@deveals
Danny
I'm also a newbie, and we're using pfBlockerNG with a custom list.
Our custom list is derived and compiled from a combination of sources, including AbuseIP.com, local fail2ban, and others.
The custom list contains about 100k addresses.
pfSense gets list updates a few times each day by a cron task.
The activity against this list is easily visible.
There's a pfBlockerNG widget for the pfSense GUI dashboard that gives summary data.
If you need more granular data using the GUI, go to Firewall, Rules, WAN, select and edit the custom rule, scroll to bottom of page and note the Tracking ID number.
Also make sure logging is enabled for this rule. Log = tick.
Then use Status, System logs, Firewall, Advanced Log filter (enabled in System, General Setup, Log Filtering), and enter the Tracking ID in the filtering criteria. Apply Filter.
Now you see all the traffic actioned by your custom rule.
If there's a better way to do this, I hope somebuddy with more experience will chime in with correction/s and/or suggestion/s.
HTH