I use such lists on my server's router and Firewall to block incoming connections from those IPs and bad ASNs, including with geographic blocking. Less traffic, smaller attack surface, less trouble.
As others implied, it doesn't make much sense to be afraid from port scans from the Kiwi Farms servers (maybe if you host ActivityPub services and want to block any Mastodon servers associated with them, or something like that). A lot of threats come from the big cloud providers networks, which are not so good at keeping out threat actors.
As with DShield (a similar collection by SANS Internet Storm Center), I have a problem with the TOR Exit Node category. It seems rather like 'every IP that has ever used TOR'.
As others implied, it doesn't make much sense to be afraid from port scans from the Kiwi Farms servers (maybe if you host ActivityPub services and want to block any Mastodon servers associated with them, or something like that). A lot of threats come from the big cloud providers networks, which are not so good at keeping out threat actors.
As with DShield (a similar collection by SANS Internet Storm Center), I have a problem with the TOR Exit Node category. It seems rather like 'every IP that has ever used TOR'.