service disruptions or loss of functionality. These lists should only be utilized with a full understanding and acceptance of this fact.

Lists Included:

  • all_DNS_port.txt: This file includes ports commonly associated with DNS services. By blocking these ports, you can secure your network from unauthorized access often utilized for malicious activities.

  • dns_ip4.txt: A list of IPv4 addresses for many known DNS services. These entries are useful to block access to these specific DNS providers in order to prevent security bypass via these trusted DNS servers.

  • dns_ip6.txt: Similar to dns_ip4.txt, this file contains the IPv6 addresses of numerous known DNS service providers. Adding these entries can further secure your network against unauthorized use through IPv6 connections.

  • rootserver_ip4.txt: This list consists of both official and unofficial IPv4 addresses for root servers. By blocking these IPs, you can prevent unauthorized access to root server domains that may be used in various types of attacks.

  • rootserver_ip6.txt: An analogous file containing the IPv6 addresses of official and unofficial root servers. Blocking access to these IP addresses can enhance security by restricting potential entry points for malicious activities.

Purpose:

The aim is to provide a comprehensive approach to DNS security by blocking known ports, DNS service IPs (IPv4 & IPv6), and root server IPs (both IPv4 & IPv6). This not only helps in preventing unauthorized access but also secures your network from potential security bypasses via well-known DNS providers.

Usage:

These lists can be used by network administrators to filter traffic through firewalls, block unwanted DNS requests, or configure security rules for intrusion prevention systems (IPS).

By restricting access to these known entities, organizations and individuals can reduce the risk of security breaches, phishing attempts, malware distribution, and other cyber threats that rely on unsecured DNS services.

Contributing:

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change or add.


Disclaimer: Ensure that blocking DNS services does not impede legitimate network operations or impact user experience negatively. Always review changes before implementing security measures, Those list are published as is, and you accept i will not be responsible of any disruption if you fail to ensure that does not impede legitimate connection of your network.