2018-10-06 00:02:10 +02:00
|
|
|
# Mikrotik-Blacklist
|
2018-10-05 19:51:39 +02:00
|
|
|
This is a blocklist I use with on my Mikrotik router to block all connections from known spam/criminal/etc. networks.
|
|
|
|
|
2018-10-05 23:54:37 +02:00
|
|
|
Every 7 days I pull lists from:
|
2018-10-06 00:20:09 +02:00
|
|
|
- Spamhaus (DROP & EDROP)
|
2018-10-05 23:54:37 +02:00
|
|
|
- dShield
|
|
|
|
|
|
|
|
and reformat it to allow automatic import to MT routers.
|
2018-10-05 23:46:59 +02:00
|
|
|
|
|
|
|
## How to run this on MT
|
2018-10-05 23:54:37 +02:00
|
|
|
Run following to your MT device with not less that 7d schedule:
|
|
|
|
|
|
|
|
Download script:
|
2018-10-06 00:19:25 +02:00
|
|
|
`/tool fetch url="https://raw.githubusercontent.com/pwlgrzs/Mikrotik-Blacklist/master/blacklist.rsc" mode=https`
|
2018-10-05 23:54:37 +02:00
|
|
|
Install script:
|
2018-10-06 11:32:26 +02:00
|
|
|
`/ip firewall address-list remove [find where comment="blacklist"]; /import file-name=blacklist.rsc`
|
2018-10-05 23:54:37 +02:00
|
|
|
|
2018-10-05 23:59:17 +02:00
|
|
|
You'll also need firewall rule:
|
2018-10-06 11:32:26 +02:00
|
|
|
`/ip firewall filter add chain=input action=drop connection-state=new src-address-list=blacklist in-interface=IFNAME`
|
|
|
|
*Note: Replace IFNAME in-interface name with one you have configured*
|
2018-10-06 10:20:13 +02:00
|
|
|
|
|
|
|
Check out more detailed instructions [here](https://pawelgrzes.pl/blog/mikrotik-blacklist).
|
2018-10-06 11:43:04 +02:00
|
|
|
|
|
|
|
You can also import install.rsc file, it will do all of above for you.
|
2018-10-06 11:44:08 +02:00
|
|
|
Upload to MT and `run /import file-name=install.rsc` in terminal. You still need to manually add firewall rule.
|
2018-10-05 23:54:37 +02:00
|
|
|
## TODO
|
|
|
|
- Add more sources.
|