Combining Tines’ automation platform with AbuseIPDB’s threat intelligence database streamlines real-time IP threat detection and response, enhancing overall cybersecurity defenses.
With Tines, you can easily take any action that has a defined API. We've already pre-built some of the most popular ones for you, so you can build quickly.
With Tines, you can easily take any action that has a defined API using an HTTP request. To build even more quickly, copy a cURL command and paste it into the storyboard.
cURL request
curl -v -X GET --location "https://api.nasa.gov/neo/rest/v1/neo/browse?api_key=DEMO_KEY" -H 'Content-Type: application/json'Paste in your Tines story
Explore pre-built workflows for AbuseIPDB. Use them for inspiration or as a starting point to build your custom automation solution.
Tools: AbuseIPDB, Team Cymru Scout

Tools: 1Password, AbuseIPDB, Tines, VirusTotal
Tools: AbuseIPDB, Thinkst Canary
By Dennis Chow


Tools: AbuseIPDB, Okta, Slack, VirusTotal

Tools: AbuseIPDB, Jira Software, Proofpoint, URLScan.io, Zscaler


Tools: AbuseIPDB, Cybereason, Jira Software


It takes minutes, not months, to connect to tools in Tines.
Check out our blogs, browse our learning paths, and more.
Tines blog
Update from Tines; the smart, secure workflow builder for your whole team.
Go to blog
Case studies
Discover how companies – from Fortune 10 to startups – apply Tines to transform the way their teams operate.
Read case studies
Learn
Build your knowledge with dedicated learning paths at all levels.
Start learning
Learn
Go to docs