

Since at least 2006, the P2P blocklist used by PeerGuardian has been provided by "Bluetack Internet Security Solutions".
#Peerguardian lists install#
Simply download and install one of them into your client to protect your devices from any suspicious or harmful IP addresses so you can rest easy.("Bluetack" was the name of the member of the original PeerGuardian team who owned its previous domain and created the "Block List Manager" used to maintain the list. They will give you the extra protection you are looking for when torrenting content online. Some of the above-listed collections would be excellent choices as they focus not only on ads but spyware, trackers, and many more kinds of suspicious files associated with various IP addresses.Īll you need to know is that the above blocklists are all very reputable and thorough.
#Peerguardian lists torrent#
It should not only be compatible with whatever OS or torrent client (be it Transmission, Deluge, or any other popular torrenting software) you prefer to use but it should also be able to block all the different kinds of files you consider unwanted, useless, or harmful.

Select a blocklist that covers all of your bases. In other words, you will heavily increase the number of times you will come up with false positives. Going any higher than that can lead to the nasty side effect of blocking torrents that are actually safe. Therefore, the best option you can do is to download only one blocklist, maybe two at the most. The fact is that the more blocklists you add or install, the more likely you are to accidentally block content that you don’t want to block, such as content that is totally safe or useful. Unfortunately, things are not so cut and dry. While this article has listed several of the best blocklists for torrenting, you may assume that downloading as many blocklists as possible is the best strategy for removing as many ads and unwanted malware as possible. Their blocklists come in five main categories: the (1) SBL or Spamhause blocklist that focuses on electronic mail, the (2) XBL or Spamhaus Exploits blocklist that focuses on IP addresses associated with hacks or hijacks and spam engines, the (3) PBL or Policy Block List that focuses on SMTP email, the (4) DBL or Domain Block List that focuses on domains with bad reputations, and finally, the (5) ZEN blocklist that is a combination of the SBL, XBL and PBL blocklists.

Intrigued enough to hear more? Then let’s take a look at the best blocklists you can get to protect your device while torrenting. They are easy to install and configure and are a highly recommended tool for anyone who regularly uses torrents. This list of addresses is then automatically blocked when downloading content through your torrent client, e.g.

(Psst, the safest way to download torrent data is using a secure VPN protection.)Ī torrent blocklist is a continuously maintained collection of IP addresses that are known to be snooping leechers or have malware or other unwanted and harmful files. Luckily, there are ways to protect yourself from these threats and the second-best way by far is to integrate a blocklist into your torrent client. Or even worse, having a bunch of lawyers tracking your torrenting habits. The biggest downside is accidentally downloading malware or other harmful files onto your computer. While torrenting has undoubtedly made the lives of people much easier, it has its downsides.
