Blocklist Feeds
Hoogvertrouwelijke, regelmatig bijgewerkte blocklists. Gratis te gebruiken, geen registratie vereist.
0
Actieve IPs
0
Signalen
15min
Updates
4
Categorieën
Door Fraudcache data te gebruiken, ga je akkoord met onze juridische voorwaarden:
Beschikbare Feeds
Platte tekst, één IP per regelGecombineerde Feed
Alle kwaadaardige IPs uit alle categorieën in één feed
fraudcache-all.txt
DNS Blocklist (DNSBL)
Realtime IP-lookups via DNS - perfect voor mailservers
bl.fraudcache.com
127.0.0.3
Spam
127.0.0.4
Web Attack
127.0.0.5
Scanner
127.0.0.6
Botnet C2
Spam IPs
E-mail spam, SMTP misbruik, bulk messaging
fraudcache-spam-ips.txt
https://fraudcache.com/api/v1/check/{ip}
Web Aanvallen
SQLi, XSS, credential stuffing, exploits
fraudcache-web-attacks.txt
https://fraudcache.com/api/v1/check/{ip}
Scanners
Poortscanning, SSH/RDP brute force
fraudcache-scanners.txt
https://fraudcache.com/api/v1/check/{ip}
Botnet C2
Command & control infrastructuur
fraudcache-botnet-c2.txt
https://fraudcache.com/api/v1/check/{ip}
Feed Formaat
Alle feeds zijn platte tekstbestanden met één IP-adres per regel. Regels die beginnen met # zijn opmerkingen en worden overgeslagen bij het parseren.
# Fraudcache Spam Feed
# Generated: 2026-03-28T19:50:01+01:00
# Category: spam
# Entries: 0
# License: Free for any use
#
192.0.2.1
192.0.2.15
198.51.100.5
198.51.100.42
203.0.113.88
203.0.113.200
2001:db8::1
2001:db8:85a3::8a2e:370:7334
Eenvoudige Integratie
Werkt met elke firewall, mailserver, of beveiligingstool die IP blocklists accepteert.
1 Download de Feeds
Met cURL
Meest gebruikte methode, beschikbaar op alle Linux/macOS systemen
# Download spam feed
curl -o /etc/fraudcache/spam.txt \
https://fraudcache.com/feeds/fraudcache-spam-ips.txt
# Download all feeds
curl -o /etc/fraudcache/spam.txt https://fraudcache.com/feeds/fraudcache-spam-ips.txt
curl -o /etc/fraudcache/web_attack.txt https://fraudcache.com/feeds/fraudcache-web-attacks.txt
curl -o /etc/fraudcache/scanner.txt https://fraudcache.com/feeds/fraudcache-scanners.txt
curl -o /etc/fraudcache/botnet_c2.txt https://fraudcache.com/feeds/fraudcache-botnet-c2.txt
Met wget
Alternatief voor cURL, geweldig voor scripting
# Download spam feed
wget -O /etc/fraudcache/spam.txt \
https://fraudcache.com/feeds/fraudcache-spam-ips.txt
# Download with timestamping (only if newer)
wget -N -P /etc/fraudcache/ \
https://fraudcache.com/feeds/fraudcache-spam-ips.txt
2 Automatische Updates Instellen
Cron Job (Aanbevolen: Elke 15 Minuten)
Houd je blocklists up-to-date met automatische updates
# Create the update script
cat > /usr/local/bin/update-fraudcache.sh << 'EOF'
#!/bin/bash
DIR="/etc/fraudcache"
BASE_URL="https://fraudcache.com/feeds"
mkdir -p $DIR
# Download all feeds
curl -sf -o "$DIR/spam.txt.tmp" "$BASE_URL/fraudcache-spam-ips.txt" && \
mv "$DIR/spam.txt.tmp" "$DIR/spam.txt"
curl -sf -o "$DIR/web_attack.txt.tmp" "$BASE_URL/fraudcache-web-attacks.txt" && \
mv "$DIR/web_attack.txt.tmp" "$DIR/web_attack.txt"
curl -sf -o "$DIR/scanner.txt.tmp" "$BASE_URL/fraudcache-scanners.txt" && \
mv "$DIR/scanner.txt.tmp" "$DIR/scanner.txt"
curl -sf -o "$DIR/botnet_c2.txt.tmp" "$BASE_URL/fraudcache-botnet-c2.txt" && \
mv "$DIR/botnet_c2.txt.tmp" "$DIR/botnet_c2.txt"
# Optional: Reload firewall rules after update
# systemctl reload firewalld
# /usr/local/bin/reload-ipset.sh
EOF
chmod +x /usr/local/bin/update-fraudcache.sh
# Add to crontab (run every 15 minutes)
echo "*/15 * * * * root /usr/local/bin/update-fraudcache.sh" > /etc/cron.d/fraudcache
3 Integreer in Je Infrastructuur
# Install ipset if not already installed
apt-get install ipset # Debian/Ubuntu
yum install ipset # CentOS/RHEL
# Create the ipset (hash:net supports CIDR notation too)
ipset create fraudcache-spam hash:net hashsize 65536 maxelem 1000000
ipset create fraudcache-attacks hash:net hashsize 65536 maxelem 1000000
# Load IPs into the set
curl -sf https://fraudcache.com/feeds/fraudcache-spam-ips.txt | \
grep -v '^#' | grep -v '^$' | while read ip; do
ipset add fraudcache-spam "$ip" 2>/dev/null
done
# Add iptables rule to drop matching traffic
iptables -I INPUT 1 -m set --match-set fraudcache-spam src -j DROP
iptables -I INPUT 1 -m set --match-set fraudcache-attacks src -j DROP
# Save rules to persist across reboots
ipset save > /etc/ipset.conf
iptables-save > /etc/iptables.rules
Tip: Gebruik ipset swap om de set atomisch bij te werken zonder verbindingen te verbreken.
# Create nftables set and rules
nft add table inet filter
nft add set inet filter fraudcache { type ipv4_addr\; flags interval\; }
nft add set inet filter fraudcache6 { type ipv6_addr\; flags interval\; }
# Add drop rule
nft add rule inet filter input ip saddr @fraudcache drop
nft add rule inet filter input ip6 saddr @fraudcache6 drop
# Load IPs from feed
curl -sf https://fraudcache.com/feeds/fraudcache-spam-ips.txt | \
grep -v '^#' | grep -v '^$' | while read ip; do
if [[ $ip == *":"* ]]; then
nft add element inet filter fraudcache6 { "$ip" }
else
nft add element inet filter fraudcache { "$ip" }
fi
done
# Step 1: Convert feed to nginx geo format
curl -sf https://fraudcache.com/feeds/fraudcache-spam-ips.txt | \
grep -v '^#' | grep -v '^$' | \
awk '{print $1 " 1;"}' > /etc/nginx/fraudcache-spam.conf
# Step 2: Add to nginx.conf (http block)
geo $is_spam {
default 0;
include /etc/nginx/fraudcache-spam.conf;
}
# Step 3: Use in your server block
server {
listen 80;
server_name example.com;
if ($is_spam) {
return 403 "Access denied";
}
# ... rest of config
}
# Step 4: Reload nginx
nginx -t && systemctl reload nginx
# Step 1: Download feed (strip comments)
curl -sf https://fraudcache.com/feeds/fraudcache-spam-ips.txt | \
grep -v '^#' | grep -v '^$' > /etc/haproxy/fraudcache-spam.lst
# Step 2: haproxy.cfg configuration
frontend http_front
bind *:80
bind *:443 ssl crt /etc/haproxy/certs/
# Load blocklist ACL
acl is_spam src -f /etc/haproxy/fraudcache-spam.lst
acl is_attacker src -f /etc/haproxy/fraudcache-attacks.lst
# Block matching IPs
http-request deny deny_status 403 if is_spam
http-request deny deny_status 403 if is_attacker
# Or silently tarpit them
# http-request tarpit if is_spam
default_backend servers
# Step 3: Reload HAProxy
haproxy -c -f /etc/haproxy/haproxy.cfg && \
systemctl reload haproxy
# Create a script to ban all IPs from feed
cat > /usr/local/bin/fraudcache-f2b.sh << 'EOF'
#!/bin/bash
JAIL="fraudcache"
# Fetch and ban each IP
curl -sf https://fraudcache.com/feeds/fraudcache-scanners.txt | \
grep -v '^#' | grep -v '^$' | while read ip; do
fail2ban-client set $JAIL banip "$ip" 2>/dev/null
done
EOF
chmod +x /usr/local/bin/fraudcache-f2b.sh
# Create fail2ban jail (/etc/fail2ban/jail.d/fraudcache.conf)
[fraudcache]
enabled = true
filter =
banaction = iptables-allports
maxretry = 1
findtime = 86400
bantime = 86400
# Script to add rules to UFW
cat > /usr/local/bin/ufw-fraudcache.sh << 'EOF'
#!/bin/bash
# Download and add each IP
curl -sf https://fraudcache.com/feeds/fraudcache-botnet-c2.txt | \
grep -v '^#' | grep -v '^$' | while read ip; do
ufw insert 1 deny from "$ip" to any comment "Fraudcache"
done
EOF
chmod +x /usr/local/bin/ufw-fraudcache.sh
# Note: UFW can be slow with many rules.
# For large blocklists, use ipset instead.
Note: UFW is not recommended for large blocklists. Use iptables+ipset for better performance.
# Generate .htaccess deny rules
echo "Order Allow,Deny" > /var/www/.htaccess-fraudcache
echo "Allow from all" >> /var/www/.htaccess-fraudcache
curl -sf https://fraudcache.com/feeds/fraudcache-web-attacks.txt | \
grep -v '^#' | grep -v '^$' | \
awk '{print "Deny from " $1}' >> /var/www/.htaccess-fraudcache
# Include in your main .htaccess
Include /var/www/.htaccess-fraudcache
# Or use mod_authz_host (Apache 2.4+)
# Require not ip 192.0.2.1
4 Beste Praktijken
Update Elke 15 Minuten
Feeds worden regelmatig ververst. Synchroniseer elke 15-30 minuten voor optimale bescherming.
Vertrouw Botnet C2
C2 IPs zijn geverifieerde infrastructuur. Blokkeer met hoge vertrouwen.
Rate-Limit voor Scanners
Overweeg rate-limiting in plaats van scanner IPs volledig te blokkeren.
Omgaan met Vals Positieven
Zorg voor een proces om legitiem verkeer dat onterecht wordt geblokkeerd te behandelen. Link naar ons bezwaarformulier.
Real-Time Lookups Nodig?
Gebruik de Fraudcache API voor enkele IP checks, batch lookups, en gedetailleerde threat intelligence. Gratis tier inbegrepen.