Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T22:54:02 +0200 (CEST)
Count IPs: 21690
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: c0b1007c007a3dfcbc5528bf600aef48
Typ: ssh
Updated: T22:54:03 +0200 (CEST)
Count IPs: 7060
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: f1f813d2f6bfcffb54a5e586bc5e7006
Typ: mail
Updated: T22:54:04 +0200 (CEST)
Count IPs: 13121
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 506902be320a36819e6ff29d5c600af6
Typ: apache
Updated: T22:54:04 +0200 (CEST)
Count IPs: 8697
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 37b02164891362003b777ec7e921f44b
Typ: imap
Updated: T22:54:05 +0200 (CEST)
Count IPs: 3484
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 50e2e1bb3be27703d35123e6a85882ed
Typ: ftp
Updated: T22:54:05 +0200 (CEST)
Count IPs: 21
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 39da65a6cac8aa8413ce376c50a784ee
Typ: sip
Updated: T22:54:05 +0200 (CEST)
Count IPs: 40
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 151f2e7ce81b9aeb0597fa38d376c353
Typ: bots
Updated: T22:54:06 +0200 (CEST)
Count IPs: 712
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: dd5f0503b45a7221d8bc46b844d63285
Typ: strongips
Updated: T22:54:07 +0200 (CEST)
Count IPs: 286
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: fd9d0e79530e713c28f6c3521cd5520b
Typ: ircbot
Updated: T22:54:07 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T22:54:07 +0200 (CEST)
Count IPs: 457
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: f9d516159f7836554846ad115276b62f
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T22:54:02 +0200 (CEST)
Count IPs: 21690
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: c0b1007c007a3dfcbc5528bf600aef48
Typ: ssh
Updated: T22:54:03 +0200 (CEST)
Count IPs: 7060
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: f1f813d2f6bfcffb54a5e586bc5e7006
Typ: mail
Updated: T22:54:04 +0200 (CEST)
Count IPs: 13121
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 506902be320a36819e6ff29d5c600af6
Typ: apache
Updated: T22:54:04 +0200 (CEST)
Count IPs: 8697
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 37b02164891362003b777ec7e921f44b
Typ: imap
Updated: T22:54:05 +0200 (CEST)
Count IPs: 3484
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 50e2e1bb3be27703d35123e6a85882ed
Typ: ftp
Updated: T22:54:05 +0200 (CEST)
Count IPs: 21
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 39da65a6cac8aa8413ce376c50a784ee
Typ: sip
Updated: T22:54:05 +0200 (CEST)
Count IPs: 40
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 151f2e7ce81b9aeb0597fa38d376c353
Typ: bots
Updated: T22:54:06 +0200 (CEST)
Count IPs: 712
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: dd5f0503b45a7221d8bc46b844d63285
Typ: strongips
Updated: T22:54:07 +0200 (CEST)
Count IPs: 286
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: fd9d0e79530e713c28f6c3521cd5520b
Typ: ircbot
Updated: T22:54:07 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T22:54:07 +0200 (CEST)
Count IPs: 457
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: f9d516159f7836554846ad115276b62f
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.