Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T02:54:02 +0100 (CET)
Count IPs: 22873
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 54eea9cf43cfde6e8f9f3a124b02b67f
Typ: ssh
Updated: T02:54:02 +0100 (CET)
Count IPs: 6791
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: c9115363de3ab8c07f79c560261b4c04
Typ: mail
Updated: T02:54:03 +0100 (CET)
Count IPs: 14439
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 8f831a6a061f7f732782191caddffcff
Typ: apache
Updated: T02:54:03 +0100 (CET)
Count IPs: 8770
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: b9ebed47379f7113d93ce64dbf1ff5ce
Typ: imap
Updated: T02:54:04 +0100 (CET)
Count IPs: 3724
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 785af9d24d75afced964cd9f9a539dfe
Typ: ftp
Updated: T02:54:04 +0100 (CET)
Count IPs: 33
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 2b9e014105699be2f26ee0ff176fa172
Typ: sip
Updated: T02:54:05 +0100 (CET)
Count IPs: 16
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: b30abbd12d6ea99664c435993b3c5457
Typ: bots
Updated: T02:54:05 +0100 (CET)
Count IPs: 785
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: d514c2d356f26ee229a366270b6927f1
Typ: strongips
Updated: T02:54:06 +0100 (CET)
Count IPs: 409
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 82dea45630fab6d4f6a7d9af768c69b6
Typ: ircbot
Updated: T02:54:06 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T02:54:07 +0100 (CET)
Count IPs: 674
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: ff087178f255d1c369f70c72626789b6
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T02:54:02 +0100 (CET)
Count IPs: 22873
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: 54eea9cf43cfde6e8f9f3a124b02b67f
Typ: ssh
Updated: T02:54:02 +0100 (CET)
Count IPs: 6791
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: c9115363de3ab8c07f79c560261b4c04
Typ: mail
Updated: T02:54:03 +0100 (CET)
Count IPs: 14439
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 8f831a6a061f7f732782191caddffcff
Typ: apache
Updated: T02:54:03 +0100 (CET)
Count IPs: 8770
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: b9ebed47379f7113d93ce64dbf1ff5ce
Typ: imap
Updated: T02:54:04 +0100 (CET)
Count IPs: 3724
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 785af9d24d75afced964cd9f9a539dfe
Typ: ftp
Updated: T02:54:04 +0100 (CET)
Count IPs: 33
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: 2b9e014105699be2f26ee0ff176fa172
Typ: sip
Updated: T02:54:05 +0100 (CET)
Count IPs: 16
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: b30abbd12d6ea99664c435993b3c5457
Typ: bots
Updated: T02:54:05 +0100 (CET)
Count IPs: 785
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: d514c2d356f26ee229a366270b6927f1
Typ: strongips
Updated: T02:54:06 +0100 (CET)
Count IPs: 409
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: 82dea45630fab6d4f6a7d9af768c69b6
Typ: ircbot
Updated: T02:54:06 +0100 (CET)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T02:54:07 +0100 (CET)
Count IPs: 674
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: ff087178f255d1c369f70c72626789b6
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.