Tag Archive: PeerBlock

ipfilterX : Codename Ice

>Date 13/09/2013

>Updates : New Cybercrime Ranges, Defense Contractor New Ranges, Two (2) Botnet C&CS, Malware Exploit, Spammers, Tracking Technologies, Crimeware VPS, Technology Research Institutes

>Removed useless and obsolete ranges


>>>Parsed lines/entries:10k Found IP ranges:10k Duplicate:0 Merged:0 Time:0 secs

>>>>IP Count : 582k

>>>>>Security Rating : 4/5

>>>>>>Codename : Ice


Net Stealth Fighter Engine

>Programs designed to let you control who your computer “talks to” on the Internet.
By selecting appropriate blocklists of “known bad” computers,
you can block communication with advertising or spyware oriented servers,
computers monitoring your p2p activities, computers which have been “hacked”,
even entire countries!
and By the Way all the evil connections like that described in ipfilterX page :

# False Positives Optimization
# Careful analysis
# Updated frequently
# Dangerous AntiP2P – .GOV and .MIL lists included
# Sensible protection by checking for range changes
#Specifics :
Governments (Also Hidden Gov.Agencies)
AntiP2P (Organizations, Technologies, Related)
Entertainment Industries
AntiP2P Law and Consulting Firms
P2P Spammers and Flooders
Attackers ; Ddos Serials Attackers
Malware Hosts
Malicious Hosts
Botnet Command & Control Servers
Unfair Companies (Business , Information, Multimedia)
Unfair Hosting Services
Spy ,Intrusion, Tracker Networks
Publishing and Marketing Companies
Data Research Institutes and Centers
Spam Harvest
Business Agencies
Unknown Ranges
and more …

They can’t get in to your computer, and your computer won’t try
to send them anything either.

ipfilterX can really make you stay away from a lot of troubles ,
with the minimum effort from your side .


>As showed above in the Screenshots Page you can use ipfilterX loaded into PeerBlock .
This page will be updated when known bugs of this program can interfere with ipfilter loading and work .
>I sent also one of our team to reply at Peerblock Forum when someone is getting a problem blocking a particular ip range ( his nick is Spartan23 )


Alternatives to PeerBlock for Mac OSX and Linux users

TOR and ipfilterX


Beware Peerguardian , PeerBlock , etc. users ,
do not rely on anonymity using Tor while on Peerblock Client .

Continue reading

PeerBlock Alternatives for Mac and Linux

nexus23 labs

>PeerBlock Alternatives for Mac Users :


-Peerguardian OSX


-Little Snitch 3

Little Snitch used also by Hacking Team for their purposes




At last Peerguardian for MAC is still working :



pgmpk pgwarn pgcop pgdestdisk install1-5 pginstall pginstall1-8 pginstall2 pginstalled pgfinal pgstats





See at right corner IPFW Rule , option to import rules.


Also Littlesnitch got a rule like that :

Rules can cover a list of multiple hostnames, domains or arbitrary IP address ranges, helping you to simplify your ruleset.


Positive comments on www.hanynet.com/icefloor/

Icefloor is a current alternative to the outdated (yet still functionable) PeerGuardian if you are using OS X.

It is a frontend for the pf firewall/packet filter, which is meant replace ipfw (which PG uses) in newer versions of OS X.

The programmer of Icefloor is working on a new software that also supports OS x 10.10 and superior.

However, in Icefloor, ip lists can only be loaded from files, not via the web.



A similar grid exists for listing connections established by applications, connected hosts, or sockets actively listening for communications. Grid lists information for each connection made by an app, protocol, source, and target IPs, plus the ports they’re connected to/from, and current status (Figure O). For additional security, you can terminate connections at will from the list or ban IP addresses to prevent future connections from taking place.

Figure P.

Such information, available at a glance, includes packet loss bandwidth — both incoming and outgoing. Whitelisted or blacklisted IPs, with relevant details in transmission rates for those connections, is also included. Lastly, the Network Services List button details many common and not so common services for both UNIX and OS X. This information is quite helpful when troubleshooting an issue with a rule that needs to be modified due to incorrect port assignments or to prevent clashing with another offered service.


They own an option to import blacklists.

Alternative Methods:
Apple PF Control :

-T command [address …]
Specify the command (may be abbreviated) to apply to the table. Commands include:

-T kill Kill a table.
-T flush Flush all addresses of a table.
-T add Add one or more addresses in a table. Automatically create a nonexisting table.
-T delete Delete one or more addresses from a table.
-T expire number
Delete addresses which had their statistics cleared more than number seconds ago.
For entries which have never had their statistics cleared, number refers to the
time they were added to the table.
-T replace Replace the addresses of the table. Automatically create a nonexisting table.
-T show Show the content (addresses) of a table.
-T test Test if the given addresses match a table.
-T zero Clear all the statistics of a table.
-T load Load only the table definitions from pf.conf(5). This is used in conjunction
with the -f flag, as in:

Here another way :

Create a file called :


Add your IPs to client_access in the following format: REJECT

Add as many single IPs or IP blocks as needed.

Save and issue:

sudo /Applications/Server.app/Contents/ServerRoot/usr/sbin/postmap /Library/Server/Mail/Config/postfix/client_access



and add:

check_client_access hash:/Library/Server/Mail/Config/postfix/client_access

to the parameters present in smtpd_client_restrictions

For example:

smtpd_client_restrictions = permit_mynetworks permit_sasl_authenticated check_client_access hash:/Library/Server/Mail/Config/postfix/client_access reject_rbl_client zen.spamhaus.org reject_rhsbl_client dbl.spamhaus.org permit

When done, issue:

sudo /Applications/Server.app/Contents/ServerRoot/usr/sbin/postfix reload

See also here: http://www.postfix.org/postconf.5.html#check_client_access

Regarding Postfix Paths in Server 5, see here: https://topicdesk.com/faqs/why-do-postconf-n-and-postfix-reload-produce-unexpect ed-output-on-os-x-server-5/


>Peerblock Alternatives for Linux Users :


-PeerGuardian 2

-IPBlock aka IPList

-IPBLOCK Instructions


-Peerguardian and MoBlock Debian


In the specific : Peerguardian Linux works as well. It loads also .dat file extension for e2dk.

SSL URLs for ipfilterX update work like a charm.

Tested it in Kali Linux latest release 2016.2 with no problem at all.

Here some screenshot:

screenshot-from-2017-01-31-07-08-08 screenshot-from-2017-01-31-07-13-51 screenshot-from-2017-01-31-07-14-58 screenshot-from-2017-01-31-07-16-12 screenshot-from-2017-01-31-07-35-09 screenshot-from-2017-01-31-07-35-49 screenshot-from-2017-01-31-07-39-36 screenshot-from-2017-01-31-07-40-17

>Remember that’s not the IP Blocker Program that you choose to make the difference

but the ipfilter loaded that will make it .