Tip: Block Spam better with hostiles.txt

By Aaron.Walkhouse

This is an expanded list for protection against malware, spammers and other abusers of gnutella. It is compiled from many sources, including the lists from BlueTack Internet Security Systems and my own scans of the network for defective nodes, over a dozen types of trojan, the top ten worms and about a dozen classes of spam. It was started in 2004 for BearShare, then LimeWire started using it in 2006 and FrostWire acquired the capability soon afterwards.

It has grown to fit the task over the past 5 years and has become effective against all kinds of hazards while
enhancing performance (despite it’s size) due to steadily improving intelligence on every kind of threat on Gnutella. It now averages 400,000 rules, effectively blocking everything but us.

Needless to say, this makes for a large list. It tend to cut the noise level down so you can get
some searching done without having to wade through mountains of trash. Now it’s just hills. 🙂

How to use the list:

  1. Download the list
  2. Unzip the file and copy the file “hostiles.txt” to your FrostWire settings directory. (Replace any hostiles.txt if you had any since the lists are often updated)
  3. Start/Restart FrostWire

Where’s the FrostWire Settings Folder?

In Windows it could be on any of these two locations:

C:\Documents and Settings\YOUR_NAME\Application Data\FrostWire
C:\Documents and Settings\YOUR_NAME\.frostWire

In Vista:


In Mac OSX


In Linux


Once you’ve done this, you’ll hardly see any fake search results, and your FrostWire will consume less bandwidth from incoming unwanted queries

10 thoughts on “Tip: Block Spam better with hostiles.txt

  1. i just got scammed, but had to redownload and got a different site- this one…called for a refund and they didn’t give me a problem. Thanks for the heads-up!

  2. Just recently installed Frostwire and there is no settings folder in C:\Documents and Settings\[name]\Application Data\FrostWire

    Do you just make a folder named settings?

  3. I put the hostiles file in the correct directory and tested it many many times by putting an ip# that i know always shows up on this file to download and it still shows up as a user to download from when searching for file. I can put the same ip# in the ip block inside frostwire and it blocks the ip#, but not in this list.

    It takes 10 secs to load this file in notepad, so it would take frostwire atleast that long, which frostwire loading time never increased.

    I have the lastest java, frostwire 4.18.0, xp.

    This is a false since of security if this is not working for anyone and there ip#’s are being showed to goverment agents becuase of not being blocked when you think it is.

    Has anyone actually tested this file loading and blocking in 4.18.0??

  4. what am i doing wrong ? downloaded lastest frostwire but after iv download video i wanted im un able to get it to play in windows media player,no problem with music downloads only video ,can anyone help please

  5. In windows you can use:

    XP: Start -> Run – Type in: %appdata%\Frostwire

    Vista: Open an Explorer Window and type in the addressbar: %appdata%\roaming\frostwire

  6. I’ve only basic computer knowledge. I tried to folow the instructions given by downloading the hostiles.txt list and locating Frostwire onmy computer. I copied the file, but I’m lost after that. Can I get step-by-step instructions as how to copy this file to the Frostwire settings locations?


  7. Hey @all:

    @G. GARNER,
    which FrostWire (FW) version do you use?
    Version 5.X.XX.X + and up? or version 4.21.8 (the latest official gnutella-network based version).
    If you use a version higher than v.5, then you can’t use the hostfiles.txt, because i think this file maybe only for versions which are supporting the gnutella network.

    @KW: To test if your IP-Filter works, just type any letter-phrases like “xsfsdjdfskdjcnkjsdfnkl123” or “2662hsdhjsdhcbsdhca22s897” or something like this in the search field.
    If you find more matches which are fakes or harmful software, then add these IPs to your filter too! 🙂


Leave a Reply to James Cancel reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s