Blokada
blokada.org Android/ iOSOpen source mobile ad-blocker that acts like a firewall. Since it's device-wide, once connected all apps will have ads/ trackers blocked, and the blacklist can be edited. The app is free, but there is a premium option, which has a built-in VPN.
- Homepage: blokada.org
- GitHub: github.com/blokadaorg/blokada
- Privacy: community.blokada.org/t/privacy-policy
- iOS App: apps.apple.com/us/app/blokada/id1508341781
- Android App: play.google.com/.../org.blokada.sex
- Web info: web-check.xyz/check/blokada.org
Blokada Source Code
Author
Description
The official repo for Blokada apps.
Homepage
https://blokada.orgLicense
MPL-2.0
Created
19 Nov 16
Last Updated
11 May 26
Latest version
Primary Language
Dart
Size
144,780 KB
Stars
3,226
Forks
231
Watchers
3,226
Language Usage
Star History
Recent Commits
-
kar (11 May 26)
ci: appium smoke: trigger on PRs, gate forks, scrub artifacts - Switch trigger from push:[main] to pull_request_target:[main] so PRs get a status check. pull_request_target reads the workflow from base, so fork PRs cannot modify the file. - Add a job-level if: that skips runs whose PR head is a fork. Same-repo PRs (and workflow_dispatch) still run. - Check out github.event.pull_request.head.sha explicitly, since pull_request_target otherwise checks out the base ref. - Restrict failure artifact to *.png. The appium output dir also contains session .log and UI .xml files with account IDs that must not be uploaded from a public repo. Repo setting "Require approval for all outside collaborators" is enabled as a second line of defence against fork PRs. Co-Authored-By: Claude Opus 4.7 (1M context) <[email protected]>
-
kar (11 May 26)
ci: appium smoke: unlock login keychain so codesign works under launchd runner The self-hosted runner's LaunchAgent session can't use the signing key non-interactively, causing codesign to fail with errSecInternalComponent even though the keychain has no timeout. Unlocking explicitly at job start refreshes the keychain handle for the build process. Requires MAC_KEYCHAIN_PASSWORD repo secret. Co-Authored-By: Claude Opus 4.7 (1M context) <[email protected]>
-
kar (11 May 26)
ci: appium smoke: set UTF-8 locale for the job launchd doesn't inherit the user's shell locale, so LANG defaults to something CocoaPods 1.16 + Ruby 3.4 rejects with an Encoding::Compatibility error during String#unicode_normalize. Pin LANG/LC_ALL at the job level so all steps (pod install, xcodebuild, appium) see UTF-8. Co-Authored-By: Claude Opus 4.7 (1M context) <[email protected]>
-
kar (11 May 26)
ci: appium smoke: bootstrap flutter common lib and ios pods make appium-test goes through build-six-debug, which assumes Pods/ and the Flutter common artifacts already exist. On a fresh CI checkout neither is present, so xcodebuild fails reading Pods-Dev.release.xcconfig. Add explicit flutter pub/gen + pod install steps before the smoke test. Co-Authored-By: Claude Opus 4.7 (1M context) <[email protected]>
-
kar (11 May 26)
ci: appium smoke: fetch submodules and restrict workflow token actions/checkout@v4 doesn't fetch submodules by default; without it the symlink Resources/oisd-small.txt -> deps/landing-github-pages/... dangles and the iOS build fails. Also pin contents:read for defense in depth on the self-hosted runner. Co-Authored-By: Claude Opus 4.7 (1M context) <[email protected]>
-
kar (11 May 26)
ci: add appium smoke workflow for self-hosted iOS runner Runs make appium-test on push to main against a physically connected iPhone via a self-hosted runner labeled ios-physical. Single-device concurrency group prevents overlapping runs. Co-Authored-By: Claude Opus 4.7 (1M context) <[email protected]>
-
kar (04 May 26)
sync: update translate strings to: 8fb6c
-
kar (30 Apr 26)
v6: essentials: flow changes for before-paywall onboarding flow #258
-
kar (01 May 26)
appium: update README about FDA
-
Johnny Bergström (30 Apr 26)
chore(claude): enable blokada-workflows team plugin via auto-discovery - add extraKnownMarketplaces + enabledPlugins so trusting this repo auto-loads the team plugin (skills + bundled support MCP) without any /plugin commands. Existing env + permissions blocks unchanged.
-
kar (27 Apr 26)
adapty embed: allow for drag events (disable sheet drag)
-
Karol Gusak (24 Apr 26)
Merge pull request #1045 from blokadaorg/2604-adapty-better-embed Embed Adapty paywalls in app-owned containers and add tablet width constraints
-
copilot-swe-agent[bot] (24 Apr 26)
Rename _adaptyTabletPaywallHeightFactor to _adaptyPaywallHeightFactor to reflect universal usage Agent-Logs-Url: https://github.com/blokadaorg/blokada/sessions/0b5edecb-b9c0-4082-9e27-3bd4cffa14c6 Co-authored-by: kar <[email protected]>
-
copilot-swe-agent[bot] (24 Apr 26)
Align Flutter bottom sheet breakpoint to >= to match Android's >= check Agent-Logs-Url: https://github.com/blokadaorg/blokada/sessions/b28ddbe4-1f48-425a-a57a-519fb730252a Co-authored-by: kar <[email protected]>
-
Karol Gusak (24 Apr 26)
Update android/.idea/deviceManager.xml Co-authored-by: Copilot <[email protected]>
-
Karol Gusak (24 Apr 26)
Update android/app/src/six/kotlin/ui/AdaptyPaymentTabletDialogFragment.kt Co-authored-by: Copilot <[email protected]>
-
kar (22 Apr 26)
sheets: adjust max width to 500, with split at 400. affects android adapty wrapper, and all ios sheets
-
kar (22 Apr 26)
android: adapty: align paywall size split to 600dp to mimic ios path
-
kar (22 Apr 26)
adapty: rework embed logic to allow for small sheet on wide screens
-
kar (22 Apr 26)
update adapty to 3.15.x
-
Karol Gusak (22 Apr 26)
Merge pull request #1044 from blokadaorg/2604-ios-essentials-before-paywall ios: add before_paywall essentials onboarding optional flow
-
Johnny Bergström (17 Apr 26)
docs: broaden domain-knowledge trigger in AGENTS.md Expand the section from 'before changing X' to cover any task that needs a better understanding of a domain topic — exploring, planning, or reviewing — not only code changes.
-
copilot-swe-agent[bot] (16 Apr 26)
fix: safely parse essentials onboarding order attribute Agent-Logs-Url: https://github.com/blokadaorg/blokada/sessions/40b5860b-411c-49d8-94b6-912b9d41033c Co-authored-by: kar <[email protected]>
-
kar (16 Apr 26)
ios: add before_paywall essentials onboarding optional flow Introduce essentials_onboarding_order account attribute support for iOS freemium onboarding and keep the current post-paywall flow as the default. The app now parses a typed onboarding-order value from account attributes, routes flagged users to the Safari Essentials onboarding before the paywall, and suppresses the existing post-paywall onboarding for that override so the flow stays exclusive. Also add focused tests covering attribute parsing, default fallback behavior, and the guardrail that Essentials is not shown before the paywall unless the API explicitly enables it.
-
Karol Gusak (10 Apr 26)
ci: use new agent executor name
-
Johnny Bergström (10 Apr 26)
Merge pull request #1042 from balboah/push-lxwrqzkvtwzq cold start stability
-
Johnny Bergström (10 Apr 26)
doc: update comments on why components exist
-
Johnny Bergström (07 Apr 26)
fix: DNS wizard lifecycle, foreground flicker, and modal dismiss races - Refactor _recheckDnsPerm with try/finally to guarantee cloudPermCheckSettled - Add lifecycleSeen gate to prevent duplicate foreground promotion - Fix BottomManagerSheet: dedup sheets, capture navigator for safe dismiss - Auto-dismiss DNS onboarding when cloudPermEnabled flips true - Remove duplicate self-dismiss listener in iOS DNS sheet - Cancel splash fallback on activity destroy
-
Johnny Bergström (07 Apr 26)
android: fix cold-start hang and white-screen between splash and home - modules.dart: start foreground modules before stage.setForeground so routeChanged listeners (DeviceStore.fetch) no longer race the account creation and hang the cold start on a fresh install - StartupContextService: implement firstFrameRendered channel and a listener API mirroring the iOS StartupContext signal - MainActivity + activity_main.xml: add a splash overlay reusing the existing @drawable/splash and fade it out when Flutter reports its first frame, eliminating the white-screen gap before the home view
-
Claude (03 Apr 26)
fix: skip VPN network in initial DNS query, add error logging ConnectivityService: check NET_CAPABILITY_NOT_VPN before reading DNS from activeNetwork, preventing incorrect reads when VPN is active during later rescan() calls (e.g. doze state changes). PlatformPermActor: log the error before settling cloudPermCheckSettled on DNS check failure for easier debugging. https://claude.ai/code/session_01Gc63y37qftNhTYNzZQ4d3J
Blokada Website
Website
Blokada - the popular mobile adblocker and VPN for Android and iOS
Keep all your devices protected with Blokada content filtering and encryption.
Redirects
Does not redirect
Security Checks
All 66 security checks passed
Server Details
- IP Address 172.67.135.212
- Location San Francisco, California, United States of America, NA
- ISP CloudFlare Inc.
- ASN AS13335
Associated Countries
-
US
Safety Score
Website marked as safe
100%
Blacklist Check
blokada.org was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
Blokada Android App
APK Info
- App Blokada 6
- Creation Date 28 May 24
- Last Updated 14 Jul 24
- Current Version 24.1.2
- Privacy Report View on Exodus →
Trackers
No trackers found
Permissions
- Access Coarse Location
- Access Network State
- Access Wifi State
- Foreground Service
- Get Tasks
- Interact Across Users
- Internet
- Post Notifications
- Read Logs
- Read Phone State
- Receive Boot Completed
- Request Delete Packages
- Use Biometric
- Use Fingerprint
- Vibrate
- Wake Lock
- Write External Storage
- Set Alarm
- Billing
- Dynamic Receiver Not Exported Permission
Blokada iOS App
App Info
Blokada
This is the official app on App Store from the Blokada open source project. Blokada for iOS uses DNS (Domain Name System) to enable you to have an ad free experience to see only the content you want. Use Blokada Cloud to block ads and trackers, while keeping your DNS traffic confidential. Upgrade to Blokada Plus for encrypting all traffic with our global VPN network. Improve your privacy and secure your Internet against cyber attacks and hackers. ---- Top features: - Supports ad-blocking for every web browser and other app installed. - Blocks sites that distribute malicious content, viruses and fraudulent websites. - DNS based interception for all modern browsers and apps. - Fast and reliable VPN that protects your privacy and encrypts your data. The most compatible ad blocker on the market! • Blocks ads • Saves your data plan • Browse FASTER by loading less data • Increase your battery life What can be blocked? • Block annoying ads: Google AdWords, Google Invite Media, DoubleClick Bid Manager, Liftoff, Bing Ads, Amazon, etc • Block adult websites • Block gambling websites • Block social media trackers: Google Analytics, Facebook Connect, DoubleClick, Google Publisher Tags, Google AdSense, Twitter Button, Yandex.Metrix, Comscore • Block malicious websites: Virus downloads, malicious content, fraudulent websites and manipulated apps ---- Terms of Use: https://go.blokada.org/terms Privacy Policy: https://go.blokada.org/privacy
Rating
Version Info
- Current Version 23.3.4
- Last Updated 10 Aug 23
- First Released 06 Jun 20
- Minimum iOS Version 16.0
- Device Models Supported 93
App Details
- IPA Size 30.96 Mb
- Price Free (USD)
- Age Advisory 4+
- Supported Languages 14
- Developer Blocka AB
- Bundle ID net.blocka.app
Screenshots
Blokada Reviews
More Ad Blockers
-
A shell script application to manage ad-blocking, Dnsmasq logging, Entware and pixelserv-tls installations and more on supported routers running Asuswrt-Merlin firmware, including its forks.
-
A POSIX-compliant shell script, designed for Unix-like systems, that gets a list of domains that serve ads, tracking scripts and malware from multiple sources and creates a hosts file (alternative formats are also supported) that prevents your system from connecting to them. Aimed at improving security and privacy through blocking advert, tracking and malware associated domains.
-
Incredibly powerful, network-wide ad-blocker. Works out-of-the-box, light-weight with an intuitive web interface, but still allows for a lot of advanced configuration for power users. As well as blocking ads and trackers, Pi-Hole speeds up your network speeds quite significantly. The dashboard has detailed statistics, and makes it easy to pause/ resume Pi-Hole if needed.
-
Free and open source ad-blocker and a firewall for Android 6+ (no root required).
-
Light-weight, fast browser extension for Firefox and Chromium (Chrome, Edge, Brave Opera etc), that blocks tracking, ads and known malware. uBlock is easy-to-use out-of-the-box, but also has a highly customisable advanced mode, with a point-and-click firewall which can be configured on a per-site basis.
About the Data: Blokada
Change History
- Amended (androidApp, iosApp)
API
You can access Blokada's data programmatically via our API. Simply make a GET request to:
https://api.awesome-privacy.xyz/networking/ad-blockers/blokada The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
Share Blokada
Help your friends compare Ad Blockers, and pick
privacy-respecting software and services.
Share Blokada and Awesome Privacy with your network!
