Combining Tines’ automation platform with AbuseIPDB’s threat intelligence database streamlines real-time IP threat detection and response, enhancing overall cybersecurity defenses.
With Tines, you can easily take any action that has a defined API. We've already pre-built some of the most popular ones for you, so you can build quickly.
With Tines, you can easily take any action that has a defined API using an HTTP request. To build even more quickly, copy a cURL command and paste it into the storyboard.
cURL request
curl -v -X GET --location "https://api.nasa.gov/neo/rest/v1/neo/browse?api_key=DEMO_KEY" -H 'Content-Type: application/json'
Paste in your Tines story
Explore pre-built workflows for AbuseIPDB. Use them for inspiration or as a starting point to build your custom automation solution.
Tools: AbuseIPDB, CrowdStrike, Jira Software, NextDNS, Phish Report, URLScan.io
Tools: AbuseIPDB, Jira Software, Proofpoint, URLScan.io, Zscaler
Tools: AbuseIPDB, Cybereason, Jira Software
Tools: AbuseIPDB, GreyNoise, Slack, VirusTotal
Tools: AbuseIPDB, Anomali ThreatStream, CrowdStrike, Hunter.io, Hybrid Analysis, MetaDefender, Pulsedive, Slack, URLScan.io, VirusTotal
Tools: AbuseIPDB, CrowdStrike, GreyNoise, Pulsedive, Sublime Security, Tines, URLScan.io, VirusTotal
It takes minutes, not months, to connect to tools in Tines.
Check out our blogs, browse our learning paths, and more.
Tines blog
Update from Tines; the smart, secure workflow builder for your whole team.
Go to blog
Case studies
Discover how companies – from Fortune 10 to startups – apply Tines to transform the way their teams operate.
Read case studies
Learn
Build your knowledge with dedicated learning paths at all levels.
Start learning
Learn
Go to docs