TorHound scrapes the exit relay data from tor.org, caches it, and utilizes the data to create configuration files for blocklists.
Note, during scraping, TorHound validates and normalizes the data to prevent errors, bugs, or exploits from being passed downstream
An integer is passed to set the date range.
Example: https://www.torhound.com/compat/minutes/1440
The above would indicate you would like all ips that were used by tor exit relays in the last day.
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; . { iwr -useb https://www.torhound.com/powershell/minutes/1440/firewall.ps1 } | iex;
Setup your own TorHound service easily so as to control your inputs.
Check out the project on Github.