Question Should this hosts file work?

Jeff Root

Distinguished
Sep 4, 2012
8
0
18,510
Years ago, on another OS (probably Windows 7), I think I was
able to block ads and unwanted cookies with a hosts file.
I thought I'd try it again in Windows 10. I put together a
short list of sites to block, but it doesn't appear to work.
I saved the hosts file in ...

Windows > System32 > drivers > etc

with just the name "hosts" and no extension.

Does the file need to be saved in some special way? Like, does
the "System" attribute need to be set? I haven't seen anything
that says to do that.

Here is the file:

# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost

127.0.0.1 adentifi.com
127.0.0.1 admanmedia.com
127.0.0.1 adtelligent.com
127.0.0.1 advangelists.com
127.0.0.1 a-mo.net
127.0.0.1 bfmio.com
127.0.0.1 bizibly.com
127.0.0.1 cogocast.net
127.0.0.1 cootlogix.com
127.0.0.1 cpx.to
127.0.0.1 dmxleo.com
127.0.0.1 dnacdn.net
127.0.0.1 dotmetrics.net
127.0.0.1 doubleclick.net
127.0.0.1 epica.ai
127.0.0.1 external-content.duckduckgo.com
127.0.0.1 extremereach.io
127.0.0.1 ezoic.com
127.0.0.1 firefox.settings.services.mozilla.com
127.0.0.1 go.affec.tv
127.0.0.1 googlesyndication.com
127.0.0.1 hybrid-analysis.com
127.0.0.1 improving.duckduckgo.com
127.0.0.1 imtwjwoasak.com
127.0.0.1 ispot.tv
127.0.0.1 jwplatform.com
127.0.0.1 loopme.me
127.0.0.1 mail-ads.google.com
127.0.0.1 myvisualiq.net
127.0.0.1 ogs.google.com
127.0.0.1 onetag-sys.com
127.0.0.1 pointmediatracker.com
127.0.0.1 prmutv.co
127.0.0.1 retargetly.com
127.0.0.1 samplicio.us
127.0.0.1 servenobid.com
127.0.0.1 serverbid.com
127.0.0.1 services.addons.mozilla.org
127.0.0.1 shavar.services.mozilla.com
127.0.0.1 smaato.net
127.0.0.1 smrtb.com
127.0.0.1 socdm.com
127.0.0.1 smartclip.net
127.0.0.1 spart.co
127.0.0.1 spocs.getpocket.com
127.0.0.1 thrtle.com
127.0.0.1 tidaltv.com
127.0.0.1 trueleadid.com
127.0.0.1 truoptik.com
127.0.0.1 tynt.com
127.0.0.1 usbank.com
127.0.0.1 videobyte.com
127.0.0.1 videohub.tv
127.0.0.1 vindicosuite.com
127.0.0.1 zeotap.com
 
Years ago, on another OS (probably Windows 7), I think I was
able to block ads and unwanted cookies with a hosts file.
I thought I'd try it again in Windows 10. I put together a
short list of sites to block, but it doesn't appear to work.
I saved the hosts file in ...

Windows > System32 > drivers > etc

with just the name "hosts" and no extension.

Does the file need to be saved in some special way? Like, does
the "System" attribute need to be set? I haven't seen anything
that says to do that.

Here is the file:

# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
# localhost name resolution is handled within DNS itself.
# 127.0.0.1 localhost
# ::1 localhost

127.0.0.1 adentifi.com
127.0.0.1 admanmedia.com
127.0.0.1 adtelligent.com
127.0.0.1 advangelists.com
127.0.0.1 a-mo.net
127.0.0.1 bfmio.com
127.0.0.1 bizibly.com
127.0.0.1 cogocast.net
127.0.0.1 cootlogix.com
127.0.0.1 cpx.to
127.0.0.1 dmxleo.com
127.0.0.1 dnacdn.net
127.0.0.1 dotmetrics.net
127.0.0.1 doubleclick.net
127.0.0.1 epica.ai
127.0.0.1 external-content.duckduckgo.com
127.0.0.1 extremereach.io
127.0.0.1 ezoic.com
127.0.0.1 firefox.settings.services.mozilla.com
127.0.0.1 go.affec.tv
127.0.0.1 googlesyndication.com
127.0.0.1 hybrid-analysis.com
127.0.0.1 improving.duckduckgo.com
127.0.0.1 imtwjwoasak.com
127.0.0.1 ispot.tv
127.0.0.1 jwplatform.com
127.0.0.1 loopme.me
127.0.0.1 mail-ads.google.com
127.0.0.1 myvisualiq.net
127.0.0.1 ogs.google.com
127.0.0.1 onetag-sys.com
127.0.0.1 pointmediatracker.com
127.0.0.1 prmutv.co
127.0.0.1 retargetly.com
127.0.0.1 samplicio.us
127.0.0.1 servenobid.com
127.0.0.1 serverbid.com
127.0.0.1 services.addons.mozilla.org
127.0.0.1 shavar.services.mozilla.com
127.0.0.1 smaato.net
127.0.0.1 smrtb.com
127.0.0.1 socdm.com
127.0.0.1 smartclip.net
127.0.0.1 spart.co
127.0.0.1 spocs.getpocket.com
127.0.0.1 thrtle.com
127.0.0.1 tidaltv.com
127.0.0.1 trueleadid.com
127.0.0.1 truoptik.com
127.0.0.1 tynt.com
127.0.0.1 usbank.com
127.0.0.1 videobyte.com
127.0.0.1 videohub.tv
127.0.0.1 vindicosuite.com
127.0.0.1 zeotap.com
Just an option if you can't get the hosts to work.
Look into ublock origin.
You can add your own blocks to it if you like.