This collection of domain names, IP addresses and ASNs has been gathered from the TikTok mobile application. It is primarily intended for use in pfSense, OPNsense, Pi-hole, etc., to effectively block TikTok application network-wide.
The data was compiled by analyzing the TikTok application's traffic on mobile devices, performing packet inspections, and examining the TikTok API.
TikTok uses DNS over HTTPS (DoH) and DNS over TLS (DoT) to resolve its domains if the primary DNS resolver fails. Therefore, simply using a DNS blacklist is insufficient. You must also block all outbound traffic on port 53 TCP/UDP to prevent the application from using alternative DNS servers. Additionally, ensure you block DoH and DoT.
-
Install the
pfBlockerNGpackage tutorial. -
Add DNS Block List
Navigate to
Firewall > pfBlockerNG> DNSBL > DNSBL GroupsClick
AddName and Description:
TikTokState:
ONSource:
https://raw.githubusercontent.com/M4jx/TikTokBlockList/main/hostsHeader/Label:
TikTokSave
-
Add IPv4 Block List
Navigate to
Firewall > pfBlockerNG> IP > IPv4Click
AddName and Description:
TikTokState:
ONSource:
https://raw.githubusercontent.com/M4jx/TikTokBlockList/main/ipv4sHeader/Label:
TikTokAction:
Deny BothUpdate Frequency:
Once a daySave
-
Add IPv6 Block List
Navigate to
Firewall > pfBlockerNG> IP > IPv6Click
AddName and Description:
TikTokState:
ONSource:
https://raw.githubusercontent.com/M4jx/TikTokBlockList/main/ipv6sHeader/Label:
TikTokAction:
Deny BothUpdate Frequency:
Once a daySave
-
Add ASN Block List
Navigate to
Firewall > pfBlockerNG> IP > IPv4Click
AddNow, create a new entry for each ASN in the asns file:
State:
ONSource: ASN_NUMBER_HERE
Action:
Deny BothUpdate Frequency:
NeverSave
-
Reload rules
Navigate to
Firewall > pfBlockerNG > UpdateSelect 'Force' option:
ReloadSelect 'Reload' option:
All
You need to run a local DNS resolver/server to perform DNS queries. If you block outbound DNS without a local DNS resolver, you won't be able to resolve any domains. If you're using pfBlockerNG for DNS blocking or piHole, you are likely already using a local DNS server on your box.
-
Navigate to
Firewall > Rules > Floating. -
Add new rule.
Action:
BlockQuick: ✅
Interface:
WANDirection:
OutAddress Family:
IPv4Protocol: T
CP/UDPDestination Port Range:
DNS (53)Description:
Block Outbound DNS
- Navigate to
Firewall > pfBlockerNG > DNSBL > DNSBL SafeSearch. - Enable
DoH/DoT/DoQ Blocking. - Select all entries in
DoH/DoT/DoQ Blocking List - Click Save
Feel free to create a pull request to add more data to the list.