Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T07:36:02 +0100 (CET)
Count IPs: 21180
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 622a60f39ea22b8f0204303d48247c05
Typ: ssh
Updated: T07:36:02 +0100 (CET)
Count IPs: 6831
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 9ce70786fb73877faa9c99919220425a
Typ: mail
Updated: T07:36:03 +0100 (CET)
Count IPs: 13196
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 2045f91074961f72fb0ce78e8540d2f1
Typ: apache
Updated: T07:36:04 +0100 (CET)
Count IPs: 8370
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 9dfe07ad42f29a9b5fee7fa89013d373
Typ: imap
Updated: T07:36:04 +0100 (CET)
Count IPs: 2174
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 75118f6023987c9cd302270cf7bfe2a9
Typ: ftp
Updated: T07:36:04 +0100 (CET)
Count IPs: 58
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: b3f461b362a887a1a070525262e50990
Typ: sip
Updated: T07:36:04 +0100 (CET)
Count IPs: 80
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: f358f7dccb15ee582ec724a9bea61be6
Typ: bots
Updated: T07:36:05 +0100 (CET)
Count IPs: 606
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 278f04baaf232b28b8092f9adc944622
Typ: strongips
Updated: T07:36:05 +0100 (CET)
Count IPs: 326
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 6de9043c2667d4d9e367d332bc759ae0
Typ: ircbot
Updated: T07:36:05 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T07:36:06 +0100 (CET)
Count IPs: 247
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 1838800a2f440e0a8b0a7ca6ce759c21
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T07:36:02 +0100 (CET)
Count IPs: 21180
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 622a60f39ea22b8f0204303d48247c05
Typ: ssh
Updated: T07:36:02 +0100 (CET)
Count IPs: 6831
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 9ce70786fb73877faa9c99919220425a
Typ: mail
Updated: T07:36:03 +0100 (CET)
Count IPs: 13196
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 2045f91074961f72fb0ce78e8540d2f1
Typ: apache
Updated: T07:36:04 +0100 (CET)
Count IPs: 8370
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: 9dfe07ad42f29a9b5fee7fa89013d373
Typ: imap
Updated: T07:36:04 +0100 (CET)
Count IPs: 2174
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 75118f6023987c9cd302270cf7bfe2a9
Typ: ftp
Updated: T07:36:04 +0100 (CET)
Count IPs: 58
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: b3f461b362a887a1a070525262e50990
Typ: sip
Updated: T07:36:04 +0100 (CET)
Count IPs: 80
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: f358f7dccb15ee582ec724a9bea61be6
Typ: bots
Updated: T07:36:05 +0100 (CET)
Count IPs: 606
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 278f04baaf232b28b8092f9adc944622
Typ: strongips
Updated: T07:36:05 +0100 (CET)
Count IPs: 326
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 6de9043c2667d4d9e367d332bc759ae0
Typ: ircbot
Updated: T07:36:05 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T07:36:06 +0100 (CET)
Count IPs: 247
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: 1838800a2f440e0a8b0a7ca6ce759c21
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.