Blocked servers
This endpoint lists SHA1 hashes of all of the server IPs & domains that Mojang blocks.
The following description is from wiki.vg:
Clients check the lowercase name, using the ISO-8859-1 charset, against this list. They will also attempt to check subdomains, replacing each level with a *
. Specifically, it splits based off of the .
in the domain, goes through each section removing one at a time. For instance, for mc.example.com
, it would try mc.example.com
, *.example.com
, and *.com
. With IP addresses (verified by having 4 split sections, with each section being a valid integer between 0 and 255, inclusive) substitution starts from the end, so for 192.168.0.1
, it would try 192.168.0.1
, 192.168.0.*
, 192.168.*
, and 192.*
.
This check is done by the bootstrap class in netty. The default netty class is overridden by one in the com.mojang:netty dependency loaded by the launcher. This allows it to affect any version that used netty (1.7+).
Request
- Method:
GET
- Endpoint:
/blockedservers
- Full URL:
https://sessionserver.mojang.com/blockedservers
Response
Line-separated list of all the SHA1 hashes of domains / IP addresses that Mojang blocks.
Some hashes have been cracked. If you wish to attempt cracking these hashes, feel free to try using hashcat
.
Sample response (first 10 lines):
72fd29f430c91c583bb7216fe673191dc25a7e18
e38e82a54b47c7c5394670bb34b3aa941219959b
d1bab7fcb1d44a0ad1084fb201006d79d05ae6e7
1822a17662c7e0cf3b815c257d32c2aa0245fad0
7905e1eeee5d57268bb9cbea2e0acbb5421a667b
56c7a4ccff309d6eb3c5737fe9509c3555e7f5fa
cf2f874a649da0118f717f7edb1f5fffcbae8c6b
c800614f07e155ca842e23f84c6a553973ccdb1f
dcc63fadc759ee712cdd5b7bade3bb3eff804637
96ea6aaf66aea5881b38ebbf66df686e8613f1db