AbuseIPDB
introduction this guide explains how to authenticate the abuseipdb connector in swimlane using api key authentication you will create an abuseipdb account, generate an api key, and configure the connector asset in swimlane turbine prerequisites abuseipdb access requirements you must have access to an abuseipdb account with permissions to generate api keys required credentials during setup you will collect abuseipdb api url abuseipdb api key generate abuseipdb api key navigate to https //www abuseipdb com/ click sign up to create a new account or login if you already have an account after logging in, open your user profile menu navigate to account settings open the api tab click create key provide a name for the api key click create to generate the key copy the generated api key and store it securely connector configuration in swimlane log in to turbine from the left navigation pane, click orchestration and select assets click the plus (+) icon to create a new asset select abuseipdb from the asset type list fill in the asset settings and asset input fields as shown below click create true 220,220,221left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type left unhandled content type troubleshooting ensure the api key is copied correctly from the abuseipdb portal verify the api endpoint url is correct and accessible if requests fail with authentication errors, regenerate the api key and update the swimlane asset ensure network connectivity from swimlane to the abuseipdb api endpoint if your environment requires a proxy, configure the http proxy parameter result you have successfully authenticated the abuseipdb connector in swimlane sources https //www abuseipdb com/api html