List and Filter descriptions
What lists should I use?
We strongly recommend the use of at least the following lists while doing p2p:
Primary Threats
General Corporate Ranges
Business ISPs
And the use of an IP-filter in your p2p-program.Primary Threats List
Companies or organizations who are clearly involved with trying to stop filesharing(e.g. Irdeto, DtecNet, Trident MediaGuard).
Companies which anti-p2p activity has been seen from.
Companies that produce or have a strong financial interest in copyrighted material(e.g. music, movie and software industries).
Government ranges or companies that have a strong financial interest in doing work for governments.
Legal industry ranges.
IPs addresses or ranges of ISPs from which anti-p2p activity has been observed.
General Corporate Ranges List
Ranges for any company or organization which does not meet the requirements for the Primary Threats List.
Ranges used by labs or researchers.
Business ISPs where a lot of anti-p2p activity has been observed.
VPNs and proxies.
Business ISP List
Ranges for ISPs which serve corporate and governmental customers.
Ranges for residential users where anti-p2p activity has been observed.
Search Engines List
Ranges for search engine companies.
Educational Institutions List
Ranges for colleges, schools K-12, etc
Bogon List
This list contains ranges from which no traffic should be appearing on the internet.
These ranges are either for internal use of some sort or are address space not currently in use.
Be aware that If you have a router, you will need to make exclusions for it and any other addresses on your LAN.
Hijacked List
The ranges on this list have been hijacked by people who are spammers, generally up to no good, and who may be involved with other activities which are a threat.
The individual lists are not currently being updated and should only be used for supplemental protection.
IP-Filters include:
- Primary Threats List
- General Corporate Ranges List
- Business ISPs List
- Search Engines List
- Educational Institutions List
- Bogon List
- Hijacked List
- A list of TOR exit nodes
The filters are currently being updated several times a week.
Please click or use the back-button of your browser to return!