Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T11:54:02 +0200 (CEST)
Count IPs: 21487
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: ff37c162ba5fea50a2e4c98e3d53ee38
Typ: ssh
Updated: T11:54:04 +0200 (CEST)
Count IPs: 10856
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: bd8f3a8e3614a3c4c565f9858b7f614d
Typ: mail
Updated: T11:54:05 +0200 (CEST)
Count IPs: 9954
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: b5ef55a148d98891132b7b775b40d86b
Typ: apache
Updated: T11:54:06 +0200 (CEST)
Count IPs: 8320
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 6a67324566e9342540dd79158d0ba08d
Typ: imap
Updated: T11:54:07 +0200 (CEST)
Count IPs: 1880
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 17a6b2bec09027f9cab3d96a9cf2f3be
Typ: ftp
Updated: T11:54:07 +0200 (CEST)
Count IPs: 84
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 6fe4588311ea59d110987080b55c0ab0
Typ: sip
Updated: T11:54:08 +0200 (CEST)
Count IPs: 118
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: e6fd685c023b0cd2d8a8290f3da8c308
Typ: bots
Updated: T11:54:08 +0200 (CEST)
Count IPs: 116
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 1ab085a50f6907b5bc107faab7bdda70
Typ: strongips
Updated: T11:54:08 +0200 (CEST)
Count IPs: 542
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 91d33afe5e621b856492813d4e4ed7ef
Typ: ircbot
Updated: T11:54:08 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T11:54:09 +0200 (CEST)
Count IPs: 327
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: b85f9bddfea466df6621bbb1b9f0b116
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T11:54:02 +0200 (CEST)
Count IPs: 21487
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: ff37c162ba5fea50a2e4c98e3d53ee38
Typ: ssh
Updated: T11:54:04 +0200 (CEST)
Count IPs: 10856
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: bd8f3a8e3614a3c4c565f9858b7f614d
Typ: mail
Updated: T11:54:05 +0200 (CEST)
Count IPs: 9954
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: b5ef55a148d98891132b7b775b40d86b
Typ: apache
Updated: T11:54:06 +0200 (CEST)
Count IPs: 8320
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 6a67324566e9342540dd79158d0ba08d
Typ: imap
Updated: T11:54:07 +0200 (CEST)
Count IPs: 1880
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 17a6b2bec09027f9cab3d96a9cf2f3be
Typ: ftp
Updated: T11:54:07 +0200 (CEST)
Count IPs: 84
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 6fe4588311ea59d110987080b55c0ab0
Typ: sip
Updated: T11:54:08 +0200 (CEST)
Count IPs: 118
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: e6fd685c023b0cd2d8a8290f3da8c308
Typ: bots
Updated: T11:54:08 +0200 (CEST)
Count IPs: 116
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 1ab085a50f6907b5bc107faab7bdda70
Typ: strongips
Updated: T11:54:08 +0200 (CEST)
Count IPs: 542
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 91d33afe5e621b856492813d4e4ed7ef
Typ: ircbot
Updated: T11:54:08 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T11:54:09 +0200 (CEST)
Count IPs: 327
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: b85f9bddfea466df6621bbb1b9f0b116
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.