Skip to content

chartingshow/crypto-firewall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2,865 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

The Crypto Firewall is a threat intelligence and blocking system built to defend against crypto-related threats including phishing, scams, malware, and cryptojacking.

With continuously updated blocklists, filters, and indicators of compromise (IOCs), it can be deployed across browsers, operating systems, and networksβ€”helping you stay protected in an increasingly hostile crypto environment.

If you discover a false positive or need to add a new block, then feel free to raise an Issue or a Pull request to add/remove them to the lists.

Charting Show stars package conduct docs

Table of Contents πŸ“‘

Overview

Crypto Firewall is a threat intelligence and blocking system designed to defend against crypto-related threats including phishing, scams, malware, and cryptojacking.

It provides continuously updated blocklists and indicators of compromise (IOCs) for use across browsers, operating systems, and network-level security tools.

Why Crypto Firewall?

The cryptocurrency ecosystem is a high-value target for attackers, with threats evolving faster than traditional protections.

Crypto Firewall reduces risk by:

  • Blocking malicious domains and infrastructure
  • Preventing phishing and scam access
  • Disrupting cryptojacking and malicious scripts
  • Integrating with modern security tooling

Quick Start ⚑

Get protected in under 2 minutes:

  1. Install an adblocker (e.g. Brave or uBlock Origin)
  2. Add one list:
  • Lite (low resource):
https://raw.githubusercontent.com/chartingshow/crypto-firewall/master/src/blacklists/lite-version.txt
  • Full (recommended):
https://raw.githubusercontent.com/chartingshow/crypto-firewall/master/src/blacklists/full-version.txt
  • Mega (maximum protection):
https://raw.githubusercontent.com/chartingshow/crypto-firewall/master/src/blacklists/mega-version.txt
  1. Restart your browser

➑️ See Installation for advanced setups

Recommended Setup
  • Most users: Full
  • High-performance / network-level: Mega
  • Low-end devices / mobile: Lite
  • Testing / early adopters: Beta
Who is this for?
  • Individual traders and investors
  • Security-conscious users
  • Developers and system administrators
  • Network operators and security teams

Supports deployment at:

  • Browser level (adblockers)
  • OS level (hosts file)
  • Network level (DNS, firewalls, IDS/IPS)
Threat Model

Mitigates:

  • Phishing and scam infrastructure
  • Cryptojacking (browser-based mining)
  • Malware distribution endpoints
  • Command-and-control (C2) servers
  • Fraudulent blockchain services

Does not cover:

  • Zero-day exploits
  • Compromised endpoints
  • Social engineering outside detectable infrastructure
Scope & Limitations
  • Not a complete security solution
  • Not a replacement for antivirus or endpoint protection
  • Not guaranteed to block all threats

Use as part of a layered security strategy.

Data & Updates

Blocklists are continuously updated from:

  • Threat intelligence research
  • Community contributions
  • Ongoing analysis of emerging threats

Enable automatic updates where supported.

Getting Started

Installation ❀️

Deploy Crypto Firewall at the browser, system, and/or network level to achieve layered protection.

Browser Blocking 🌟

Use a browser that supports Adblock Plus-compatible filter lists.

Recommended ⭐

Built-in ad and tracker blocking with strong privacy defaults.

Alternatives ✨

Ad Blockers β˜€οΈ

Use these tools with the provided filter lists:

Network / DNS Filtering πŸ”“

Deploy filtering at the DNS or network layer for system-wide enforcement.

Firewalls / IDS / SIEM πŸ›‘οΈ

Use for advanced monitoring, detection, and enforcement:

Operating System Blocking 🌟

Apply system-wide blocking via hosts file:

Hosts Lists

Crypto Annoyances (Optional) πŸš€

Removes UI clutter, tracking, and promotional noise without breaking core functionality.

Quick install:

Usage & Versions

Basic usage πŸ”₯

For a thorough explanation on how to add the lists to your adblocker, open one of the help guides found in this folder:

Recommended versions βœ…

Filtering may impact performance. Choose a version based on your device capability:

Suggested Versions (Performance & Device)

Choose a version based on your device performance. If unsure, start with full and adjust based on performance.

  • Low-End Devices β†’ lite (upgrade to full if stable)

  • Mid-Range Devices β†’ full (downgrade to lite if needed)

  • High-Performance Devices β†’ mega (fallback: full)

  • Enthusiast / Workstations β†’ mega or beta (fallback: full)

Stable Versions πŸ†

Lite Version

The Lite version excludes all the modules.

There are two methods to install into your Adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Full Version

The Full version contains all the modules (except the crypto annoyances (stable), domains (stable), subdomains (stable), urls (stable) and adverts-filters (unstable) modules).

There are two methods to install into your Adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Mega Version

The Mega version contains all the modules (except adverts-filters (unstable) module).

There are two methods to install into your Adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Beta Version ⚠️

The Beta version contains all the stable and unstable modules.

To help the repo grow, please feel free to report any bugs!

There are two methods to install into your Adblocker:

  1. Click the link below:
  1. Copy and paste the link in the settings of the ad-blocker:

Blocklists & Intelligence

Core Infrastructure Blocking 🌐

Application & User Threats πŸ‘¨β€πŸ’»

Blockchain Threat Intelligence πŸ•΅οΈ

Sanctions & Compliance 🚫

Modules

Overview βš™οΈ

Crypto Firewall modules are grouped by threat type and use case:

Core Threat Categories 🚨

Primary security filters targeting high-risk threats.

Infrastructure & Network 🌐

Focuses on domains, botnets, and network-level indicators.

Content & Behaviour 🧠

Targets ads, tracking, and misleading content.

Specialised Threats 🎯

Targeted filters for specific attack vectors.

Project & Community

Issues πŸ”¨

GitHub closed issues GitHub issues

If you face any issue, you can create a new issue in the Issues tab and we will be glad to help you out!

Changelog πŸ†

Please see CHANGELOG for more information what has changed recently.

Support / Donations πŸ’—πŸ’—πŸ’—

If you like Charting Show you can support the project's improvements and development of new features with a donation to our collective.

πŸ‘‰ https://opencollective.com/chartingshow

Sponsors ✨

Support us by becoming a sponsor. Your logo will show up here with a link to your website. [Become a sponsor]

Backers ✨

Thank you to all our backers! πŸ™ [Become a backer]

Contributions ✨

This project exists thanks to all the people who contribute.

We are actively inviting new contributors! To get started, please read the contribution guide.

This project is only possible thanks to the work of many dedicated contributors. Everyone is encouraged to help in ways large and small. Here are a few ways you can contribute:

  • Review existing content and help fix spelling, grammar, or clarity issues
  • Pick an open issue and submit a pull request
  • Open a new issue to suggest improvements, report bugs, or propose features

Contribution Terms

By submitting a contribution (including pull requests, issues, or any form of content), you agree that your contributions will be licensed under the GNU General Public License v3.0 (GPL-3.0).

You also confirm that:

  • You have the legal right to contribute the content
  • Your contribution does not violate any third-party rights
  • Any included third-party material complies with its respective licensing terms

Requesting Icons 🎁

When you want to request a icon please feel to create an issue. See our contribution guidelines for more information.

Security & Legal

Security πŸ”

We take security seriously and support responsible disclosure.

If you discover a security vulnerability, report it privately to the maintainers rather than opening a public issue. This enables safe investigation and remediation.

For bugs, false positives, or feature requests, use the GitHub Issues tab.

Disclaimer ⚠️

No Warranty

This software is provided "as is", without warranty of any kind, express or implied, including but not limited to:

  • Fitness for a particular purpose
  • Reliability or availability
  • Protection against all security threats

See the GNU General Public License v3.0 for full terms.

Limitation of Liability

Maintainers and contributors shall not be liable for:

  • Financial loss (including cryptocurrency loss)
  • Security breaches or system compromise
  • Data loss or corruption
  • Service disruption or downtime
  • Any direct, indirect, incidental, or consequential damages

arising from use of this project.

False Positives

Filtering and threat intelligence are inherently imperfect:

  • Legitimate domains, IPs, or services may be blocked
  • Malicious infrastructure may evade detection

Validation is required before production use.

Financial Disclaimer

No financial or investment advice is provided. Independent due diligence is required for all cryptocurrency activity.

Use at Your Own Risk

Security is an evolving domain. No solution provides complete protection. Responsibility for implementation and use remains with the user.

Legal βš–οΈ

This project provides curated blocklists, filtering rules, and security guidance to reduce exposure to malicious activity in the cryptocurrency ecosystem.

Scope and Purpose

Crypto Firewall is a defensive security resource, not a standalone security control or guaranteed protection mechanism. It should be deployed as part of a layered security strategy.

Data Sources

Data is derived from:

  • Public threat intelligence sources
  • Community contributions
  • Independent research

Accuracy, completeness, and timeliness are not guaranteed.

Third-Party Services

References to third-party platforms, tools, or trademarks are for informational purposes only.

All trademarks remain the property of their respective owners. No affiliation or endorsement is implied.

License πŸ“„

Copyright (c) Charting Show.

This project is licensed under the GNU General Public License v3.0 (GPL-3.0).

You are free to:

  • Use, study, and run the software
  • Modify and adapt the code
  • Distribute original or modified versions

provided that any derivative work is also licensed under GPL-3.0.

For full license terms, see the LICENSE file or visit: https://www.gnu.org/licenses/gpl-3.0

Many Thanks to all the Stargazers who have supported this project with stars(⭐)

stars

SEO Keywords

crypto security, crypto firewall, crypto scam protection, phishing protection, malicious domains, IP blocklist, ASN blocking, Web3 security, DeFi security, scam wallet blacklist, adblock crypto filter, DNS filtering, network security, threat intelligence, fraud prevention, crypto malware, browser protection, crypto phishing sites

⬆ back to top

Made with ❀️ for the Decentralized World.