So we know comcast messes with internet traffic. We know they own and definitely slow down their fiber nodes when non comcast traffic passes through their network. How about we just end that fiasco. Here is a quick way to end that using IPtables as our firewall
This can be entered on any router and any linux system with IPtables which makes it so versatile
YMMV with this block but no services I use ever are hosted on the IP ranges. They do run through them which can noticeably throttle netflix and other streaming services. Thats annoying isnt it. Another service provider has the audacity to slow YOUR connection down.
Thankfully Comcast does regularly update their dynamic IP space found here
https://postmaster.comcast.net/dynamic-IP-ranges.html
What to do now? Make a script containing the following and reap the benefits if there are any. it could just be a placebo but tbch it makes me happy while I surf the internet knowing my traffic isnt touching their servers or being slowed down by them
THIS WILL NOT WORK IF YOU USE COMCAST please dont block your own provider.
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
Version 2, December 2004
Copyright (C) 2004 Sam Hocevar <[email protected]>
Everyone is permitted to copy and distribute verbatim or modified
copies of this license document, and changing it is allowed as long
as the name is changed.
DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. You just DO WHAT THE FUCK YOU WANT TO.
1. Author -- HEIMDALLR
iptables -I FORWARD -s 24.0.0.0/12 -j REJECT
iptables -I FORWARD -s 24.16.0.0/13 -j REJECT
iptables -I FORWARD -s 24.30.0.0/17 -j REJECT
iptables -I FORWARD -s 24.34.0.0/16 -j REJECT
iptables -I FORWARD -s 24.60.0.0/14 -j REJECT
iptables -I FORWARD -s 24.91.0.0/16 -j REJECT
iptables -I FORWARD -s 24.98.0.0/15 -j REJECT
iptables -I FORWARD -s 24.118.0.0/16 -j REJECT
iptables -I FORWARD -s 24.125.0.0/16 -j REJECT
iptables -I FORWARD -s 24.126.0.0/15 -j REJECT
iptables -I FORWARD -s 24.128.0.0/16 -j REJECT
iptables -I FORWARD -s 24.129.0.0/17 -j REJECT
iptables -I FORWARD -s 24.130.0.0/15 -j REJECT
iptables -I FORWARD -s 24.147.0.0/16 -j REJECT
iptables -I FORWARD -s 24.218.0.0/16 -j REJECT
iptables -I FORWARD -s 24.245.0.0/18 -j REJECT
iptables -I FORWARD -s 50.128.0.0/10 -j REJECT
iptables -I FORWARD -s 65.34.128.0/17 -j REJECT
iptables -I FORWARD -s 65.96.0.0/16 -j REJECT
iptables -I FORWARD -s 66.30.0.0/15 -j REJECT
iptables -I FORWARD -s 66.41.0.0/16 -j REJECT
iptables -I FORWARD -s 66.56.0.0/18 -j REJECT
iptables -I FORWARD -s 66.176.0.0/15 -j REJECT
iptables -I FORWARD -s 66.229.0.0/16 -j REJECT
iptables -I FORWARD -s 67.160.0.0/12 -j REJECT
iptables -I FORWARD -s 67.176.0.0/15 -j REJECT
iptables -I FORWARD -s 67.180.0.0/14 -j REJECT
iptables -I FORWARD -s 67.184.0.0/13 -j REJECT
iptables -I FORWARD -s 68.32.0.0/11 -j REJECT
iptables -I FORWARD -s 68.80.0.0/14 -j REJECT
iptables -I FORWARD -s 68.84.0.0/16 -j REJECT
iptables -I FORWARD -s 69.136.0.0/15 -j REJECT
iptables -I FORWARD -s 69.138.0.0/16 -j REJECT
iptables -I FORWARD -s 69.139.0.0/17 -j REJECT
iptables -I FORWARD -s 69.140.0.0/14 -j REJECT
iptables -I FORWARD -s 69.180.0.0/15 -j REJECT
iptables -I FORWARD -s 69.242.0.0/15 -j REJECT
iptables -I FORWARD -s 69.244.0.0/14 -j REJECT
iptables -I FORWARD -s 69.248.0.0/14 -j REJECT
iptables -I FORWARD -s 69.253.0.0/16 -j REJECT
iptables -I FORWARD -s 69.254.0.0/15 -j REJECT
iptables -I FORWARD -s 71.56.0.0/13 -j REJECT
iptables -I FORWARD -s 71.192.0.0/12 -j REJECT
iptables -I FORWARD -s 71.224.0.0/12 -j REJECT
iptables -I FORWARD -s 73.0.0.0/8 -j REJECT
iptables -I FORWARD -s 75.64.0.0/13 -j REJECT
iptables -I FORWARD -s 75.72.0.0/15 -j REJECT
iptables -I FORWARD -s 75.74.0.0/16 -j REJECT
iptables -I FORWARD -s 75.75.0.0/17 -j REJECT
iptables -I FORWARD -s 75.75.128.0/18 -j REJECT
iptables -I FORWARD -s 76.16.0.0/12 -j REJECT
iptables -I FORWARD -s 76.97.0.0/16 -j REJECT
iptables -I FORWARD -s 76.98.0.0/15 -j REJECT
iptables -I FORWARD -s 76.100.0.0/14 -j REJECT
iptables -I FORWARD -s 76.104.0.0/13 -j REJECT
iptables -I FORWARD -s 76.112.0.0/12 -j REJECT
iptables -I FORWARD -s 98.192.0.0/13 -j REJECT
iptables -I FORWARD -s 98.200.0.0/14 -j REJECT
iptables -I FORWARD -s 98.204.0.0/16 -j REJECT
iptables -I FORWARD -s 98.206.0.0/15 -j REJECT
iptables -I FORWARD -s 98.208.0.0/12 -j REJECT
iptables -I FORWARD -s 98.224.0.0/12 -j REJECT
iptables -I FORWARD -s 98.240.0.0/16 -j REJECT
iptables -I FORWARD -s 98.242.0.0/15 -j REJECT
iptables -I FORWARD -s 98.244.0.0/14 -j REJECT
iptables -I FORWARD -s 98.248.0.0/13 -j REJECT
iptables -I FORWARD -s 107.2.0.0/15 -j REJECT
iptables -I FORWARD -s 107.4.0.0/15 -j REJECT
iptables -I FORWARD -s 174.48.0.0/12 -j REJECT
iptables -I OUTPUT -s 24.0.0.0/12 -j REJECT
iptables -I OUTPUT -s 24.16.0.0/13 -j REJECT
iptables -I OUTPUT -s 24.30.0.0/17 -j REJECT
iptables -I OUTPUT -s 24.34.0.0/16 -j REJECT
iptables -I OUTPUT -s 24.60.0.0/14 -j REJECT
iptables -I OUTPUT -s 24.91.0.0/16 -j REJECT
iptables -I OUTPUT -s 24.98.0.0/15 -j REJECT
iptables -I OUTPUT -s 24.118.0.0/16 -j REJECT
iptables -I OUTPUT -s 24.125.0.0/16 -j REJECT
iptables -I OUTPUT -s 24.126.0.0/15 -j REJECT
iptables -I OUTPUT -s 24.128.0.0/16 -j REJECT
iptables -I OUTPUT -s 24.129.0.0/17 -j REJECT
iptables -I OUTPUT -s 24.130.0.0/15 -j REJECT
iptables -I OUTPUT -s 24.147.0.0/16 -j REJECT
iptables -I OUTPUT -s 24.218.0.0/16 -j REJECT
iptables -I OUTPUT -s 24.245.0.0/18 -j REJECT
iptables -I OUTPUT -s 50.128.0.0/10 -j REJECT
iptables -I OUTPUT -s 65.34.128.0/17 -j REJECT
iptables -I OUTPUT -s 65.96.0.0/16 -j REJECT
iptables -I OUTPUT -s 66.30.0.0/15 -j REJECT
iptables -I OUTPUT -s 66.41.0.0/16 -j REJECT
iptables -I OUTPUT -s 66.56.0.0/18 -j REJECT
iptables -I OUTPUT -s 66.176.0.0/15 -j REJECT
iptables -I OUTPUT -s 66.229.0.0/16 -j REJECT
iptables -I OUTPUT -s 67.160.0.0/12 -j REJECT
iptables -I OUTPUT -s 67.176.0.0/15 -j REJECT
iptables -I OUTPUT -s 67.180.0.0/14 -j REJECT
iptables -I OUTPUT -s 67.184.0.0/13 -j REJECT
iptables -I OUTPUT -s 68.32.0.0/11 -j REJECT
iptables -I OUTPUT -s 68.80.0.0/14 -j REJECT
iptables -I OUTPUT -s 68.84.0.0/16 -j REJECT
iptables -I OUTPUT -s 69.136.0.0/15 -j REJECT
iptables -I OUTPUT -s 69.138.0.0/16 -j REJECT
iptables -I OUTPUT -s 69.139.0.0/17 -j REJECT
iptables -I OUTPUT -s 69.140.0.0/14 -j REJECT
iptables -I OUTPUT -s 69.180.0.0/15 -j REJECT
iptables -I OUTPUT -s 69.242.0.0/15 -j REJECT
iptables -I OUTPUT -s 69.244.0.0/14 -j REJECT
iptables -I OUTPUT -s 69.248.0.0/14 -j REJECT
iptables -I OUTPUT -s 69.253.0.0/16 -j REJECT
iptables -I OUTPUT -s 69.254.0.0/15 -j REJECT
iptables -I OUTPUT -s 71.56.0.0/13 -j REJECT
iptables -I OUTPUT -s 71.192.0.0/12 -j REJECT
iptables -I OUTPUT -s 71.224.0.0/12 -j REJECT
iptables -I OUTPUT -s 73.0.0.0/8 -j REJECT
iptables -I OUTPUT -s 75.64.0.0/13 -j REJECT
iptables -I OUTPUT -s 75.72.0.0/15 -j REJECT
iptables -I OUTPUT -s 75.74.0.0/16 -j REJECT
iptables -I OUTPUT -s 75.75.0.0/17 -j REJECT
iptables -I OUTPUT -s 75.75.128.0/18 -j REJECT
iptables -I OUTPUT -s 76.16.0.0/12 -j REJECT
iptables -I OUTPUT -s 76.97.0.0/16 -j REJECT
iptables -I OUTPUT -s 76.98.0.0/15 -j REJECT
iptables -I OUTPUT -s 76.100.0.0/14 -j REJECT
iptables -I OUTPUT -s 76.104.0.0/13 -j REJECT
iptables -I OUTPUT -s 76.112.0.0/12 -j REJECT
iptables -I OUTPUT -s 98.192.0.0/13 -j REJECT
iptables -I OUTPUT -s 98.200.0.0/14 -j REJECT
iptables -I OUTPUT -s 98.204.0.0/16 -j REJECT
iptables -I OUTPUT -s 98.206.0.0/15 -j REJECT
iptables -I OUTPUT -s 98.208.0.0/12 -j REJECT
iptables -I OUTPUT -s 98.224.0.0/12 -j REJECT
iptables -I OUTPUT -s 98.240.0.0/16 -j REJECT
iptables -I OUTPUT -s 98.242.0.0/15 -j REJECT
iptables -I OUTPUT -s 98.244.0.0/14 -j REJECT
iptables -I OUTPUT -s 98.248.0.0/13 -j REJECT
iptables -I OUTPUT -s 107.2.0.0/15 -j REJECT
iptables -I OUTPUT -s 107.4.0.0/15 -j REJECT
iptables -I OUTPUT -s 174.48.0.0/12 -j REJECT
Dont want to scroll through that. here is a text file with the same list of blocked ranges.
firewallAntiComCast.txt (6.9 KB)
Done. This is also probably your first look at a blocking ranges with IPtables. Doesnt hurt to get your feet wet
By the way anytime you need a paste bin. this is the best one I have used