Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T08:36:01 +0100 (CET)
Count IPs: 24634
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: cdf5b8f2c003f418adbe8db6e8318346
Typ: ssh
Updated: T08:36:02 +0100 (CET)
Count IPs: 10768
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: cdd11d0812725add5e00afce44286291
Typ: mail
Updated: T08:36:02 +0100 (CET)
Count IPs: 12859
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 82f26c10ee45529f095e844a4fbb3c0a
Typ: apache
Updated: T08:36:02 +0100 (CET)
Count IPs: 8615
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 444ec71111a3b42d9a722fb1fcfab595
Typ: imap
Updated: T08:36:03 +0100 (CET)
Count IPs: 4393
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: d022d3753b391819212565b5a3d08d5b
Typ: ftp
Updated: T08:36:03 +0100 (CET)
Count IPs: 85
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: fdf1a3fa1e9d197d8e3a6dc46fd8d322
Typ: sip
Updated: T08:36:03 +0100 (CET)
Count IPs: 54
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 5ebbfd55eb7e599ae5d915a72c0b30c9
Typ: bots
Updated: T08:36:03 +0100 (CET)
Count IPs: 214
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 5b149b1d36773c85fd53bf9b83c4adcb
Typ: strongips
Updated: T08:36:03 +0100 (CET)
Count IPs: 676
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 87cdeefdc04cd2294d271b4a39ad0207
Typ: ircbot
Updated: T08:36:03 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T08:36:04 +0100 (CET)
Count IPs: 529
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: a5acda77d91959582b999ee3a81768ee
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T08:36:01 +0100 (CET)
Count IPs: 24634
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: cdf5b8f2c003f418adbe8db6e8318346
Typ: ssh
Updated: T08:36:02 +0100 (CET)
Count IPs: 10768
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: cdd11d0812725add5e00afce44286291
Typ: mail
Updated: T08:36:02 +0100 (CET)
Count IPs: 12859
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 82f26c10ee45529f095e844a4fbb3c0a
Typ: apache
Updated: T08:36:02 +0100 (CET)
Count IPs: 8615
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 444ec71111a3b42d9a722fb1fcfab595
Typ: imap
Updated: T08:36:03 +0100 (CET)
Count IPs: 4393
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: d022d3753b391819212565b5a3d08d5b
Typ: ftp
Updated: T08:36:03 +0100 (CET)
Count IPs: 85
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: fdf1a3fa1e9d197d8e3a6dc46fd8d322
Typ: sip
Updated: T08:36:03 +0100 (CET)
Count IPs: 54
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 5ebbfd55eb7e599ae5d915a72c0b30c9
Typ: bots
Updated: T08:36:03 +0100 (CET)
Count IPs: 214
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 5b149b1d36773c85fd53bf9b83c4adcb
Typ: strongips
Updated: T08:36:03 +0100 (CET)
Count IPs: 676
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 87cdeefdc04cd2294d271b4a39ad0207
Typ: ircbot
Updated: T08:36:03 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T08:36:04 +0100 (CET)
Count IPs: 529
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: a5acda77d91959582b999ee3a81768ee
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.