

This is why in this step, you do not have to change any default options – leave the default options untouched, just click Next to continue. If you want to block a malicious IP address, then you would want to block it for all protocols. In this step, you have select a port or protocol type.But in most cases, you would want to block the IP address for all programs and you can choose All programs and click Next. If you are creating a rule for your web browser or email client etc., then select This program path: and type in the full program file path. Next you have to choose whether the rule you are creating applies to all programs or to some specific programs.Select Custom rule from the options and click Next. In this wizard, the first thing you have to select is the rule type.This would open the New Outbound Rule Wizard window. Alternatively, you can also select Action → New Rule from the menubar. Click on the New Rule… on the right side of the Windows Firewall window.Click on the Outbound Rules in the this list on the left side to select the outbound rules section. Outbound rules are used when a program or the operating system itself connect with a remote computer or the internet, for example, when your web browser opens a website. In the Windows Firewall with Advanced Security window, you would find a list of rules in the left side.This will open Windows Firewall with Advanced Security interface. Type wf.msc in the Run dialog and press Enter. Press Win+R hotkey to open the Run dialog.

You can block an IP address or a range of IP addresses in Windows 7, 8 and 8.1 using the following steps: So if you find that an some program is connecting to an offending IP address on the Internet, how would you block it? Fortunately, Windows Firewall in Windows 7, 8 and 8.1 has made this task very easy.

But now some of the malware use an IP address directly to circumvent getting blocked by such HOSTS files. We have published many articles like How to redirect or block websites using HOSTS file which explain how you can block websites in your computer using the HOSTS file in detail. In the same article we have also mentioned about various ready made MVPS HOSTS files which are designed to block malicious websites in your computer.
