Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T23:07:17 +0200 (CEST)
Count IPs: 20183
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 9bc57160d60397e70fae11c1a636d08b
Typ: ssh
Updated: T23:07:17 +0200 (CEST)
Count IPs: 4844
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: afcbc85a5852e53c1c5445ae1f644f7f
Typ: mail
Updated: T23:07:18 +0200 (CEST)
Count IPs: 13754
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 632345474c802c73cdb7a5a086b79a57
Typ: apache
Updated: T23:07:19 +0200 (CEST)
Count IPs: 9029
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 4e1ca3642405b436280737ce0a64d828
Typ: imap
Updated: T23:07:19 +0200 (CEST)
Count IPs: 3898
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: b7d5d34f15d603c3c1e8ef0b47d29e3a
Typ: ftp
Updated: T23:07:19 +0200 (CEST)
Count IPs: 22
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: c3f7ba88525d12dff014b98e447935bb
Typ: sip
Updated: T23:07:20 +0200 (CEST)
Count IPs: 34
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: dcf97c9814e96f9d12410a4f902f7aeb
Typ: bots
Updated: T23:07:20 +0200 (CEST)
Count IPs: 461
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: feea0403887d3f62428e2dbe81e07651
Typ: strongips
Updated: T23:07:21 +0200 (CEST)
Count IPs: 246
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 61a72153f37c0a92a7e3d78d7adeaef8
Typ: ircbot
Updated: T23:07:21 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T23:07:22 +0200 (CEST)
Count IPs: 865
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 42f2864d6b52559025f6b5e56641fba6
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T23:07:17 +0200 (CEST)
Count IPs: 20183
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 9bc57160d60397e70fae11c1a636d08b
Typ: ssh
Updated: T23:07:17 +0200 (CEST)
Count IPs: 4844
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: afcbc85a5852e53c1c5445ae1f644f7f
Typ: mail
Updated: T23:07:18 +0200 (CEST)
Count IPs: 13754
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 632345474c802c73cdb7a5a086b79a57
Typ: apache
Updated: T23:07:19 +0200 (CEST)
Count IPs: 9029
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 4e1ca3642405b436280737ce0a64d828
Typ: imap
Updated: T23:07:19 +0200 (CEST)
Count IPs: 3898
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: b7d5d34f15d603c3c1e8ef0b47d29e3a
Typ: ftp
Updated: T23:07:19 +0200 (CEST)
Count IPs: 22
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: c3f7ba88525d12dff014b98e447935bb
Typ: sip
Updated: T23:07:20 +0200 (CEST)
Count IPs: 34
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: dcf97c9814e96f9d12410a4f902f7aeb
Typ: bots
Updated: T23:07:20 +0200 (CEST)
Count IPs: 461
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: feea0403887d3f62428e2dbe81e07651
Typ: strongips
Updated: T23:07:21 +0200 (CEST)
Count IPs: 246
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 61a72153f37c0a92a7e3d78d7adeaef8
Typ: ircbot
Updated: T23:07:21 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T23:07:22 +0200 (CEST)
Count IPs: 865
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 42f2864d6b52559025f6b5e56641fba6
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.