Combining Tines’ automation platform with AbuseIPDB’s threat intelligence database streamlines real-time IP threat detection and response, enhancing overall cybersecurity defenses.
With Tines, you can easily take any action that has a defined API. We've already pre-built some of the most popular ones for you, so you can build quickly.
With Tines, you can easily take any action that has a defined API using an HTTP request. To build even more quickly, copy a cURL command and paste it into the storyboard.
cURL request
curl -v -X GET --location "https://api.nasa.gov/neo/rest/v1/neo/browse?api_key=DEMO_KEY" -H 'Content-Type: application/json'
Paste in your Tines story
Explore pre-built workflows for AbuseIPDB. Use them for inspiration or as a starting point to build your custom automation solution.
Tools: AbuseIPDB, CrowdStrike, GreyNoise, Pulsedive, Sublime Security, Tines, URLScan.io, VirusTotal
Tools: AbuseIPDB, Anomali ThreatStream, CrowdStrike, Hunter.io, Hybrid Analysis, MetaDefender, Pulsedive, Slack, URLScan.io, VirusTotal
Tools: AbuseIPDB, APIVoid, GreyNoise, Jira Software, Pulsedive, VirusTotal
Tools: AbuseIPDB, Okta, Slack, VirusTotal
Tools: AbuseIPDB, Airtable, Criminal IP
Tools: AbuseIPDB, Cybereason, Jira Software
It takes minutes, not months, to connect to tools in Tines.
Check out our blogs, browse our learning paths, and more.
Tines blog
Update from Tines; the smart, secure workflow builder for your whole team.
Go to blog
Case studies
Discover how companies – from Fortune 10 to startups – apply Tines to transform the way their teams operate.
Read case studies
Learn
Build your knowledge with dedicated learning paths at all levels.
Start learning
Learn
Go to docs