I used to have huge collection of block-lists for my Pi-hole(s) but I was annoyed about all the false positives, and decided to reset to the default lists that come with it. That way, I had no more issues and it would still block ads. But this also meant tracking protection and malware filters were mostly gone.
But I found a big, curated list now, that I wanted to share!
The idea is, that these lists should not contain false positives. I installed them now and will try them out and I wanted to share them with you.
So, here it goes:
https://hosts-file.net/grm.txt https://raw.githubusercontent.com/PolishFiltersTeam/KADhosts/master/KADhosts_without_controversies.txt https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Spam/hosts https://v.firebog.net/hosts/static/w3kbl.txt https://adaway.org/hosts.txt https://v.firebog.net/hosts/AdguardDNS.txt https://raw.githubusercontent.com/anudeepND/blacklist/master/adservers.txt https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt https://hosts-file.net/ad_servers.txt https://v.firebog.net/hosts/Easylist.txt https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=0&mimetype=plaintext https://raw.githubusercontent.com/FadeMind/hosts.extras/master/UncheckyAds/hosts https://raw.githubusercontent.com/bigdargon/hostsVN/master/hosts https://v.firebog.net/hosts/Easyprivacy.txt https://v.firebog.net/hosts/Prigent-Ads.txt https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-blocklist.txt https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.2o7Net/hosts https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/spy.txt https://www.github.developerdan.com/hosts/lists/ads-and-tracking-extended.txt https://hostfiles.frogeye.fr/firstparty-trackers-hosts.txt https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareHosts.txt https://osint.digitalside.it/Threat-Intel/lists/latestdomains.txt https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt https://mirror1.malwaredomains.com/files/justdomains https://v.firebog.net/hosts/Prigent-Malware.txt https://hosts-file.net/exp.txt https://hosts-file.net/emd.txt https://hosts-file.net/psh.txt https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt https://www.malwaredomainlist.com/hostslist/hosts.txt https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt https://phishing.army/download/phishing_army_blocklist_extended.txt https://gitlab.com/quidsup/notrack-blocklists/raw/master/notrack-malware.txt https://v.firebog.net/hosts/Shalla-mal.txt https://raw.githubusercontent.com/FadeMind/hosts.extras/master/add.Risk/hosts https://urlhaus.abuse.ch/downloads/hostfile/ https://zerodot1.gitlab.io/CoinBlockerLists/hosts_browser
You can connect to your pi-hole admin interface as usual and go to Settings > Blocklists and paste all these URLs into the text area in the bottom. Then choose to “Save and Update”. Alternatively, if you don’t have the web interface, you can SSH to your pi-hole and append those URLs to
/etc/pihole/adlists.list (for example by editing it with nano) and then update the lists with
At the time of writing, those lists combined had just over 861k unique domains. Which is about 100k less than my manual past approach. So, let’s also hope there won’t be any false positives, as they promised!
Found false positives in the lists? Let us know in the comments!
I hope this helped you out!
[UPDATE] amzn.to is falsely blocked by one of the lists and should be whitelisted. It’s an official Amazon short-link.