Combining Tines’ automation platform with AbuseIPDB’s threat intelligence database streamlines real-time IP threat detection and response, enhancing overall cybersecurity defenses.
With Tines, you can easily take any action that has a defined API. We've already pre-built some of the most popular ones for you, so you can build quickly.
With Tines, you can easily take any action that has a defined API using an HTTP request. To build even more quickly, copy a cURL command and paste it into the storyboard.
cURL request
curl -v -X GET --location "https://api.nasa.gov/neo/rest/v1/neo/browse?api_key=DEMO_KEY" -H 'Content-Type: application/json'
Paste in your Tines story
Explore pre-built workflows for AbuseIPDB. Use them for inspiration or as a starting point to build your custom automation solution.
Tools: AbuseIPDB, Team Cymru Scout
Tools: AbuseIPDB, Confluence, CrowdStrike, EmailRep, Okta, Slack, Tavily, Tines, URLScan.io, VirusTotal
Tools: AbuseIPDB, APIVoid, GreyNoise, Jira Software, Pulsedive, VirusTotal
Tools: AbuseIPDB, Jira Software, Proofpoint, URLScan.io, Zscaler
Tools: Abuse.ch, AbuseIPDB, Anomali ThreatStream, CrowdStrike, Hunter.io, Hybrid Analysis, MetaDefender, Pulsedive, Slack, URLScan.io, VirusTotal
Tools: AbuseIPDB, CrowdStrike, Jira Software, NextDNS, Phish Report, URLScan.io
It takes minutes, not months, to connect to tools in Tines.
Check out our blogs, browse our learning paths, and more.
Tines blog
Update from Tines; the smart, secure workflow builder for your whole team.
Go to blog
Case studies
Discover how companies – from Fortune 10 to startups – apply Tines to transform the way their teams operate.
Read case studies
Learn
Build your knowledge with dedicated learning paths at all levels.
Start learning
Learn
Go to docs