AbuseIPDB

Follow these steps to register, obtain your API key, and select an appropriate subscription plan from AbuseIPDB:

  1. Registration
    • Visit the AbuseIPDB website: https://www.abuseipdb.com/
    • Click on the "Sign Up" or "Register" button (typically located in the top-right corner)
    • Complete the registration process by providing the required information
  2. Log In
    • Once registered, log in to your AbuseIPDB account
  3. Access Your Account Settings
    • After logging in, locate your profile name in the top-right corner of the page
    • Click on your profile name to reveal a dropdown menu
    • Select the "Account" option from this menu
  4. Navigate to the API Section
    • In your account settings, find and click on the "API" tab
  5. Generate Your API Key
    • Look for a button labeled "Create Key" and click on it
    • You may be prompted to enter a name for your API key (choose a name that helps you remember its purpose)
  6. Retrieve Your API Key
    • Once created, your new API key will be displayed
    • You should see a "Copy" button next to the key - use this to copy the key to your clipboard
  7. Select a Subscription Plan
    • AbuseIPDB offers various monthly and yearly subscription plans to accommodate diverse user needs
    • Consider factors such as:
      • Your expected query volume
      • Required API access levels
      • Additional features you may need
    • For the most up-to-date information on pricing tiers and included features, visit AbuseIPDB's official pricing page: AbuseIPDB Pricing
    • Review the available options carefully to find the plan that best aligns with your threat hunting and analysis needs
  8. Important Considerations
    • Keep your API key secure and do not share it publicly
    • Be aware that your use of the API is subject to AbuseIPDB's Terms of Use and Privacy Policy
    • Review the API documentation for usage limits and best practices
    • Selecting the appropriate plan ensures you have the necessary resources to maximize the effectiveness of EvidenceHub in your threat analysis workflow

Remember to integrate this API key into your EvidenceHub settings as described in the main setup guide.

Need Assistance? If you're unsure which plan is right for you or encounter any issues during this process, the AbuseIPDB team is available to help. They can provide guidance based on your specific use case and requirements. You can also refer to AbuseIPDB's official documentation or contact us for assistance.