Export all blocked IPs
To use our Lists via DNS.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T12:36:02 +0200 (CEST)
Count IPs: 21391
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: e9695cedaf136a17dcb4175dff1225af
Typ: ssh
Updated: T12:36:02 +0200 (CEST)
Count IPs: 6148
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 9bfe9eb135508d9ca3943100f9579343
Typ: mail
Updated: T12:36:03 +0200 (CEST)
Count IPs: 13238
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 4ff4d08980973efc0c9c72f9c2613ef4
Typ: apache
Updated: T12:36:04 +0200 (CEST)
Count IPs: 8873
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: f9b7000fe40aea6a1c87d52d79c3c36d
Typ: imap
Updated: T12:36:04 +0200 (CEST)
Count IPs: 3433
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 7b15090f103097b2a29409b569c8cdf0
Typ: ftp
Updated: T12:36:04 +0200 (CEST)
Count IPs: 199
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: dea51a7cc6b6583f35321bb7d76bccd9
Typ: sip
Updated: T12:36:04 +0200 (CEST)
Count IPs: 74
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 900acfe384df5c43f034f88a1e5bea1d
Typ: bots
Updated: T12:36:05 +0200 (CEST)
Count IPs: 820
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 7fe2b9d243e894bddbac4674b5f677d1
Typ: strongips
Updated: T12:36:05 +0200 (CEST)
Count IPs: 323
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: cec67e4f72f9e85a7721473746b9a175
Typ: ircbot
Updated: T12:36:05 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T12:36:06 +0200 (CEST)
Count IPs: 719
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: c54777934497cd186ec6746c08004ef7
time = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.
The rbldnsd-Zone-Files
To get only the last addedd IPs
Here the lists of the attackers IP addresses of the last 48 hours pro service or all addresses for downloading. *
These lists contain one line per IP address.
These lists are generated every 30 minutes.
These files are compressed (gzip) from the web server (nginx). Windows editor, vi, and etc. can open the file. Depending on the software used, an unpack may be necessary.
These files are as they are, and to be used at your own risk.
Typ: all
Updated: T12:36:02 +0200 (CEST)
Count IPs: 21391
Description: All IP addresses that have attacked one of our customers/servers in the last 48 hours.
Download: https://lists.blocklist.de/lists/all.txt
MD5: e9695cedaf136a17dcb4175dff1225af
Typ: ssh
Updated: T12:36:02 +0200 (CEST)
Count IPs: 6148
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service SSH.
Download: https://lists.blocklist.de/lists/ssh.txt
MD5: 9bfe9eb135508d9ca3943100f9579343
Typ: mail
Updated: T12:36:03 +0200 (CEST)
Count IPs: 13238
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Mail, Postfix.
Download: https://lists.blocklist.de/lists/mail.txt
MD5: 4ff4d08980973efc0c9c72f9c2613ef4
Typ: apache
Updated: T12:36:04 +0200 (CEST)
Count IPs: 8873
Description: All IP addresses which have been reported within the last 48 hours as having run attacks on the service Apache, Apache-DDOS, RFI-Attacks.
Download: https://lists.blocklist.de/lists/apache.txt
MD5: f9b7000fe40aea6a1c87d52d79c3c36d
Typ: imap
Updated: T12:36:04 +0200 (CEST)
Count IPs: 3433
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service imap, sasl, pop3.....
Download: https://lists.blocklist.de/lists/imap.txt
MD5: 7b15090f103097b2a29409b569c8cdf0
Typ: ftp
Updated: T12:36:04 +0200 (CEST)
Count IPs: 199
Description: All IP addresses which have been reported within the last 48 hours for attacks on the Service FTP.
Download: https://lists.blocklist.de/lists/ftp.txt
MD5: dea51a7cc6b6583f35321bb7d76bccd9
Typ: sip
Updated: T12:36:04 +0200 (CEST)
Count IPs: 74
Description: All IP addresses that tried to login in a SIP-, VOIP- or Asterisk-Server and are inclueded in the IPs-List from http://www.infiltrated.net/ (Twitter).
Download: https://lists.blocklist.de/lists/sip.txt
MD5: 900acfe384df5c43f034f88a1e5bea1d
Typ: bots
Updated: T12:36:05 +0200 (CEST)
Count IPs: 820
Description: All IP addresses which have been reported within the last 48 hours as having run attacks attacks on the RFI-Attacks, REG-Bots, IRC-Bots or BadBots (BadBots = he has posted a Spam-Comment on a open Forum or Wiki).
Download: https://lists.blocklist.de/lists/bots.txt
MD5: 7fe2b9d243e894bddbac4674b5f677d1
Typ: strongips
Updated: T12:36:05 +0200 (CEST)
Count IPs: 323
Description: All IPs which are older then 2 month and have more then 5.000 attacks.
Download: https://lists.blocklist.de/lists/strongips.txt
MD5: cec67e4f72f9e85a7721473746b9a175
Typ: ircbot
Updated: T12:36:05 +0200 (CEST)
Count IPs:
Description:
Download: https://lists.blocklist.de/lists/ircbot.txt
MD5:
Typ: bruteforcelogin
Updated: T12:36:06 +0200 (CEST)
Count IPs: 719
Description: All IPs which attacks Joomlas, Wordpress and other Web-Logins with Brute-Force Logins.
Download: https://lists.blocklist.de/lists/bruteforcelogin.txt
MD5: c54777934497cd186ec6746c08004ef7
To get only the last added IP-Addresses you can use:
https://api.blocklist.de/getlast.php?time=xx:xxtime = unixtime
OR
time = hh:ii
Policy:
In the Export / DNS list all IP addresses which have in the past 48 hours executed an attack on our systems and/or partners. These are addresses which have not used the Delist-Link.
. * And have two AS networks which are just spamming without customers.