Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T21:06:02 +0200 (CEST)
Count IPs: 23320
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: bedf7b6c1a6a5a74b3026ccf6b86c2ee
Typ: ssh
Updated: T21:06:02 +0200 (CEST)
Count IPs: 11652
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 24788c94941db584439c189cb5ad38a5
Typ: mail
Updated: T21:06:03 +0200 (CEST)
Count IPs: 11165
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 3110ddc27a1f61f534132eff2a0cff2a
Typ: apache
Updated: T21:06:03 +0200 (CEST)
Count IPs: 8167
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: d3a13f67db78b56a73a12592a271afac
Typ: imap
Updated: T21:06:03 +0200 (CEST)
Count IPs: 3014
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: e37d320ab80693226281d51e3edc490b
Typ: ftp
Updated: T21:06:03 +0200 (CEST)
Count IPs: 105
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 547e7e2d081dc2b22ce9e5bf76264cc5
Typ: sip
Updated: T21:06:04 +0200 (CEST)
Count IPs: 81
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 56628f3fabd74a33a55748c78f4151f3
Typ: bots
Updated: T21:06:04 +0200 (CEST)
Count IPs: 111
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: ab3a0459377344eb5b53c64dd32aba2e
Typ: strongips
Updated: T21:06:04 +0200 (CEST)
Count IPs: 338
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 61f06ebcd624c3d645ae12b562987fbe
Typ: ircbot
Updated: T21:06:04 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T21:06:04 +0200 (CEST)
Count IPs: 138
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: aa65a11e5ef9083ac93e9f27d6b6b3ab
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T21:06:02 +0200 (CEST)
Count IPs: 23320
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: bedf7b6c1a6a5a74b3026ccf6b86c2ee
Typ: ssh
Updated: T21:06:02 +0200 (CEST)
Count IPs: 11652
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 24788c94941db584439c189cb5ad38a5
Typ: mail
Updated: T21:06:03 +0200 (CEST)
Count IPs: 11165
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 3110ddc27a1f61f534132eff2a0cff2a
Typ: apache
Updated: T21:06:03 +0200 (CEST)
Count IPs: 8167
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: d3a13f67db78b56a73a12592a271afac
Typ: imap
Updated: T21:06:03 +0200 (CEST)
Count IPs: 3014
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: e37d320ab80693226281d51e3edc490b
Typ: ftp
Updated: T21:06:03 +0200 (CEST)
Count IPs: 105
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 547e7e2d081dc2b22ce9e5bf76264cc5
Typ: sip
Updated: T21:06:04 +0200 (CEST)
Count IPs: 81
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 56628f3fabd74a33a55748c78f4151f3
Typ: bots
Updated: T21:06:04 +0200 (CEST)
Count IPs: 111
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: ab3a0459377344eb5b53c64dd32aba2e
Typ: strongips
Updated: T21:06:04 +0200 (CEST)
Count IPs: 338
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 61f06ebcd624c3d645ae12b562987fbe
Typ: ircbot
Updated: T21:06:04 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T21:06:04 +0200 (CEST)
Count IPs: 138
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: aa65a11e5ef9083ac93e9f27d6b6b3ab
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.