Custom blocklist for pihole with domains derived from security investigations.
Many of these domains are malicious, either hosting credential harvesting pages, conduct drive-by downloads, MiTM attacks, injections, C2 domains, beaconing, newly created through domain-generation algorithms, etc.