Collaborative Sec (CoSec) is a community-driven security initiative focused on sharing, curating, and maintaining high-quality threat-intelligence artifacts. Its goal is to make basic security hygiene (anti-tracking, ad blocking, abuse mitigation) simple, transparent, and reusable across different systems and environments.
CoSec emphasizes:
- Collaboration: contributions from multiple maintainers and users
- Minimalism: block what matters, avoid unnecessary breakage
- Portability: easy integration into DNS, firewall, proxy, or application layers
A curated project to block tracking, advertising, telemetry, and known abusive domains.
The list is designed to reduce noise and unwanted traffic while preserving normal functionality as much as possible.
Blocked Domains Over Time Graph
The blocked_domains list can be used in multiple contexts, such as:
- DNS blockers (Pi-hole, AdGuard, Unbound, Bind, dnsmasq)
- Firewall or proxy rules
- Application-level filtering
- Hosts-file based blocking
Typical usage pattern:
Option 1: Managed DNS (no local configuration)
- Point on your host point to
- DNS: dns.skillmio.net
- DNS1: 102.213.34.98
- DNS2: 196.61.76.76
Option 2: Self-managed integration
- Fetch the
blocked_domains.txtlist. - Load it into your blocking mechanism.
- Apply reload / restart if required.
Explore more usage options at https://skillmio.github.io/
The final blocked_domains list is generated deterministically using three inputs:
-
external_blocked_domains Trusted third-party blocklists (ads, trackers, known abuse sources)
-
candidate_domains Domains identified by the community or maintainers for potential blocking
-
exempt_domains Explicitly allowed domains to prevent breakage or false positives
The generation logic is:
blocked_domains = external_blocked_domains + candidate_domains − exempt_domains
This ensures:
- External intelligence is respected
- Local or contextual threats are included
- Critical or legitimate domains remain accessible
A maintained list of malicious or abusive IP addresses, typically associated with scanning, brute-force attacks, spam, or other hostile activity.
This list is intended for network-level enforcement.
Banned IP's Over Time Graph
The banned_ips list can be applied to:
- Firewalls (iptables, nftables, firewalld)
- Routers or gateways
- Cloud security groups
- Intrusion prevention systems
Typical usage pattern:
- Import the
banned_ipslist. - Apply it as deny / drop rules.
- Automate periodic updates.
- Review logs for accidental blocks.
The banned_ips list is assembled from:
- Logs and abuse patterns
- Community reports and observations
- Manual validation by maintainers
Before inclusion:
- IPs are checked for consistency and recurrence
- Temporary or noisy IPs may be excluded
The objective is accuracy over volume: fewer IPs, higher confidence.
Explore more usage options at https://skillmio.github.io/

