Introduction

Cyberblock DB service creates and regularly updates security databases from numerous sources used by security professionals. Several different types of databases are provided.

Domain lists

Cyber security products utilize domain lists to identify which websites present threats to the network. This approach has been used in many large organization cyber security products and is starting to be used in home networking products.

Any domain can be on this list however, it is more valuable when a list has a common theme or category. For instance a list that contains domains that host ads can be separated from another list that is domains for social media. These lists can be selected by security products to either block or allow traffic depending on the application of the users and levels of protection required.

Users of Cyberblock DB are free to select which combination of lists are applicable to their own home network. Some users may wish to utilize the default lists that block broad recommended categories like cyber threats. Other users may want to utilize several specific category lists.

More information about the domain list categories can be found on the Tech Info page.

Typical Applications

Domain lists are most commonly used in home networks for DNS filtering. Existing ad blocking solutions typically utilize DNS filtering to prevent many ads from being displayed. These same ad blocking solutions can then utilize the domain lists from Cyberblock DB to provide additional protection to the home network in addition to filtering ads.

An example of a home network ad blocking solution is Pi-Hole. Pi-Hole has been tested and is fully compatible with the domain block lists provided by Cyberblock DB. Many other ad blockers are also compatible with Cyberblock DB's lists.

Domain lists can also be utilized by web proxy filters like Squid Guard.

More information about the compatible products can be found on the Compatible Security Products page.

Bad IP List

In development.

A Bad IP list is simply a list of IP addresses on the Internet that are known to source bad traffic.

Typical Applications

Bad IP lists are typically used by firewall products. This stops communication between the home network and known bad hosts on the Internet at the lowest levels. Even before communication even starts.

What Cyberblock DB Doesn't do

Cyberblock DB requires users to have already implemented a network security framework as Cyberblock DB only provides threat database files. It does not provide technical support for the home networking products that are capable of using the Cyberblock DB database files.

All cyber security products, for home or business, are all designed to limit content and functionality on the Internet. When Internet functionality is adversely affected for a specific home network, Cyberblock DB will not perform the specific debugging and configuration necessary to restore that functionality. This responsibility is left to the home network owner given their specific situation and Internet usage desires.

Home networking products that utilize Cyberblock DB's databases all allow for local overrides. This allows home network owners to customize or override specific content in the Cyberblock DB delivered databases for their specific needs. This will allow a home network owner to restore functionality to a website that the Cyberblock DB databases have prevented access to.

Cyberblock DB customers may provide feedback when they believe a certain entity shouldn't be in our database products. However, it's up to Cyberblock DB's analysis and decision to implement any recommended changes.

The "general purpose" and "turn key" databases provided by Cyberblock DB are not intended to interfere with the normal Internet experience for the majority of users. However, other categories are specifically tailored for limiting specific functionality. A good example would be the IoT and Updates categories. These categories intentionally limit the connectivity of devices. The updates category would be useful on networks with an expensive Internet connection where fees are based on network usage. The IoT category is useful when you want to block IoT and appliance products from certain sites on the Internet for privacy reasons. There may be circumstances when customers want to block certain functionality but allow others and this is their responsibility to determine and configure the databases appropriately.