IP滥用检查API是一个旨在支持计算机系统中的安全、监控和流量分析过程的工具。它的主要功能是提供有关IP历史的结构化和汇总信息,包括滥用报告、事件频率、检测到的活动类型,以及与网络提供商相关的元数据。这些信息使开发人员、系统管理员和网络安全团队能够就如何处理入站或出站连接做出明智的决策。
该API从多个来源收集数据,包括自动和手动,报告潜在可疑行为,如未经授权的连接尝试、端口扫描、暴力破解攻击或异常流量。此外,它整合了上下文信息,如互联网服务提供商、原产国、网络使用类型以及白名单或黑名单状态。所有这些信息都以标准化的响应方式呈现,便于应用程序处理。
该API的一个关键价值是滥用分数或置信度,它有助于区分确认的恶意活动和自动安全系统产生的误报。
{"ip":"8.8.8.8","is_listed":false,"confidence_of_abuse":0,"total_reports":14,"distinct_reporters":8,"first_reported_at":"2026-01-15","last_reported_at":"2026-01-22","is_recent_activity":true,"isp":"Google LLC","usage_type":"Content Delivery Network","asn":null,"hostname":"dns.google","domain":"google.com","country":"United States of America","country_code":"US","city":null,"region":null,"reports":[{"reported_at":"2026-01-22T20:28:34Z","reporter":134282,"comment":"Unauthorized connection attempt","categories":[14,15,20]},{"reported_at":"2026-01-20T16:49:05Z","reporter":134282,"comment":"Unauthorized connection attempt","categories":[14,15,20]},{"reported_at":"2026-01-20T11:02:29Z","reporter":116616,"comment":"Detected port scanning activity (SIP\/VoIP scanner).","categories":[8,14,15,18]},{"reported_at":"2026-01-20T06:07:19Z","reporter":209271,"comment":"Blocked by UFW (TCP on 52983)\nSource port: 53\nTTL: 112\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-20T03:29:35Z","reporter":264073,"comment":"...","categories":[18,22]},{"reported_at":"2026-01-19T05:43:19Z","reporter":209271,"comment":"Blocked by UFW (TCP on 52128)\nSource port: 53\nTTL: 113\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-18T06:56:55Z","reporter":258755,"comment":"Auto-reported by Fail2Ban (NPM-Auth)","categories":[18,21]},{"reported_at":"2026-01-18T05:11:10Z","reporter":264073,"comment":"...","categories":[18,22]},{"reported_at":"2026-01-17T23:07:19Z","reporter":56171,"comment":"ThreatBook Intelligence: Whitelist,cdn more details on https:\/\/threatbook.io\/ip\/8.8.8.8\n2026-01-17 01:28:07 \/cgi-bin\/network_config\/nsg_masq.cgi?user_name=admin&session_id=..\/&lang=zh_CN.UTF-8&act=2&proto=;ls>\/usr\/local\/lyx\/lyxcenter\/web\/SpVk.html;","categories":[21]},{"reported_at":"2026-01-17T08:25:47Z","reporter":209271,"comment":"Blocked by UFW (TCP on 65265)\nSource port: 53\nTTL: 117\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-17T06:28:36Z","reporter":261807,"comment":"Fail2Ban identified brute-force attack from 8.8.8.8","categories":[22]},{"reported_at":"2026-01-17T04:02:14Z","reporter":44461,"comment":"IPFire IPS Alert (2026-01-17): ET MALWARE Possible Tinba DGA NXDOMAIN Responses. Observed events: 1","categories":[21]},{"reported_at":"2026-01-16T10:16:38Z","reporter":209271,"comment":"Blocked by UFW (TCP on 64329)\nSource port: 53\nTTL: 117\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-15T15:05:06Z","reporter":134282,"comment":"Unauthorized connection attempt","categories":[14,15,20]}],"scraped_at":"2026-01-23T12:53:32Z","is_whitelisted":true,"is_public":true,"_cached":true,"_cache_key":"ipx_api:abuse_check:8_8_8_8"}
curl --location --request GET 'https://zylalabs.com/api/11757/ip+abuse+check+api/22304/ip+verification?ip=8.8.8.8' --header 'Authorization: Bearer YOUR_API_KEY'
| 标头 | 描述 |
|---|---|
授权
|
[必需] 应为 Bearer access_key. 订阅后,请查看上方的"您的 API 访问密钥"。 |
无长期承诺。随时升级、降级或取消。 免费试用包括最多 50 个请求。
IP验证端点返回有关IP地址声誉的数据,包括滥用报告、最近活动、网络背景和元数据,例如ISP、国家和使用类型
关键字段包括“ip”、“is_listed”、“confidence_of_abuse”、“total_reports”、“distinct_reporters”、“first_reported_at”、“last_reported_at”和“reports”,这些字段详细描述了具体的滥用事件
响应数据采用JSON格式结构,其中顶级字段提供摘要信息,并包含一个“报告”数组,记录详细的滥用事件,包括时间戳和评论
该端点提供关于滥用报告 Recent Activity IP 的 ISP 国家来源 使用类型和滥用的置信水平的信息 帮助用户评估安全风险
数据来自多个来源,包括自动化系统和手动报告,这些系统跟踪可疑行为,如未授权访问尝试和端口扫描
典型的用例包括增强安全协议、监控网络流量异常以及根据IP连接的滥用历史做出有关允许或阻止的明智决策
用户可以通过指定他们想要验证的IP地址来自定义请求。该API旨在根据提供的IP返回相关数据,而无需额外的参数
数据准确性通过来自可靠来源的定期更新、对报告事件的质量检查以及信心评分系统来维护,该系统帮助区分确认的威胁和误报
服务级别:
100%
响应时间:
215ms
服务级别:
100%
响应时间:
189ms
服务级别:
100%
响应时间:
982ms
服务级别:
100%
响应时间:
2,467ms
服务级别:
100%
响应时间:
493ms
服务级别:
100%
响应时间:
6,394ms
服务级别:
100%
响应时间:
1,291ms
服务级别:
99%
响应时间:
592ms
服务级别:
100%
响应时间:
1,455ms
服务级别:
100%
响应时间:
332ms