Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T14:48:02 +0100 (CET)
Count IPs: 20703
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 53b48244f98932bf2b02b0a31a0b4239
Typ: ssh
Updated: T14:48:02 +0100 (CET)
Count IPs: 6513
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 897ed4b13c20143c8122d12d54748175
Typ: mail
Updated: T14:48:03 +0100 (CET)
Count IPs: 12914
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: db28a634b437cea663a77526582620fe
Typ: apache
Updated: T14:48:04 +0100 (CET)
Count IPs: 8702
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: bbeeb6cd7fd98e3f584c84cffd57f184
Typ: imap
Updated: T14:48:04 +0100 (CET)
Count IPs: 2955
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: c4fb7fc0c0968ef83c4d94d6a04bfad0
Typ: ftp
Updated: T14:48:04 +0100 (CET)
Count IPs: 41
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 2361d590852d9c31b34800165197ce68
Typ: sip
Updated: T14:48:04 +0100 (CET)
Count IPs: 36
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 50843c1f4437969c2023d7ba13d8ae3f
Typ: bots
Updated: T14:48:05 +0100 (CET)
Count IPs: 458
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 94bf0052903fa0d2b8b40d9bcfc79d24
Typ: strongips
Updated: T14:48:05 +0100 (CET)
Count IPs: 375
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 70333fe6b150f01479d0d27c9ad701ca
Typ: ircbot
Updated: T14:48:05 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T14:48:06 +0100 (CET)
Count IPs: 338
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 87a53b759c45e5806597fc2ddb2ba13e
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T14:48:02 +0100 (CET)
Count IPs: 20703
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 53b48244f98932bf2b02b0a31a0b4239
Typ: ssh
Updated: T14:48:02 +0100 (CET)
Count IPs: 6513
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 897ed4b13c20143c8122d12d54748175
Typ: mail
Updated: T14:48:03 +0100 (CET)
Count IPs: 12914
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: db28a634b437cea663a77526582620fe
Typ: apache
Updated: T14:48:04 +0100 (CET)
Count IPs: 8702
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: bbeeb6cd7fd98e3f584c84cffd57f184
Typ: imap
Updated: T14:48:04 +0100 (CET)
Count IPs: 2955
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: c4fb7fc0c0968ef83c4d94d6a04bfad0
Typ: ftp
Updated: T14:48:04 +0100 (CET)
Count IPs: 41
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 2361d590852d9c31b34800165197ce68
Typ: sip
Updated: T14:48:04 +0100 (CET)
Count IPs: 36
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 50843c1f4437969c2023d7ba13d8ae3f
Typ: bots
Updated: T14:48:05 +0100 (CET)
Count IPs: 458
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 94bf0052903fa0d2b8b40d9bcfc79d24
Typ: strongips
Updated: T14:48:05 +0100 (CET)
Count IPs: 375
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 70333fe6b150f01479d0d27c9ad701ca
Typ: ircbot
Updated: T14:48:05 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T14:48:06 +0100 (CET)
Count IPs: 338
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 87a53b759c45e5806597fc2ddb2ba13e
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.