I created picosnitch which may be of interest if you also want to see the executable behind each request, this way you wouldn't need to disable NextCloud, Dropbox, Slack, etc (the UI doesn't have negative filtering, yet, but everything is just an entry in a sqlite db).<p>It also gets the hash of each executable, which can be useful if you're running any containers with different versions of the same executable which would otherwise appear to have the same path.