its do "make sense"(but community-drive alternatives like DSPAM
) may be even Better.
but presently importing/using large blacklists into ROS cause config breaking and/or router unpredictable behavior. in 6.5-6.10 its was worked ~ fine and earlier.
in past - i was used to used both Peter Lowe ad blocking list http://pgl.yoyo.org/adservers/serverlis ... =plaintext
and one of malwaredomains black lists http://mirror1.malwaredomains.com/files/BOOT
and team cymru -supplied full bogon list http://www.team-cymru.org/Services/Bogo ... s-ipv4.txt
you just blackhole then in "static" overrides in you DNS services options/DB.
(fullbogons go into "adress list" and then dropped/rejected in conntrack aswell)
its come handy especially in public networks connected hosts/endpoints(say if someone, visiting web-services and other public, populated parts of web-space), since nearly 25-30% offenses or Intel-gathering attempts come from bogons and significant part of exploitation attempts. - from "long lifetime" malware domains.