Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T02:24:02 +0100 (CET)
Count IPs: 19666
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: fa66048606c745a35f7ba13e38a57d0e
Typ: ssh
Updated: T02:24:05 +0100 (CET)
Count IPs: 9454
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: ce0612e399af1f9fa5e5cc61af4ff980
Typ: mail
Updated: T02:24:06 +0100 (CET)
Count IPs: 9406
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 2ae2156f8d4e564a4d86b5f2b5e8bcdc
Typ: apache
Updated: T02:24:06 +0100 (CET)
Count IPs: 8416
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: dc96a2a3a6b969a8badfe8f8227862d2
Typ: imap
Updated: T02:24:07 +0100 (CET)
Count IPs: 1269
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: bb24cf15a9ec5b7f861a925689d699f6
Typ: ftp
Updated: T02:24:07 +0100 (CET)
Count IPs: 76
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: a3820184677d7187c4a3969fd4a0034e
Typ: sip
Updated: T02:24:07 +0100 (CET)
Count IPs: 140
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 112da7e6352822044fd6e74948c1a1e3
Typ: bots
Updated: T02:24:08 +0100 (CET)
Count IPs: 135
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 4da449e3e10a09a0e2f18801c30d7f25
Typ: strongips
Updated: T02:24:08 +0100 (CET)
Count IPs: 488
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 2ba4e9d5f503c8537e2b21fced5cd56c
Typ: ircbot
Updated: T02:24:08 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T02:24:09 +0100 (CET)
Count IPs: 325
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 86569045ddc740754d5ee2f20937599d
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T02:24:02 +0100 (CET)
Count IPs: 19666
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: fa66048606c745a35f7ba13e38a57d0e
Typ: ssh
Updated: T02:24:05 +0100 (CET)
Count IPs: 9454
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: ce0612e399af1f9fa5e5cc61af4ff980
Typ: mail
Updated: T02:24:06 +0100 (CET)
Count IPs: 9406
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 2ae2156f8d4e564a4d86b5f2b5e8bcdc
Typ: apache
Updated: T02:24:06 +0100 (CET)
Count IPs: 8416
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: dc96a2a3a6b969a8badfe8f8227862d2
Typ: imap
Updated: T02:24:07 +0100 (CET)
Count IPs: 1269
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: bb24cf15a9ec5b7f861a925689d699f6
Typ: ftp
Updated: T02:24:07 +0100 (CET)
Count IPs: 76
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: a3820184677d7187c4a3969fd4a0034e
Typ: sip
Updated: T02:24:07 +0100 (CET)
Count IPs: 140
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 112da7e6352822044fd6e74948c1a1e3
Typ: bots
Updated: T02:24:08 +0100 (CET)
Count IPs: 135
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 4da449e3e10a09a0e2f18801c30d7f25
Typ: strongips
Updated: T02:24:08 +0100 (CET)
Count IPs: 488
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 2ba4e9d5f503c8537e2b21fced5cd56c
Typ: ircbot
Updated: T02:24:08 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T02:24:09 +0100 (CET)
Count IPs: 325
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 86569045ddc740754d5ee2f20937599d
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.