Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T07:54:02 +0200 (CEST)
Count IPs: 23729
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 1f4270c524cd7c2296a3171a0f1b0f1d
Typ: ssh
Updated: T07:54:02 +0200 (CEST)
Count IPs: 7016
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 4306c3ba4ca9ccc543a5a22b9a4f0738
Typ: mail
Updated: T07:54:03 +0200 (CEST)
Count IPs: 13928
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: c5a7d4ea660ed7735ff29f9f37c494b4
Typ: apache
Updated: T07:54:03 +0200 (CEST)
Count IPs: 8488
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: b2d405c4073f7b3f825d70b44b126565
Typ: imap
Updated: T07:54:04 +0200 (CEST)
Count IPs: 1087
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 368c58d97758297828ecf3ac891fdc89
Typ: ftp
Updated: T07:54:04 +0200 (CEST)
Count IPs: 244
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: a83519686be71521bf81889453459afe
Typ: sip
Updated: T07:54:04 +0200 (CEST)
Count IPs: 25
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: db70e5072495d4d22df5cba3459b3ad2
Typ: bots
Updated: T07:54:04 +0200 (CEST)
Count IPs: 1989
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 110d96a5ba18d489f40ae92a32fb5c8a
Typ: strongips
Updated: T07:54:04 +0200 (CEST)
Count IPs: 343
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: ea2b8789887bf6af019868477fce6c86
Typ: ircbot
Updated: T07:54:04 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T07:54:05 +0200 (CEST)
Count IPs: 462
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: cd127bc6d15a2de8674311b787c239ef
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T07:54:02 +0200 (CEST)
Count IPs: 23729
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 1f4270c524cd7c2296a3171a0f1b0f1d
Typ: ssh
Updated: T07:54:02 +0200 (CEST)
Count IPs: 7016
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 4306c3ba4ca9ccc543a5a22b9a4f0738
Typ: mail
Updated: T07:54:03 +0200 (CEST)
Count IPs: 13928
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: c5a7d4ea660ed7735ff29f9f37c494b4
Typ: apache
Updated: T07:54:03 +0200 (CEST)
Count IPs: 8488
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: b2d405c4073f7b3f825d70b44b126565
Typ: imap
Updated: T07:54:04 +0200 (CEST)
Count IPs: 1087
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 368c58d97758297828ecf3ac891fdc89
Typ: ftp
Updated: T07:54:04 +0200 (CEST)
Count IPs: 244
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: a83519686be71521bf81889453459afe
Typ: sip
Updated: T07:54:04 +0200 (CEST)
Count IPs: 25
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: db70e5072495d4d22df5cba3459b3ad2
Typ: bots
Updated: T07:54:04 +0200 (CEST)
Count IPs: 1989
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 110d96a5ba18d489f40ae92a32fb5c8a
Typ: strongips
Updated: T07:54:04 +0200 (CEST)
Count IPs: 343
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: ea2b8789887bf6af019868477fce6c86
Typ: ircbot
Updated: T07:54:04 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T07:54:05 +0200 (CEST)
Count IPs: 462
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: cd127bc6d15a2de8674311b787c239ef
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.