AbuseIPDB is a community-driven threat-intelligence platform for reporting and checking malicious IP addresses.
Overview
AbuseIPDB aggregates crowd-sourced reports of abusive behavior (e.g., SSH brute force, DDoS, spam) and exposes them via a REST API. In Qevlar, you can use it to enrich investigations, power detections/hunts, and automate block/allow decisions.
How to integrate AbuseIPDB with Qevlar
Step 1: Navigate to Integrations
- Log in to your Qevlar AI platform
- In the left sidebar, click Integrations
- Browse or search for AbuseIPDB
- Click the Manage button on the AbuseIPDB card to open the configuration dialog
Step 2: Choose your integration method
Qevlar offers two options:
- Option 1: Use Qevlar’s account (Quick start)
- Check “I want to use Qevlar’s account.”
- Click Save
This is the fastest way to get started. For heavier usage, dedicated rate limits, and auditability, prefer your own API key (Option 2).
- Option 2: Use your personal AbuseIPDB API key (Recommended)
If you want your own quotas and audit trail, create an API key in AbuseIPDB and paste it into Qevlar.
Create an AbuseIPDB API key
Follow the steps below in your AbuseIPDB account.
- Open the Account area
From the top navigation bar, click Account.

- Go to the API tab and create a key
Open the API tab, then click Create Key.

- Name the key and create it
Give the key a meaningful name (e.g., Qevlar AI) and click Create.

- Copy the generated key
Copy the newly created key. You will paste it into Qevlar.

Treat your API key like a password: never share it publicly or commit it to source control. Rotate immediately if exposed.
Step 3: Paste your key into Qevlar
- Return to the Qevlar AbuseIPDB integration dialog
- Select Use my API key
- Paste the key you just copied
- Click Test connection
- If the test succeeds, click Save
Using AbuseIPDB in Qevlar
Once connected, Qevlar can:
- Enrich indicators with AbuseIPDB data (confidence score, total reports, categories, last reported)
- Prioritize detections/hunts using score/recency thresholds
- Automate actions in SOAR playbooks (e.g., temporary blocklists, ticketing, stakeholder alerts)
Start with conservative thresholds (e.g., confidence ≥ 60 and reported within the last 30 days) and tune to your environment.
Best Practices
- Key hygiene: Store in a secrets manager, rotate quarterly or upon suspicion of compromise
- Scoping: Use separate keys per environment (prod, staging, lab) for auditability
- Human-in-the-loop: Require approval for broad/long-lived network blocks driven by reputation only
Troubleshooting
- Connection test failed
- Verify you pasted the key correctly (no leading/trailing spaces)
- Ensure you selected Use my API key before testing
- Check whether your key was deleted/rotated in AbuseIPDB
- Try regenerating the key in AbuseIPDB and updating it in Qevlar
- Free/low-tier keys have limited throughput
- Consider upgrading your AbuseIPDB plan or staggering bulk lookups
- Some IPs may be new or under-reported; corroborate with internal telemetry and other CTI sources