On Android IP addresses of Qualcomm GPS servers are being connected randomlessly with no control of the user. The services are hosted on Cloudfront servers. It is impossible to get all raw IP addresses because of load sharing in Cloudfront data centres.

It is impossible to add FQDNs in afwall+ so you are forced to use IP addresses. These lists can help to prevent contacting your Android phone to Qualcomm servers without being permitted by yourself. Please feel free to fork, edit and whatever to enhance the list.

But be aware that these Cloudfront servers are may be shared among other customers beside Qualcomm. So you can run into overblocking.

I did an nslookup every five seconds with watch and copied the output into a file:
$ watch -n 5 nslookup xtrapath1.izatcloud.net >> xtrapath1.izatcloud.net

After that I filtered out the stuff I did not want and copied the output into a new file:
$ grep -v Address xtrapath1.izatcloud.net | grep -v '#' xtrapath1.izatcloud.net >> xtrapath1_edit.txt

Sort it humand readable:
$ sort -h xtrapath1_edit.txt > xtrapath1_unique.txt

Clear multiple addresses and make them unique in your files:
$ uniq -d xtrapath1_unique.txt > xtrapath1.txt

As you can see I made a lot of steps to achieve my goal. I am not the bash expert, so what. In the end I used LibreCalc to create the iptables ruleset. Feel free to enhance the creation process!
