2018-10-05 19:51:39 +02:00
|
|
|
# Mikrotik-Blocklist
|
|
|
|
This is a blocklist I use with on my Mikrotik router to block all connections from known spam/criminal/etc. networks.
|
|
|
|
|
2018-10-05 23:54:37 +02:00
|
|
|
Every 7 days I pull lists from:
|
|
|
|
- Spamhaus
|
|
|
|
- dShield
|
|
|
|
|
|
|
|
and reformat it to allow automatic import to MT routers.
|
2018-10-05 23:46:59 +02:00
|
|
|
|
|
|
|
## How to run this on MT
|
2018-10-05 23:54:37 +02:00
|
|
|
Run following to your MT device with not less that 7d schedule:
|
|
|
|
|
|
|
|
Download script:
|
2018-10-05 23:57:37 +02:00
|
|
|
`/tool fetch url="https://raw.githubusercontent.com/pwlgrzs/Mikrotik-Blocklist/master/blacklist.rsc" mode=https`
|
2018-10-05 23:54:37 +02:00
|
|
|
Install script:
|
2018-10-05 23:57:37 +02:00
|
|
|
`/ip firewall address-list remove [find where comment="blacklist"]
|
|
|
|
/import file-name=blacklist.rsc`
|
2018-10-05 23:54:37 +02:00
|
|
|
|
|
|
|
You'll also need firewall rule:
|
|
|
|
`/ip firewall filter add chain=input action=drop connection-state=new src-address-list=blacklist in-interface=<REPLACE>`
|
2018-10-05 23:59:05 +02:00
|
|
|
*Note: Replace above in-interface name with one you have configured*
|
2018-10-05 23:54:37 +02:00
|
|
|
## TODO
|
|
|
|
- Add more sources.
|