AbuseIPDB icon
AbuseIPDB icon

AbuseIPDB

 3 likes

AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.

AbuseIPDB screenshot 1

License model

  • FreemiumProprietary

Country of Origin

  • US flagUnited States

Platforms

  • Online
  No rating
3likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Reporting
  2.  API Integration

 Tags

AbuseIPDB News & Activities

Highlights All activities

Recent activities

Show all activities

AbuseIPDB information

  • Developed by

    US flagMarathon Studios Inc.
  • Licensing

    Proprietary and Freemium product.
  • Pricing

    Subscription ranging between $19 and $99 per month + free version with limited functionality.
  • Alternatives

    40 alternatives listed
  • Supported Languages

    • English

Our users have written 0 comments and reviews about AbuseIPDB, and it has gotten 3 likes

AbuseIPDB was added to AlternativeTo by alebcay on Aug 19, 2019 and this page was last updated May 25, 2022.
No comments or reviews, maybe you want to be first?
Post comment/review

What is AbuseIPDB?

As anyone who has maintained a website or server knows, the entire Internet is being continually scanned and subjected to malicious attacks attempts like those listed above, which are being carried out en-masse by hackers, spammers, and other bad actors from around the world. These actors use automated software to scan and attack millions of targets twenty-four hours a day - often originating from IP addresses associated with shady hosting companies, botnets, hacked servers, or other machines otherwise controlled by hackers.

While these wide-ranging attacks help hackers raise their chances of finding a vulnerable target to exploit, they also provide the opportunity for webmasters and systems administrators to share their system logs and proactively detect and mitigate attacks coming from IP addresses that are known to be associated with malicious activity.

That's our mission at AbuseIPDB - to provide an easy way for sysadmins to both report malicious IP addresses, and gain access to a crowdsourced list of bad IPs before they've even had the chance to attack your infrastructure.