AbuseIPDB is a project helping make Web safer by providing a central blacklist for webmasters, system administrators, and other interested parties to report and find IP addresses that have been associated with malicious activity online.
Write Python and use any of the 350k+ PyPi packages available. Refer to the Pipedream Python docs to learn more.
AbuseIPDB is a platform providing an API to report and check IP addresses to detect and prevent malicious activities. With the AbuseIPDB API on Pipedream, you can automate the process of monitoring, reporting, and acting upon incidents involving suspect IP addresses. This can mean auto-generating reports for suspicious traffic, cross-referencing with other security data sources, or triggering alerts in real-time for proactive defense measures.
import { axios } from "@pipedream/platform"
export default defineComponent({
props: {
abuselpdb: {
type: "app",
app: "abuselpdb",
}
},
async run({steps, $}) {
return await axios($, {
url: `https://api.abuseipdb.com/api/v2/check`,
headers: {
"Key": `${this.abuselpdb.$auth.api_key}`,
},
params: {
ipAddress: `{enter_ip_here}`,
maxAgeInDays: `90`,
},
})
},
})
Develop, run and deploy your Python code in Pipedream workflows. Integrate seamlessly between no-code steps, with connected accounts, or integrate Data Stores and manipulate files within a workflow.
This includes installing PyPI packages, within your code without having to manage a requirements.txt
file or running pip
.
Below is an example of using Python to access data from the trigger of the workflow, and sharing it with subsequent workflow steps:
def handler(pd: "pipedream"):
# Reference data from previous steps
print(pd.steps["trigger"]["context"]["id"])
# Return data for use in future steps
return {"foo": {"test":True}}