检索IP滥用报告API是一个旨在支持计算机系统中的安全、监控和流量分析过程的工具。其主要功能是提供关于IP历史的结构化和综合信息,包括滥用报告、事件频率、检测到的活动类型以及与网络提供商相关的元数据。此信息使开发人员、系统管理员和网络安全团队能够就如何处理进出连接做出明智的决策。
该API从多个来源收集数据,包括自动和手动报告潜在可疑行为的数据,例如未授权的连接尝试、端口扫描、暴力破解攻击或异常流量。此外,它还整合了上下文信息,例如互联网服务提供商、来源国、网络使用类型以及白名单或黑名单状态。所有这些信息以标准化的响应形式呈现,便于应用程序处理。
该API的一个关键价值是滥用分数或置信水平,它有助于区分确认的恶意活动和自动安全系统生成的误报。
IP 验证 - 端点功能
| 对象 | 描述 |
|---|---|
ip |
[必需] Enter an IP address. |
{"ip":"8.8.8.8","is_listed":false,"confidence_of_abuse":0,"total_reports":14,"distinct_reporters":8,"first_reported_at":"2026-01-15","last_reported_at":"2026-01-22","is_recent_activity":true,"isp":"Google LLC","usage_type":"Content Delivery Network","asn":null,"hostname":"dns.google","domain":"google.com","country":"United States of America","country_code":"US","city":null,"region":null,"reports":[{"reported_at":"2026-01-22T20:28:34Z","reporter":134282,"comment":"Unauthorized connection attempt","categories":[14,15,20]},{"reported_at":"2026-01-20T16:49:05Z","reporter":134282,"comment":"Unauthorized connection attempt","categories":[14,15,20]},{"reported_at":"2026-01-20T11:02:29Z","reporter":116616,"comment":"Detected port scanning activity (SIP\/VoIP scanner).","categories":[8,14,15,18]},{"reported_at":"2026-01-20T06:07:19Z","reporter":209271,"comment":"Blocked by UFW (TCP on 52983)\nSource port: 53\nTTL: 112\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-20T03:29:35Z","reporter":264073,"comment":"...","categories":[18,22]},{"reported_at":"2026-01-19T05:43:19Z","reporter":209271,"comment":"Blocked by UFW (TCP on 52128)\nSource port: 53\nTTL: 113\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-18T06:56:55Z","reporter":258755,"comment":"Auto-reported by Fail2Ban (NPM-Auth)","categories":[18,21]},{"reported_at":"2026-01-18T05:11:10Z","reporter":264073,"comment":"...","categories":[18,22]},{"reported_at":"2026-01-17T23:07:19Z","reporter":56171,"comment":"ThreatBook Intelligence: Whitelist,cdn more details on https:\/\/threatbook.io\/ip\/8.8.8.8\n2026-01-17 01:28:07 \/cgi-bin\/network_config\/nsg_masq.cgi?user_name=admin&session_id=..\/&lang=zh_CN.UTF-8&act=2&proto=;ls>\/usr\/local\/lyx\/lyxcenter\/web\/SpVk.html;","categories":[21]},{"reported_at":"2026-01-17T08:25:47Z","reporter":209271,"comment":"Blocked by UFW (TCP on 65265)\nSource port: 53\nTTL: 117\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-17T06:28:36Z","reporter":261807,"comment":"Fail2Ban identified brute-force attack from 8.8.8.8","categories":[22]},{"reported_at":"2026-01-17T04:02:14Z","reporter":44461,"comment":"IPFire IPS Alert (2026-01-17): ET MALWARE Possible Tinba DGA NXDOMAIN Responses. Observed events: 1","categories":[21]},{"reported_at":"2026-01-16T10:16:38Z","reporter":209271,"comment":"Blocked by UFW (TCP on 64329)\nSource port: 53\nTTL: 117\nPacket length: 40\nTOS: 0x00\n\nThis report (for 8.8.8.8) was generated by:\nhttps:\/\/github.com\/sefinek\/UFW-AbuseIPDB-Reporter","categories":[14]},{"reported_at":"2026-01-15T15:05:06Z","reporter":134282,"comment":"Unauthorized connection attempt","categories":[14,15,20]}],"scraped_at":"2026-01-23T12:53:32Z","is_whitelisted":true,"is_public":true,"_cached":true,"_cache_key":"ipx_api:abuse_check:8_8_8_8"}
curl --location --request GET 'https://zylalabs.com/api/11762/retrieve+ip+abuse+reports+api/22309/ip+verification?ip=8.8.8.8' --header 'Authorization: Bearer YOUR_API_KEY'
| 标头 | 描述 |
|---|---|
授权
|
[必需] 应为 Bearer access_key. 订阅后,请查看上方的"您的 API 访问密钥"。 |
无长期承诺。随时升级、降级或取消。 免费试用包括最多 50 个请求。
GET IP 验证端点返回有关 IP 地址声誉的数据,包括滥用报告 最近活动 网络上下文 以及元数据如 ISP 国家 和使用类型
响应中的关键字段包括“ip”“is_listed”“confidence_of_abuse”“total_reports”“distinct_reporters”“first_reported_at”“last_reported_at”和带有时间戳和评论的详细“reports”
响应数据采用JSON格式结构,主要对象包含摘要字段和一个“报告”数组,详细记录个别事件,包括时间戳、报告者ID和评论
该端点提供有关滥用报告、事件频率、检测到的活动类型以及上下文数据的信息,例如互联网服务提供商详情、来源国和网络使用类型
数据来自多个来源,包括自动化系统和手动报告,这些系统跟踪可疑行为,如未经授权的访问尝试和端口扫描
典型的用例包括增强网络安全措施 监控网络流量以发现可疑活动 以及做出有关允许或阻止IP连接的明智决策
用户可以通过指定想要验证的IP地址来定制请求 该API目前不支持用于过滤或修改响应的其他参数
数据准确性通过自动监控和手动报告的结合来维护 定期更新和质量检查确保滥用报告的可靠性
服务级别:
100%
响应时间:
119ms
服务级别:
100%
响应时间:
188ms
服务级别:
100%
响应时间:
361ms
服务级别:
100%
响应时间:
152ms
服务级别:
100%
响应时间:
136ms
服务级别:
100%
响应时间:
169ms
服务级别:
100%
响应时间:
645ms
服务级别:
100%
响应时间:
6,946ms
服务级别:
100%
响应时间:
2,283ms
服务级别:
100%
响应时间:
121ms
服务级别:
100%
响应时间:
2,680ms
服务级别:
100%
响应时间:
1,104ms
服务级别:
100%
响应时间:
1,302ms
服务级别:
100%
响应时间:
3,497ms
服务级别:
100%
响应时间:
884ms
服务级别:
75%
响应时间:
1,498ms
服务级别:
100%
响应时间:
349ms
服务级别:
100%
响应时间:
341ms
服务级别:
50%
响应时间:
1,253ms
服务级别:
100%
响应时间:
1,394ms