IP Block Lists

Download our Honeypot Block List for your firewall

Most of our up-to-date data is taken from the great resources gathered by Miroslav Stampar, and other reputable threat intelligence providers. In addition, we add IP addresses gathered from attacks on our own sites and honeypots.

However, the IP addresses in this CSV file are exclusively from our own honeypots. These honeypots attract thousands of automated requests per day. The listed IPs are not necessarily associated with hacking or criminal activity—they are addresses that our systems have detected scraping our sites for content (often for web crawling, SEO, or dataset building, including for large language models abroad).

In many cases, these are likely home users whose IP addresses have been temporarily allocated to automated services—sometimes without the owner's knowledge, such as when their network is used as an exit node for a VPN service.

This list does not include well-known public crawlers and bots that properly identify themselves and respect robots.txt rules. For example, you will not find IP addresses associated with Google, Meta's Llama, OpenAI, ChatGPT, Perplexity, Bing, or similar reputable services.

Third-party and public blocklists are NOT included in this file.

Here is the current list containing IPs from the previous 24 hours: ip64_org_honeypot.csv.

There are over thousands of IP addresses in the format:

                    ip,date_added
                    ip,date_added
                    ip,date_added
                

Note: USE AT YOUR OWN RISK. Many IPs will be NATs, so legit requests could come in. It is advisable, instead of blocking the IP directly, that you use a CAPTCHA.