Compare website blocking effectiveness of popular public DNS servers
This tool downloads the latest feed of malicious and deceptive websites from hpHosts and looks up whether these websites are blocked on popular third-party malware-blocking and anti-phishing DNS services.
- Comodo Secure DNS
- Comodo Shield
- IBM Quad 9
- Norton ConnectSafe
- Neustar Free Recursive DNS
- OpenDNS Home
- SafeDNS
- Strongarm
- Yandex.DNS
- PSH : Sites engaged in Phishing (default)
- EMD : Sites engaged in malware distribution
- EXP : Sites engaged in hosting, development or distribution of exploits
-
Install requirements with
pip
:$ pip install -U requirements.txt
-
Run DiNgoeS with the following command:
$ python dyngoes.py
The CSV format report will be available in the same directory. Open in Excel or similar for further processing.
-o
: CSV report file name-c
: hpHosts feed:PSH
(default),EMD
orEXP
-n
: Number of websites from the hpHosts feed to test (default: 500)
Contact us on Twitter at @CryptoAUSTRALIA