This repository houses a periodically updated list of websites (first-level domains only) that are known to be blocked on the ACT Fibernet network. A current list of hostnames blocked by ACT Fibernet can be found here. Historic results are available in the output
directory.
Update 25-06-2023: A list of websites blocked by Hathway Broadband can be found here. The DNS resolvers for Hathway Broadband have also been added to the resources
folder. Support for checking websites blocked by Hathway Broadband will be added soon.
Note: The list(s) published here are not fully representative of all hostnames that might be blocked by ACT Fibernet at a given time.
date of test | total hosts | removed since last test | added since last test |
---|---|---|---|
January 8, 2024 | 13,782 | - | 278 hosts added |
January 7, 2024 | 13,504 | - | 737 hosts added |
January 2, 2024 | 12,767 | - | 2455 hosts added |
December 31, 2023 | 10,312 | - | 4226 hosts added |
June 3, 2023 | 6,086 | 32 hosts removed | 137 hosts added |
February 13, 2023 | 5,981 | - | 547 hosts added |
January 26, 2023 | 5,434 | 96 hosts removed | 128 hosts added |
May 26, 2022 | 5,402 | 87 hosts removed | 33 hosts added |
November 22, 2021 | 5,456 | 1 host removed | 1176 hosts added |
July 28, 2021 | 4,281 | - | 231 hosts added |
June 8, 2021 | 4,050 | - | 555 hosts added |
April 16, 2021 | 3,495 | 179 hosts removed | 76 hosts added |
March 28, 2021 | 3,593 | - | 3593 hosts added |
The primary web censorship technique employed by ACT Fibernet is of poisoning the DNS A record
entry for the root domain of a blocked host.
tencent.com. 0 IN A 202.83.21.14
qq.com. 0 IN A 202.83.21.14
ucweb.com. 0 IN A 202.83.21.14
The poisoned A record
entry has been documented to consistently point to only a few IP addresses. This characteristic enables fingerprinting blocked hostnames.
As a uniform list of suitable hostnames was not readily available, several publicly available domain name lists were collated and used as input. The collated list was further modified to exclude subdomains and duplicate entries.
-
Top 1 million from Alexa
-
Top 10 million from DomCop
-
Collections released by Domains Project
-
List from How India Censors the Web
-
List from Citizen Lab's reposistory
The install.sh
script can be used to install the tldextract
package using pip
, and to download, compile, and install the massdns
binary from source.
Note: python3
is required to already be installed on your system.
./run.sh <input_list.txt>
If you intend to run the script using the network of an Internet service provider other than ACT Fibernet, you will have to modify the variable defined on line 4 for identifying a blocked host.
The run.sh
script makes use of massdns to query a sizeable number of hostnames with speed, the responses of which are used for extraploating blocked hostnames. The apex.py
script extracts root-level hostnames from the results with the help of the tldextract
package. The list of root-level hostnames is then de-duplicated and saved to disk.
This repository builds on the paper How India Censors the Web authored by Kushagra Singh, Gurshabad Grover, and Varun Bansal. The primary intention behind this repository is to introduce some amount of transparency to the otherwise opaque processes associated with web censorship in India.
The captn3m0/airtel-blocked-hosts repository provides a similar list of hostnames known to be blocked on the Airtel Broadband network.