Skip to content

chartingshow/crypto-firewall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2,829 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Crypto Firewall: Your Digital Shield in the Cryptocurrency Ecosystem

The Crypto Firewall is a security-focused threat intelligence and blocking system designed to protect users from crypto-related threats including phishing, scams, malware, and cryptojacking.

It provides continuously updated blocklists, filters, and indicators of compromise (IOCs) that can be deployed across browsers, operating systems, and network infrastructure.

The Crypto Firewall project is committed to enhancing your safety in the volatile crypto landscape, helping you avoid scams and protect your valuable digital assets. By implementing our strategies, you can trade with confidence and peace of mind.

If you discover a false positive or need to add a new block, then feel free to raise an Issue or a Pull request to add/remove them to the lists.

Charting Show stars package conduct docs


Table of Contents πŸ“‘

Overview

Why Crypto Firewall?

The cryptocurrency ecosystem is a high-value target for attackers. Threats evolve rapidly, and traditional protections often lag behind.

Crypto Firewall helps reduce risk by:

  • Blocking known malicious domains and infrastructure
  • Preventing access to phishing and scam sites
  • Disrupting cryptojacking and malicious scripts
  • Supporting integration with modern security tooling

Quick Start ⚑

Get protected in under 2 minutes:

  1. Install an ad blocker (recommended: Brave or uBlock Origin)
  2. Add one of the following lists to your DNS, ad blocker, or network filtering solution:
  • Lite Version (Low resource usage):

    https://raw.githubusercontent.com/chartingshow/crypto-firewall/master/src/blacklists/lite-version.txt
    
  • Full Version (Recommended):

    https://raw.githubusercontent.com/chartingshow/crypto-firewall/master/src/blacklists/full-version.txt
    
  • Mega Version (Maximum protection):

    https://raw.githubusercontent.com/chartingshow/crypto-firewall/master/src/blacklists/mega-version.txt
    
  1. (Optional) Add the Crypto Annoyances filter
  2. Restart your browser

➑️ See Installation for mega setup options

Recommended Setup βœ…

  • Most users: Full Version
  • High-performance systems / network-level blocking: Mega Version
  • Low-end devices / mobile: Lite Version
  • Testing / early adopters: Beta Version

Who is this for? 🎯

Crypto Firewall is designed for:

  • Individual traders and investors
  • Security-conscious users
  • Developers and system administrators
  • Network operators and security teams

It supports deployment at:

  • Browser level (ad blockers)
  • Operating system level (hosts file)
  • Network level (DNS, firewalls, IDS/IPS)

Threat Model 🧠

Crypto Firewall focuses on mitigating:

  • Phishing domains and scam infrastructure
  • Cryptojacking and browser-based mining
  • Malware distribution endpoints
  • Command-and-control (C2) servers
  • Fraudulent blockchain-related services

It does not protect against:

  • Zero-day exploits
  • Compromised devices or endpoints
  • Social engineering outside detectable infrastructure

What this is NOT ❗

  • Not a complete security solution
  • Not a replacement for antivirus or endpoint protection
  • Not guaranteed to block all threats

This project should be used as part of a layered security strategy.

Data & Updates πŸ”„

Blocklists are continuously updated based on:

  • Threat intelligence research
  • Community contributions
  • Ongoing analysis of emerging threats

Users should enable automatic updates wherever possible.

Getting Started

Installation ❀️

Choose where to deploy the crypto firewall at the browser level, operating system level, and/or network perimeter - for layered, comprehensive protection.

Browser Blocking 🌟

Install an ad blocker in your desktop or mobile browser that uses the Adblock Plus' filter list:

Recommended Choice ⭐

Brave Browser offers built-in ad and tracker blocking, making it an excellent choice for enhanced privacy and security.

Other Browser Choices ✨

Explore additional secure browsers like Firefox, Opera and Carbon Browser, each offering unique features such as ad-blocking, privacy enhancements and cryptocurrency support.

  • AdBlock Browser AdBlock Browser Instructions Guide - Is a fast, secure, and ad-free web browser developed by the Adblock Plus team.

  • Opera Browser Opera Browser - Includes ad blocking by default since Opera 50.

  • crypto Chrome Browser - Includes Manifest V3 by default limiting adblocker rules to only 30,000. Is the most popular browser used on the internet.

  • Vivaldi Vivaldi Browser Instructions Guide - Browse with desktop-style tabs, block ads and trackers, and sync data between devices safely.

Ad Blockers β˜€οΈ

You can use these blocklists with popular adblockers like uBlock Origin, AdAway, Blokada, AdBlock Plus and others to block malicious crypto-related domains and trackers.

Manifest V3: How Google Chrome's Update Affects Ad-Blockers πŸ‡¬

Google Chrome's Manifest V3, rolled out in June 2024, will significantly impact ad-blockers and other browser extensions. This update limits extensions to 30,000 rules, far below the 300,000 rules many ad-blockers currently use to function effectively. The change from the webRequest API to the declarativeNetRequest API will reduce ad-blockers' flexibility and ability to update rules in real-time.

While some ad-blockers like AdGuard, uBlock Origin Lite and Ghostery have adapted to Manifest V3, users may notice decreased effectiveness in blocking ads. This move has sparked controversy, with critics arguing it gives Google more control over extensions and potentially benefits its advertising business. As a result, some users are considering alternative browsers like Firefox, which has committed to continuing support for Manifest V2.

Perimeter Blocking πŸ”“

You may use the hosts file with below applications to block these miners on whole networks. Simply add the link to the above hosts file in each system.

Operating System Blocking 🌟

For system-wide protection, consider modifying your device's hosts file:

Hosts based blocking πŸ’’

For the blocking based on the HOSTS file use the below link:

Here's a simple guide on how to access your hosts file on Linux, macOS and Windows.

Crypto Annoyances (Optional Step) πŸš€

This optional filter list removes cryptocurrency-related annoyances and unwanted content to create a cleaner, less distracting browsing experience. It focuses on UI-level cleanup and tracking reduction, without breaking core site functionality.

Specifically, it:

  • Removes marketing and referral URL parameters (e.g. utm_*)
  • Hides cookie banners and compliance overlays on major exchanges (Binance, Coinbase, etc.)
  • Suppresses promoted posts and sponsored content on social platforms
  • Blocks TradingView popups, notifications, and non-essential telemetry
  • Cleans up CoinGecko and CoinMarketCap by removing ads, banners, and promotional feeds

Recommended Browser Installation Guides

Usage & Versions

Basic usage πŸ”₯

For a thorough explanation on how to add the to your adblocker, open one of the help guides found in this folder:

Recommended versions βœ…

The firewall is known to reduce performance slightly and this is why we have several different versions.

Here's a suggested guide based on cpu processors:

  • Intel i3 - use full version (if you experience bad performance then try lite version instead).

  • Intel i5 - use full version (if you experience bad performance then try lite version instead).

  • Intel i7 - use mega version (if you experience bad performance then try full version instead).

  • Intel i9 - use beta or mega versions (if you experience bad performance then try full version instead).

  • AMD Ryzen 3 - use lite version (if you experience bad performance then try full version instead).

  • AMD Ryzen 5 - use full version (if you experience bad performance then try lite version instead).

  • AMD Ryzen 7 - use mega version (if you experience bad performance then try full version instead).

  • AMD Ryzen 9 - use beta or mega versions (if you experience bad performance then try full version instead).

Here's a suggested guide based on device:

  • Laptop or Computer - use beta or mega versions (if you experience bad performance then try full version instead).
  • Tablet - use mega or full versions (if you experience bad performance then try full version instead).
  • Powerful Smartphone - use full version (if you experience bad performance then try lite version instead).
  • Low-End Smartphone - use lite version.

Stable Versions πŸ†

Lite Version

The Lite version excludes all the modules.

There are two methods to install into your adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Full Version

The Full version contains all the modules (except the crypto annoyances (stable), domains (stable), subdomains (stable), urls (stable) and adverts-filters (unstable) modules).

There are two methods to install into your adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Mega Version

The Mega version contains all the modules (except adverts-filters (unstable) module).

There are two methods to install into your adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Beta Version ⚠️

The Beta version contains all the stable and unstable modules.

To help the repo grow, please feel free to report any bugs!

There are two methods to install into your adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Blocklists & Intelligence

Free DNS / Hosting Blocking πŸ†“

This repo blocks specific free dns / hosting services, that are completely saturated with hosting malware and viruses. This is to reduce the size of the filter lists and increase the performance. A list of services currently blocked can be found in the folder here:

Bad Browser Extensions & Package Names πŸ‘¨β€πŸ’»

Malicious browser extensions pose critical risks by enabling cybercriminals to hijack browsing sessions, steal sensitive credentials and establish persistent access. These threats often masquerade as legitimate tools while exfiltrating cookies, authentication tokens and financial data.

Malicious apps are a method of manipulating users into downloading malware that allows cybercriminals to steal personal information, including login credentials or payment information. It's also possible that they can even take control of a user's device. A list of bad browser extensions and malicious package names currently blocked can be found in the following folder:

ASN Blocking πŸ—ƒοΈ

An Autonomous System Number (ASN) is a globally unique 16-digit identification number assigned by the Internet Assigned Numbers Authority (IANA) to Autonomous Systems (AS). ASNs are crucial for routing within networks and exchanging routing information with other Internet Service Providers. Autonomous systems numbered one to 64511 are available by IANA for global use. The 64512 to 65535 series is reserved for private and reserved purposes.

An Autonomous System Number (ASN) can also be blocked, be aware that ASN's contain a load of ip addresses assigned to them. You can add them to a firewall of your choice.

The ASN block list can be found here:

IP Blocking 🌐

IP Addresses can also be blocked, these contain things such as command-and-control (C2) servers for crypto malware etc. You can add them to a firewall of your choice.

The IP block list can be found here:

For a thorough explanation on how to add block an ip address in your firewall, you can open one of the help guides found in this folder:

Custom IP Block Lists πŸ“‹

These custom IP address filter lists block specific malware and can be found in the folder:

The reason why these custom lists aren't in the main IP filter list is because these IP addresses maybe shared and used for public access or hosting multiple domains! These custom IP address filter lists are for advanced users who can customize them in order to not block their access or applications.

Email Blocking πŸ“§

Email addresses can be blocked, our email block list contains known Crypto scammers, Ransomware, Sextortion and Blackmail email addresses.

The Email block list can be found here:

To learn how to protect yourself from Sextortion emails, see here:

How to Identify a Ransomware Email Attack, see here:

Spam Call Blocking ☎️

It's essential to note that tech support scammers often use spoofed or fake numbers to disguise their true location and identity. These numbers may appear legitimate, but they are actually being used to perpetuate fraudulent activities.

Remember, if you receive a suspicious call or message claiming to be from technical support, hang up immediately and do not provide any personal or financial information. Report the incident to the relevant authorities and take steps to secure your device.

A list of spam blocking mobile apps can be found here:

Wallet Addresses πŸ•΅οΈ

Avoid sending cryptocurrency to bad actors and scammers, a list of bad blockchain wallet addresses can be found here in this folder:

Transactions πŸ›‘οΈ

Cybercriminals are increasingly abusing blockchain transactions as covert communication channels, sometimes even using them as command-and-control (C2) servers to deliver malware or issue instructions. Avoid interacting with, confirming, or broadcasting any transaction hashes (txids) known to be linked to fraud, scams, or C2 activity.

A curated list of suspicious transaction hashes can be found in this folder:

Mining Pools 🦈

Avoid joining bad cryptocurrency mining pools, a list of bad blockchain mining pool addresses can be found here in this folder:

OFAC Sanctions 🚫

OFAC publishes lists of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. OFAC may add digital currency addresses to the SDN List to alert the public of specific digital currency identifiers associated with a blocked person.

The OFAC Sanctioned Digital Currency Addresses lists can be found in this folder:

How do we define sanctions data?

Sanctioned entities refer to entities listed on economic/trade embargo lists, such as by the US, EU, or UN, with which anyone subject to those jurisdictions is prohibited from dealing. Currently, this includes the Specially Designated Nationals (SDN) list of the US Department of the Treasury's Office of Foreign Assets Control (OFAC).

You can search the full list of OFAC Specially Designated Nationals in OFAC's sanctions database.

Modules

Modules βš™οΈ

This repo contains various filter list modules, which users can check out in the following folders:

Mining (Opt-in and opt-out) will be blocked by default. If you see that mining is important, you would have to whitelist the website you actually want to support.

Project & Community

Issues πŸ”¨

GitHub closed issues GitHub issues

If you face any issue, you can create a new issue in the Issues tab and we will be glad to help you out!

Changelog πŸ†

Please see CHANGELOG for more information what has changed recently.

Support / Donations πŸ’—πŸ’—πŸ’—

If you like Charting Show you can support the project's improvements and development of new features with a donation to our collective.

πŸ‘‰ https://opencollective.com/chartingshow

Sponsors ✨

Support us by becoming a sponsor. Your logo will show up here with a link to your website. [Become a sponsor]

Backers ✨

Thank you to all our backers! πŸ™ [Become a backer]

Contributions ✨

This project exists thanks to all the people who contribute.

We are actively inviting new contributors! To get started, please read the contribution guide.

This project is only possible thanks to the work of many dedicated contributors. Everyone is encouraged to help in ways large and small. Here are a few ways you can contribute:

  • Review existing content and help fix spelling, grammar, or clarity issues
  • Pick an open issue and submit a pull request
  • Open a new issue to suggest improvements, report bugs, or propose features

Contribution Terms

By submitting a contribution (including pull requests, issues, or any form of content), you agree that your contributions will be licensed under the GNU General Public License v3.0 (GPL-3.0).

You also confirm that:

  • You have the legal right to contribute the content
  • Your contribution does not violate any third-party rights
  • Any included third-party material complies with its respective licensing terms

Requesting Icons 🎁

When you want to request a icon please feel to create a issue. See our contribution guidelines for more information.

Security & Legal

Security πŸ”

We take security seriously and appreciate responsible disclosure.

If you discover a security vulnerability, please report it privately by contacting the maintainers rather than opening a public issue. This allows us to investigate and address the issue without exposing users to unnecessary risk.

For general bugs, false positives, or feature requests, please use the GitHub Issues tab.

Disclaimer ⚠️

No Warranty

This software is provided "as is", without warranty of any kind, express or implied, including but not limited to:

  • Fitness for a particular purpose
  • Reliability or availability
  • Protection against all security threats

See the GNU General Public License v3.0 for full details.

Limitation of Liability

In no event shall the maintainers or contributors be held liable for:

  • Financial loss (including cryptocurrency loss)
  • Security breaches or system compromise
  • Data loss or corruption
  • Service disruption or downtime
  • Any direct, indirect, incidental, or consequential damages

arising from the use of this project.

False Positives

Due to the nature of threat intelligence and filtering systems:

  • Legitimate domains, IPs, or services may be incorrectly blocked
  • Malicious actors may evade detection

Users are responsible for reviewing and validating the data before applying it in production environments.

Financial Disclaimer

This project does not provide financial or investment advice.

Users should always conduct their own due diligence when interacting with cryptocurrency platforms, wallets, or transactions.

Use at Your Own Risk

By using this project, you acknowledge that:

  • Security is a constantly evolving landscape
  • No solution can provide complete protection
  • You are solely responsible for how you implement and use this project

Legal βš–οΈ

This project provides curated blocklists, filtering rules, and security guidance intended to help reduce exposure to malicious activity within the cryptocurrency ecosystem.

Scope and Purpose

Crypto Firewall is a defensive security resource, not a guarantee of protection. It is designed to assist users in identifying and blocking known threats, but it should be used as part of a broader security strategy.

This project does not function as a traditional firewall appliance, and should not be relied upon as a sole line of defense.

Data Sources

Data included in this project is derived from a combination of:

  • Publicly available threat intelligence sources
  • Community contributions
  • Independent research

While we aim for accuracy and relevance, we do not guarantee the completeness, accuracy, or timeliness of any data provided.

Third-Party Services

This project may reference third-party platforms, services, or trademarks (e.g. exchanges, browsers, tools).

All trademarks, logos, and brand names are the property of their respective owners.

This project is not affiliated with, endorsed by, or associated with any third-party services mentioned.

License πŸ“„

Copyright (c) Charting Show.

This project is licensed under the GNU General Public License v3.0 (GPL-3.0).

You are free to:

  • Use, study, and run the software
  • Modify and adapt the code
  • Distribute original or modified versions

provided that any derivative work is also licensed under GPL-3.0.

For full license terms, see the LICENSE file or visit: https://www.gnu.org/licenses/gpl-3.0

Many Thanks to all the Stargazers who have supported this project with stars(⭐)

stars

SEO Keywords

crypto security, crypto firewall, crypto scam protection, phishing protection, malicious domains, IP blocklist, ASN blocking, Web3 security, DeFi security, scam wallet blacklist, adblock crypto filter, DNS filtering, network security, threat intelligence, fraud prevention, crypto malware, browser protection, crypto phishing sites

⬆ back to top

Made with ❀️ for the Decentralized World.