if blocked == "":
logger.warning("blocked is empty after tidyup.domain(): domain='%s',block_level='%s'", domain, block_level)
continue
- elif blocked.endswith(".arpa"):
- logger.debug("blocked='%s' is a reverse IP address - SKIPPED!", blocked)
- continue
- elif blocked.endswith(".tld"):
- logger.debug("blocked='%s' is a fake domain - SKIPPED!", blocked)
+ elif not utils.is_domain_wanted(blocked):
+ logger.debug("blocked='%s' is not wanted - SKIPPED!", blocked)
continue
logger.debug("Invoking utils.deobfuscate_domain(%s, %s) ...", blocked, domain)
if blocked == "":
logger.warning("blocked is empty after tidyup.domain(): domain='%s',block_level='%s'", domain, block_level)
continue
- elif blocked.endswith(".arpa"):
- logger.debug("blocked='%s' is a reverse IP address - SKIPPED!", blocked)
- continue
- elif blocked.endswith(".tld"):
- logger.debug("blocked='%s' is a fake domain - SKIPPED!", blocked)
+ elif not utils.is_domain_wanted(blocked):
+ logger.debug("blocked='%s' is not wanted - SKIPPED!", blocked)
continue
logger.debug("Invoking utils.deobfuscate_domain(%s, %s) ...", blocked, domain)
if blocked == "":
logger.warning("blocked is empty after tidyup.domain(): domain='%s',block_level='%s'", domain, block_level)
continue
+ elif not utils.is_domain_wanted(blocked):
+ logger.debug("blocked='%s' is not wanted - SKIPPED!", blocked)
+ continue
logger.debug("Invoking utils.deobfuscate_domain(%s, %s) ...", blocked, domain)
blocked = utils.deobfuscate_domain(blocked, domain)
-
logger.debug("blocked='%s' - DEOBFUSCATED!", blocked)
- if not utils.is_domain_wanted(blocked):
- logger.debug("blocked='%s' is not wanted - SKIPPED!", blocked)
- continue
logger.debug("Checking %d blockdict records ...", len(blockdict))
for block in blockdict:
if blocked == "":
logger.warning("blocked is empty after tidyup.domain(): domain='%s',block_level='%s'", domain, block_level)
continue
+ elif not utils.is_domain_wanted(blocked):
+ logger.warning("blocked='%s' is not wanted - SKIPPED!", blocked)
+ continue
logger.debug("Invoking utils.deobfuscate_domain(%s, %s) ...", blocked, domain)
blocked = utils.deobfuscate_domain(blocked, domain)
-
logger.debug("blocked='%s' - DEOBFUSCATED!", blocked)
- if not utils.is_domain_wanted(blocked):
- logger.warning("blocked='%s' is not wanted - SKIPPED!", blocked)
- continue
logger.debug("Appending blocker='%s',blocked='%s',reason='%s',block_level='%s' ...",domain, blocked, reason, block_level)
blockdict.append({