Skip to main content
AbuseIPDB

Integrate AbuseIPDB with Torq for secure internet operations.

Updated today

AbuseIPDB is a centralized database of IP addresses associated with malicious activity online.

Torq enables quick and easy integration with AbuseIPDB, so you can automate anything and everything within moments. Torq's public AbuseIPDB steps include:

  • Get a blacklist

  • Get information for a single IP address

  • Get information for a subnet

  • Report an IP address

If you don't see a step you need, you can create your own in various ways, such as using the Send an HTTP Request step or Torq’s Step Builder, and share it across your organization.

To use AbuseIPDB steps in Torq workflows, look here.

Use AbuseIPDB Steps in Torq

Step One: Create an AbuseIPDB API Token

  1. Login: Login to your AbuseIPDB portal.

  2. Create a Key: Go to API > Create Key.

    1. Give your key a unique and meaningful name.

    2. Copy your key to use in Torq.

Step Two: Create an AbuseIPDB Steps Integration in Torq

  1. Navigate to Integration: Go to Build > Integrations > Triggers > AbuseIPDB and click Add.

  2. Fill in the Details:

    1. Give the integration a unique and meaningful name.

    2. Under the API Key field, enter the API token you copied from AbuseIPDB in step one.

  3. Test: Click Test Integration to verify the integration is configured correctly.

  4. Finalize: Click Add.

Templates

Now that you've added your integrations, check out these specially crafted templates by Torq's security experts. Visit Torq's template library for more.

Did this answer your question?