Press "Enter" to skip to content

Raspberry Pi: Improve your Pi-hole with great adlists and an auto updater

I installed the Pi-hole on a Raspberry Pi. Pi-hole is a DNS server for your home network. I have it running on a Raspberry Pi 1, so it’s nice to have a use for my old Raspberry here. It also runs on a Raspberry Zero. Pi-hole is a DNS sinkhole (/blackhole) and is used to block unwanted domains without installing any software on the clients.

I use my Pi-hole mostly…

  • to block phishing, cryptomining, spam and malware sites
  • to block ads and advertising pages
  • to block telemetry data

and this …

  • on all devices (Smart TV, IoT, PC, mobile)
  • without installing any tools on your devices

Instead of blocking ads via browser add-ons, a DNS server can do this globally for all devices and browsers. This means that even the Smart TV with the YouTube app no longer shows ads. Even the cheap IP-Cams from China cannot send telemetry data home. All requests are logged and can also be manually added to the block list.

With Pi-hole you can track your clients and for example the top blocked domains.

You can use public filter lists as source but you can also add custom domains you want to have blocked. Now I would like to share with you my personal collection of filter lists that I have put together. I have been running very well with them for several months now.

First I would like to gather together what is especially important to me about these lists:

  • A suitable source are the lists as used by the browser add-ons of the antivirus manufacturers. The lists are actually publicly available. They can even be sniffed if you want to use the same list from a specific add-on you’ve used before.
  • The filter list should be updated regular. There are many outdated list available on GitHub. Select only filter lists which are updated daily. No phishing attack will take place on an old domain which is known for sharing malware.
  • Use the same lists as tools like Google Safe Browsing. I’ve reported some phishing pages before and it does take just a few hours until a new phishing page is part of such a huge filter list as the Google Safe Browsing list. Many other commercial and cooperate DNS filters use this as a source too.

I’ve moved my filter list collection to a GitHub repository because there it will be better maintained.

Don’t forget to look at my latest pi-hole setup here.

Leave a Reply

Your email address will not be published. Required fields are marked *