<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><br class=""><div><blockquote type="cite" class=""><div class="">On Nov 21, 2017, at 9:42 AM, Ulrich Wisser <<a href="mailto:ulrich@wisser.se" class="">ulrich@wisser.se</a>> wrote:</div><div class=""><div dir="ltr" class=""><div class=""><br class=""></div><div class="">In the discussion on Quad9 quite a few of you expressed that you run your own resolver and use RPZ. </div><div class="">What feeds do you use? Paid/Free?</div></div></div></blockquote></div><br class=""><div class="">There is a big list of feeds here: <a href="http://www.senki.org/operators-security-toolkit/open-source-threat-intelligence-feeds/" class="">http://www.senki.org/operators-security-toolkit/open-source-threat-intelligence-feeds/</a></div><div class=""><br class=""></div><div class="">For specific RPZ feeds, we work to get them all listed here: <span style="color: rgb(88, 88, 90); font-family: Lato, sans-serif; font-size: 15px; orphans: 2; widows: 2; background-color: rgb(255, 255, 255);" class=""><a href="https://dnsrpz.info/" class="">https://dnsrpz.info/</a></span></div></body></html>