Bon-Appetit / porn-domains

A collection of domains used for explicit adult content like porn websites. Automatically updated to stay up-to-date!
MIT License
238 stars 41 forks source link

Dead sources #9

Closed spirillen closed 10 months ago

spirillen commented 3 years ago

Hi I was looking at your source.md and found that they all seems rather dead.

URL Last time fetched (YYYY-MM-DD)
https://github.com/chadmayfield/my-pihole-blocklists/blob/master/lists/pi_blocklist_porn_top1m.list (last updated on 2 Dec 2019 2021-06-18
https://github.com/hengkiardo/blocked-sites/blob/master/sites.json (last updated 4½ years ago on 4 Jul 2017) 2021-06-18
https://github.com/mhhakim/pihole-blocklist/blob/master/porn.txt (last updated on 4 Jun) 2021-06-18

You are also writting in your readme, that you no longer test for active and inactive records.

If you still want to build anti pornographic list I would like to offer a team work with my project: https://mypdns.org/my-privacy-dns/porn-records.

Let me know what you think, more hands = more work done + higher quality lists.

spirillen commented 3 years ago

Just doing some random check of your records and this come to me britneyspears.ac where is rhe NSFW content on that domain?

spirillen commented 3 years ago

grannyporn.biz

image

spirillen commented 3 years ago

Or this one keepersecurity.co appears to be a hijacked domain

image

spirillen commented 3 years ago

tjoob.co

image

CodeAlDente commented 2 years ago

To validate domains a DNS check was run and if it returned NXDOMAIN (and only then) the domain was considered as not reachable. There's no further check, e.g. for the content. That's why there are false-positives. But they can be added to the whitelist (white.txt).

To check if a domain is still in use and not just parked, some more additional checks are required. For instance, you could check the nameservers itself.

root ~$ host -t ns grannyporn.biz
grannyporn.biz name server ns1.bodis.com.
grannyporn.biz name server ns2.bodis.com.

root ~$ host -t ns keepersecurity.co
keepersecurity.co name server ns54.domaincontrol.com.
keepersecurity.co name server ns53.domaincontrol.com.

root ~$ host -t ns tjoob.co
tjoob.co name server ns1.above.com.
tjoob.co name server ns2.above.com.

Now, I don't know how exactly domaincontrol.com is used. I think it belongs to GoDaddy and they set it up for new customer domains. But bodis.com [^1] and above.com ^2 both look like some sort of marketplaces for domains to me.

[^1]: https://www.bodis.com/#domainers; https://bodis.reamaze.com/kb/parking-domains/how-do-i-park-my-domain-names-with-bodis

spirillen commented 2 years ago

:smirk: Let me introduce my self a bit further as I t appears you are not that familiar about what I'm trying to do under thins nick.

I'm the founder of https://mypdns.org/ I'm also the dude typing some docs on PyFunceble

Next to this bodis.com seems to be a new optional .rpz-nsdname, please feel free to make reply the the issue with what you might know

About domaincontrol.com we have the same doubt, is it only used for pirated domains?

above.com They are already blacklisted at dns level. https://mypdns.org/my-privacy-dns/matrix/-/issues/1708


Back to the intention... Could you be interesting in collaborating on maintaining the lists with active contents?

CodeAlDente commented 10 months ago

Many enhancements have been implemented in managing sources, including the introduction of CSV files for both blacklist and whitelist, providing a more comprehensive view of the data. Additionally, a background process has been implemented to automatically eliminate outdated sources and identify potential duplicates or sources with content/domains that are already extensively covered. This is an ongoing process, thanks for the feedback!