-
Notifications
You must be signed in to change notification settings - Fork 233
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is there any list to block Newly Active Domains and/or similar? #4339
Comments
@Dynamic5912 The phishing nrd list are domains with high entrophie, domains which are likely automatically registered by bad actors, typo squatting and homographic looking domains. Also domains which are using big tech companies names but are not associated to them. It is simply the nrd list with domains, they are likely fishy. 14days means domains registered, claimed or changed owner in the past 14 days from now on. So it is with the 30 days list. Sicerely, |
@ExtRIELICi thanks for your suggestion! That sounds interesting in manner of security indeed. I will have a look and integrate the feature when applicable. |
Are already implemented from day one. |
I recently discovered this feature, along with many other similar ones, on docs.dns0.eu:
However, from what I understand, these features are not available on services like NextDNS, ControlD, or AdGuard.
These features seem very interesting, but with dns0, most of them appear to be either behind a paywall or lack customization and control. This is because they only provide a DNS address, unlike NextDNS, which offers a control center where you can adjust settings to your preferences.
For example, Newly Active Domains are domains that were inactive for a while but have suddenly become active. This behavior is often a strong indicator of malicious activity.
Are there any HaGeZi (or other) filter lists that cover these cases, also shown in the screenshot I attached below? If not, are there any plans to create such lists?
The text was updated successfully, but these errors were encountered: