diff --git a/README.md b/README.md
index 8b1378917..88435558f 100644
--- a/README.md
+++ b/README.md
@@ -1 +1,284 @@
+
+
+🕙 `!TEMPLATE_NOW!`
+
+
+
+---
+
+
+
+- [About](#about)
+ - [★ Severity Rating ★](#-severity-rating-)
+- [Main Lists](#main-lists)
+- [Privacy Lists](#privacy-lists)
+- [Spam Lists](#spam-lists)
+- [Geographical (Continents \& Countries)](#geographical-continents--countries)
+- [Transmission (BitTorrent Client)](#transmission-bittorrent-client)
+- [Install](#install)
+ - [ConfigServer Firewall Users](#configserver-firewall-users)
+
+
+
+---
+
+
+
+# About
+This repository contains a collection of dynamically updated blocklists which can be utilized to filter out traffic from communicating with your server.
+
+
+
+These blocklists can be used with:
+- ConfigServer Firewall
+- FireHOL
+- Crowdsec
+- Transmission (BitTorrent Client)
+- OPNsense
+- Many others
+
+
+
+Blocklist and statistics are updated daily, and some are updated multiple times a day depending on the category of blocklist. Others may only update once per day depending on how often they refresh.
+
+
+
+## ★ Severity Rating ★
+The **Severity Rating** is a column shown below for each blocklist. This score is calculated depending on how many "abusive" IP addresses exist within that ipset file.
+
+
+
+As an example, the **Cloudflare CDN** has a score of `★★★⚝⚝ 3 or higher`, due to the fact that many people are reporting that servers hosted by Cloudflare seem to be involved in a lot of abusive activity such as port scanning and SSH bruteforce attacks. The more reports that the Ips in the Cloudflare file have, the higher the severity rating will rise. This score is based on the mean (average) report history of all IPs in the list.
+
+
+
+This rating is calculated once a day.
+
+
+
+---
+
+
+
+# Main Lists
+These are the primary lists that most people will be interested in. They contain a large list of IP addresses which have been reported recently for abusive behavior. These statistics are gathered from numerous websites such as [AbuseIPDB](https://abuseipdb.com/) and [IPThreat](https://ipthreat.net/). IPs on this list have a 100% confidence level, which means you should get no false-positives from any of the IPs in these lists. IP addresses in these lists have been flagged for engaging in the following:
+
+- SSH Bruteforcing
+- Port Scanning
+- DDoS Attacks
+- IoT Targeting
+- Phishing
+
+
+
+For the majority of people, using the blocklists `master.ipset` and `highrisk.ipset` will be all you need. It is a massive collection, all with a 100% confidence level, which means you should get none or minimal false positives.
+
+
+
+| Set Name | Description | Severity | View |
+| --- | --- | --- | --- |
+| `master.ipset` | Abusive IP addresses which have been reported for port scanning and SSH brute-forcing. HIGHLY recommended.
Includes [AbuseIPDB](https://www.abuseipdb.com/), [IPThreat](https://ipthreat.net/), [CinsScore](https://cinsscore.com), [GreensNow](https://blocklist.greensnow.co/greensnow.txt) | ★★★★★ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/master.ipset) |
+| `highrisk.ipset` | IPs with highest risk to your network and have a possibility that the activity which comes from them are going to be fraudulent. | ★★★★★ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/highrisk.ipset) |
+
+
+
+---
+
+
+
+# Privacy Lists
+These blocklists give you more control over what 3rd party services can access your server, and allows you to remove bad actors or services hosting such services.
+
+
+
+| Set | Description | Severity | View |
+| --- | --- | --- | --- |
+| `privacy_general.ipset` | Servers which scan ports for data collection and research purposes. List includes [Censys](https://censys.io), [Shodan](https://www.shodan.io/), [Project25499](https://blogproject25499.wordpress.com/), [InternetArchive](https://archive.org/), [Cyber Resilience](https://cyberresilience.io), [Internet Measurement](https://internet-measurement.com), [probe.onyphe.net](https://onyphe.net), [Security Trails](https://securitytrails.com) | ★★★★⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_general.ipset) |
+| `privacy_ahrefs.ipset` | Ahrefs SEO and services | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/privacy/privacy_ahrefs.ipset) |
+| `privacy_amazon_aws.ipset` | Amazon AWS | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_amazon_aws.ipset) |
+| `privacy_amazon_ec2.ipset` | Amazon EC2 | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_amazon_ec2.ipset) |
+| `privacy_applebot.ipset` | Apple Bots | ★★★⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_applebot.ipset) |
+| `privacy_bing.ipset` | Microsoft Bind and Bing Crawlers / Bots | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_bing.ipset) |
+| `privacy_bunnycdn.ipset` | Bunny CDN | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_bunnycdn.ipset) |
+| `privacy_cloudflarecdn.ipset` | Cloudflare CDN | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_cloudflarecdn.ipset) |
+| `privacy_cloudfront.ipset` | Cloudfront DNS | ★⚝⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_cloudfront.ipset) |
+| `privacy_duckduckgo.ipset` | DuckDuckGo Web Crawlers / Bots | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_duckduckgo.ipset) |
+| `privacy_facebook.ipset` | Facebook Bots & Trackers | ★★★⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_facebook.ipset) |
+| `privacy_fastly.ipset` | Fastly CDN | ★⚝⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_fastly.ipset) |
+| `privacy_google.ipset` | Google Crawlers | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_google.ipset) |
+| `privacy_pingdom.ipset` | Pingdom Monitoring Service | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_pingdom.ipset) |
+| `privacy_rssapi.ipset` | RSS API Reader | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_rssapi.ipset) |
+| `privacy_stripe_api.ipset` | Stripe Payment Gateway API | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_stripe_api.ipset) |
+| `privacy_stripe_armada_gator.ipset` | Stripe Armada Gator | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_stripe_armada_gator.ipset) |
+| `privacy_stripe_webhooks.ipset` | Stripe Webhook Service | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_stripe_webhooks.ipset) |
+| `privacy_telegram.ipset` | Telegram Trackers and Crawlers | ★★★⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_telegram.ipset) |
+| `privacy_uptimerobot.ipset` | Uptime Robot Monitoring Service | ★⚝⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_uptimerobot.ipset) |
+| `privacy_webpagetest.ipset` | Webpage Test Services | ★★⚝⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/privacy/privacy_webpagetest.ipset) |
+
+
+
+---
+
+
+
+# Spam Lists
+These blocklists allow you to remove the possibility of spam sources accessing your server.
+
+
+
+| Set | Description | Severity | View |
+| --- | --- | --- | --- |
+| `spam_forums.ipset` | List of known forum / blog spammers and bots | ★★★⚝⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/spam/spam_forums.ipset) |
+| `spam_spamhaus.ipset` | Bad actor IP addresses registered with Spamhaus | ★★★★⚝ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/spam/spam_spamhaus.ipset) |
+
+
+
+---
+
+
+
+# Geographical (Continents & Countries)
+These blocklists allow you to determine what geographical locations can access your server. These can be used as either a whitelist or a blacklist. Includes both **continents** and **countries**.
+
+
+
+| Set | Description | Severity | View |
+| --- | --- | --- | --- |
+| `GeoLite2 Database` | Lists IPs by continent and country from GeoLite2 database. Contains both IPv4 and IPv6 subnets | ★★★★★ | [view](https://dev.maxmind.com/geoip/geolite2-free-geolocation-data/) |
+| `Ip2Location Database` | Coming soon | ★★★★★ | [view](https://lite.ip2location.com/database-download) |
+
+
+
+---
+
+
+
+# Transmission (BitTorrent Client)
+This section includes blocklists which you can import into the [bittorrent client Transmission](https://transmissionbt.com/).
+
+
+
+- In this repo, copy the direct URL to the Transmission blocklist, provided below:
+ - https://github.com/ConfigServerApps/service-blocklists/raw/main/blocklists/transmission/blocklist.gz
+- Open your Transmission application; depending on the version you run, do ONE of the follow two choices:
+ - Paste the link to Transmission > Settings > Peers > Blocklist
+ - Paste the link to Transmission > Edit > Preferences > Privacy > Enable Blocklist
+
+
+
+| Set | Description | Severity | View | Website |
+| --- | --- | --- | --- | --- |
+| `bt-transmission` | A large blocklist for the BitTorrent client [Transmission](https://transmissionbt.com/) | ★★★★★ | [view](https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/transmission/blocklist.ipset) | [view](https://transmissionbt.com/) |
+
+
+
+---
+
+
+
+# Install
+
+This section explains how to use these blocklists within particular software titles.
+
+
+
+## ConfigServer Firewall Users
+
+This repository contains a set of ipsets which are automatically updated every `6 hours`. You may add these sets to your ConfigServer Firewall `/etc/csf/csf.blocklists` with the following new line:
+
+```
+CSF_MASTER|86400|0|https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/master.ipset
+CSF_HIGHRISK|86400|0|https://raw.githubusercontent.com/ConfigServerApps/service-blocklists/main/blocklists/highrisk.ipset
+```
+
+
+
+The format for the above lines are `NAME|INTERVAL|MAX_IPS|URL`:
+
+- **NAME**: List name with all uppercase alphabetic characters with no spaces and a maximum of 25 characters - this will be used as the iptables chain name
+- **INTERVAL**: Refresh interval to download the list, must be a minimum of 3600 seconds (an hour).
+ - `86400` (one day / 24 hours) should be more than enough
+- **MAX_IPS**: This is the maximum number of IP addresses to use from the list, a value of 0 means all IPs.
+ - If you add an ipset with 50,000 IPs, and you set this value to 20,000; then you will only block the first 20,000.
+- **URL**: The URL to download the ipset from
+
+
+
+> [!NOTE]
+> If you have not modified the settings of ConfigServer Firewall; the `MAX_IPS` value is limited by the setting `LF_IPSET_MAXELEM` which has a maximum value of `65536` IPs; even if you set the value in your lists above to 0, or anything above 65536.
+>
+> To allow for higher numbers of blocked IPs in an ipset; you must edit your CSF config file located in `/etc/csf/csf.conf` and set the setting `LF_IPSET_MAXELEM` to something higher than `65536`:
+> ```ini
+> # old value
+> # LF_IPSET_MAXELEM = "65536"
+> LF_IPSET_MAXELEM = "4000000"
+> ```
+>
+> This setting can also be modified through the ConfigServer Firewall Admin WebUI if you have it installed.
+
+
+
+Once you have added the line(s) above; you will need to give ConfigServer Firewall and LFD a restart.
+
+```shell
+sudo csf -ra
+```
+
+
+
+You can confirm that the ipset is installed by running the command:
+
+```shell
+sudo ipset --list -n
+```
+
+
+
+The above command will list all existing ipsets running on your firewall. As you can see in the list below; we have `bl_CSF_HIGHRISK`, `bl_6_CSF_HIGHRISK`, `bl_CSF_MASTER`, and `bl_6_CSF_MASTER`. Which are the lists we loaded above.
+
+```console
+chain_DENY
+chain_6_DENY
+chain_ALLOW
+chain_6_ALLOW
+bl_CSF_HIGHRISK
+bl_6_CSF_HIGHRISK
+bl_CSF_MASTER
+bl_6_CSF_MASTER
+```
+
+
+
+To view all of the IPs in a specified ipset / list, run:
+
+```shell
+$ sudo ipset --list bl_CSF_HIGHRISK
+
+Name: bl_CSF_HIGHRISK
+Type: hash:net
+Revision: 7
+Header: family inet hashsize 1024 maxelem 4000000 bucketsize 12 initval 0x5f263e28
+Size in memory: 24024
+References: 1
+Number of entries: 630
+Members:
+XX.XX.XX.XXX
+XX.XX.XX.XXX
+[ ... ]
+```
+
+
+
+If you modified the ConfigServer Firewall setting `LF_IPSET_MAXELEM` _(explained in the note above)_, you will see the new max limit value listed next to `maxelem`.
+
+```shell
+Header: family inet hashsize 1024 maxelem 4000000
+```
+
+
+
+> [!NOTE]
+> If you decide to use the blocklist `master.ipset`, you must ensure you increase the value of the setting `LF_IPSET_MAXELEM` in the file `/etc/csf/csf.conf` to at least `400000`.
+>
+> On average, the `master.ipset` list normally contains `392,000` blocked IP addresses.