vps-42ad2809.vps.ovh.net Open in urlscan Pro
2001:41d0:701:1100::5b10  Public Scan

Submitted URL: http://vps-42ad2809.vps.ovh.net/
Effective URL: https://vps-42ad2809.vps.ovh.net/
Submission: On February 12 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

oisd
 * 🛠  setup
 * 🚩  report false positive
 * 📜  included lists
 * ❓  FAQ


IMPORTANT ANNOUNCEMENT: DISCONTINUING HOSTS/DOMAINS -SYNTAX

Starting January 1st, 2024, I will be discontinuing support for HOSTS and
DOMAINS syntaxes. (Read: Stop building / providing them.)
I would like to explain why I've made this decision:

First let's look at the domain blocking possibilities:

A) Domains: baddomain.org
B) www.-prefixed domains: www.baddomain.org
C) Known subdomains: badsubdomain.baddomain.org
D) (yet) unknown subdomains: badunknownsub.baddomain.org
E) Randomly generated subdomains: bad239ue9f59gw.baddomain.org

Using HOSTS or DOMAINS syntax, you can block:
A) The domain (baddomain.org) with just one rule.
B) The www.-prefixed domain (www.baddomain.org) with an additional rule.
C) A known subdomain (badsubdomain.baddomain.org) with an added rule per each
subdomain.

However, using HOSTS or DOMAINS syntax, it becomes impossible to block:
D) Unknown subdomains (e.g., badunknownsub.baddomain.org) because they need to
be individually listed in advance.
E) Randomly generated subdomains (e.g., bad239ue9f59gw.baddomain.org) as it is
not feasible to predict or list all possible variations.

In contrast, by using a syntax like ABP, DNSmasq, Domains (wildcards), or Regex:

A) You can block the main domain (baddomain.org) with just one rule.
B) This same rule will also block the www.-prefixed domain (www.baddomain.org).
C) All known subdomains (badsubdomain.baddomain.org) are also be blocked using
that same rule.
D) Even for unknown subdomains, they will effectively be blocked with that same
rule.
E) Similarly, randomly generated subdomains will also successfully be blocked
using that same rule.

With the current approach using HOSTS / Domains syntaxes, I gather all the
subdomains available in known blocking lists and include them in the blocklist
(filtered to exclude NXDOMAINS and SERVFAILS). While this may seem like a
logical step, it also presents a certain level of illogicality and inefficiency.
Effectively, the blocklists using ABP, DNSmasq, Domains (wildcards), Regex
-syntaxes are about 4 times smaller than HOSTS / Domains -syntaxes, AND block
MORE. This is not something new, and has been known for years.

The following adblocking software will be affected;

- AdAway "No traction"
- DNS66 "No traction"
- PfBlockerNG: "AdBlock style feeds will be supported in the next version."
Source
(Note that pfBlockerNG does support wildcard blocking, but it's implementation
is wack; It won't block subdomains to already listed subdomains, eg
g.doubleclick.net should block; adclick.g.doubleclick.net,
adx.g.doubleclick.net, captive.googleads.g.doubleclick.net etc, but it does
not.)

- Requires FTL v5.22, Web v5.19 and Core v5.16.1 (or Newer) to work.
Also, if you are still using https://dbl.oisd.nl/, please update to
https://big.oisd.nl

- Diversion users; update to version 5

The following adblocking software/services are NOT affected;

- AdBlock Plus
- All AdGuard products
- AdNauseam
- AhaDNS
- BIND
- Blokada
- Blocky
- Brave
- ControlD
- DNSCloak
- DNSCrypt
- DNSMasq
- DnsWarden
- Little Snitch
- Nebulo
- NextDNS
- Opera
- PersonalDNSfilter
- Portmaster
- RethinkDNS
- Simple DNS Plus
- Technitium
- uBlock Origin
- Unbound
- Vivaldi
- YogaDNS





FALSE POSITIVE REPORT FORM UPDATE

The FP form now allows images (read screenshots) to be pasted from the clipboard
(ctrl-v) right into the message field. They will be downscaled to fit the
message area, no worries, when the report is sent, I will be able to view the
fullsize image.




GOODBYE REDDIT

I've recently decided to leave Reddit. Around 4.5 years ago, I used the platform
to make oisd accessible to the public. However, I've chosen a simpler approach
now, keeping everything on oisd.nl. The latest changes on Reddit also influenced
this decision.


You shouldn't find any false positives!
In fact, I dare you to report any ;)



WHAT IS THIS OISD BLOCKLIST ❓

The blocklist prevents your devices from connecting to unwanted or harmful
domains.
It reduces ads, decreases the risk of malware, and enhances privacy.




WHY THIS LIST 🙋

Where most other blocklists go for the "block ads/trackers and when something
breaks it's up to the user to figure out what to whitelist"-approach ..
This list prioritizes functionality over blocking.
It's the list to use at home, at work or at your (grand-)parents place.
Users report it "passes the girlfriend-test" ;)




HOW DO I USE IT ?

To use the oisd blocklist, you'll need a tool or service that can implement
domain blocking. Popular choices include Pi-hole, AdGuard Home, AdBlock Plus,
uBlock Origin, NextDNS, or others...




LAST LIST UPDATES 🥯

oisd small 2 hour(s) ago
oisd big 50 minute(s) ago
oisd nsfw 2 hour(s) ago




SPONSORS ❤️




WANTED: NSFW DOMAINS 🫶

Do you know of any NSFW (Shock/Porn/Adult) domains that are not yet blocked by
the oisd nsfw list?
Please report them here 🙏





THE BIG LIST BLOCKS 🛑

Ads, (Mobile) App Ads, Phishing, Malvertising, Malware, Spyware, Ransomware,
CryptoJacking, Scam ... Telemetry/Analytics/Tracking (Where not needed for
proper functionality)




DOES NOT INTERFERE WITH ✅

Torrent, Warez, Porn, Crypto Exchanges, News Satire, Slickdeals (or shopping
sites in general), Google (shopping), Facebook, Twitter, Snapchat, Link
Shortners, Affiliate/Tracking Links, Gambling, Surveys, etc.




THE NSFW LIST BLOCKS 🔞

Porn / Adult / Shock / Gore

Like the list? Please consider donating



OISD - Domain Blocklist
Since november 2018 |