Block malware on your network using your PiHole, using threat intelligence extracted from Emerging Threats rulesets.
Here you can share your experience with the project you are suggesting or its comparison with emerging-threats-pihole. Optional.
A valid email to send you a verification link when necessary or log in.