Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T14:12:03 +0200 (CEST)
Count IPs: 19633
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 4d4a169838845ccb6610adc256d15e4e
Typ: ssh
Updated: T14:12:07 +0200 (CEST)
Count IPs: 8682
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 691189df85d4189af912514ab47e02fe
Typ: mail
Updated: T14:12:08 +0200 (CEST)
Count IPs: 9180
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: dbc20ff8a47df9081e4ae7910334690e
Typ: apache
Updated: T14:12:08 +0200 (CEST)
Count IPs: 8351
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: e3d0ec4fd4cc10e454342ce6e8d8831a
Typ: imap
Updated: T14:12:09 +0200 (CEST)
Count IPs: 1114
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: da5f4faedd25c9f92415340889a3cd20
Typ: ftp
Updated: T14:12:09 +0200 (CEST)
Count IPs: 43
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 2057a68508f6927c776931c8d306136e
Typ: sip
Updated: T14:12:09 +0200 (CEST)
Count IPs: 1217
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: d66442a824df64cd84c3cb0637820275
Typ: bots
Updated: T14:12:09 +0200 (CEST)
Count IPs: 121
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 8e0f5b6ac9536c235575a70fd22af8ee
Typ: strongips
Updated: T14:12:10 +0200 (CEST)
Count IPs: 445
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 9245188bd5cb574e435f5b30f800e25d
Typ: ircbot
Updated: T14:12:10 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T14:12:11 +0200 (CEST)
Count IPs: 346
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 5ca30e6b6732013bcf7f7d48e8be1d09
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T14:12:03 +0200 (CEST)
Count IPs: 19633
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 4d4a169838845ccb6610adc256d15e4e
Typ: ssh
Updated: T14:12:07 +0200 (CEST)
Count IPs: 8682
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 691189df85d4189af912514ab47e02fe
Typ: mail
Updated: T14:12:08 +0200 (CEST)
Count IPs: 9180
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: dbc20ff8a47df9081e4ae7910334690e
Typ: apache
Updated: T14:12:08 +0200 (CEST)
Count IPs: 8351
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: e3d0ec4fd4cc10e454342ce6e8d8831a
Typ: imap
Updated: T14:12:09 +0200 (CEST)
Count IPs: 1114
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: da5f4faedd25c9f92415340889a3cd20
Typ: ftp
Updated: T14:12:09 +0200 (CEST)
Count IPs: 43
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 2057a68508f6927c776931c8d306136e
Typ: sip
Updated: T14:12:09 +0200 (CEST)
Count IPs: 1217
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: d66442a824df64cd84c3cb0637820275
Typ: bots
Updated: T14:12:09 +0200 (CEST)
Count IPs: 121
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 8e0f5b6ac9536c235575a70fd22af8ee
Typ: strongips
Updated: T14:12:10 +0200 (CEST)
Count IPs: 445
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 9245188bd5cb574e435f5b30f800e25d
Typ: ircbot
Updated: T14:12:10 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T14:12:11 +0200 (CEST)
Count IPs: 346
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 5ca30e6b6732013bcf7f7d48e8be1d09
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.