Skip to content

AbuseIPDB

This section walks you through integrating AbuseIPDB with your ConfigServer Security and Firewall setup. Think of AbuseIPDB as the arcade game Asteroids; harmful attackers and malicious IPs are like asteroids hurtling toward your server. As soon as they get too close, you blast them away for a satisfying 100 points per hit.

With this integration, you get real-time intelligence on abusive IPs, giving you the upper hand in the never-ending game of protecting your server from the digital cosmos.


Useful Resources

The following are useful resources regarding this page.




What is AbuseIPDB?

AbuseIPDB is a community-driven project focused on tracking and sharing information about IP addresses involved in abusive or malicious activity across the internet. The service allows individuals to report IPs associated with behaviors such as brute-force attacks, spam, port scanning, DDoS attempts, and other forms of network abuse. Each report includes contextual details like the abuse category, a brief description explaining the cause for the report, and the time it was observed.

The platform aggregates reports from thousands of contributors worldwide and analyzes them to generate an abuse confidence score for each IP address. This score is calculated based on factors such as how frequently an IP is reported, the severity of the reported activity, and how recent the reports are. AbuseIPDB also maintains historical data, allowing users to see patterns over time and understand what types of abuse an IP has been associated with.

AbuseIPDB offers both a free tier and several paid plans with expanded capabilities. The free plan includes:

  • 1,000 IP checks and reports per day
  • 100 bulk blocklist checks per day
  • Access to a basic blacklist of up to 10,000 IPs

Users can interact with AbuseIPDB through its web interface for manual lookups, or integrate it directly into scripts, firewalls (including CSF), and security tools using the official AbuiseIPDB API. This flexibility makes it valuable for individual server operators as well as large-scale infrastructure and security teams.




Before You Begin

Before integrating AbuseIPDB with CSF, make sure that ConfigServer Security & Firewall (CSF) is already installed and working correctly on your server.

If CSF is not yet installed, begin with the Installation guide. That section walks you through installing the required dependencies, downloading CSF, and completing the initial setup so your system is ready for AbuseIPDB integration.




Setup Integration

Before continuing with the AbuseIPDB integration, make sure you have already completed the CSF installation by following our Installation Guide. This ensures that all required dependencies are in place and that CSF is properly installed on your system.

Once CSF is installed, visit the AbuseIPDB website and create an account. Click the Sign Up button at the top of the page, which will take you to the tier selection screen where you can choose the plan that best fits your needs.


AbuseIPDB › Select a Tier
AbuseIPDB › Select a Tier


You may start with the Free tier if you simply want to evaluate the service. This plan allows up to 10,000 IP addresses in your blocklist. If you require higher limits or additional features, paid plans are available, increasing the blocklist capacity to 100,000 IPs and beyond.

Once you have selected the desired tier, the next page will ask you for your information.

Don't forget to confirm you are human at the bottom page the page. (You are human, right?)


AbuseIPDB › Register
AbuseIPDB › Register


After you complete the sign-up process, you should be re-directed to your Account home page. On the left-side navigation menu, select


On the right-side of the My API page, click the button:

AbuseIPDB › Account › Nav Menu
AbuseIPDB › Account › Nav Menu


When clicking the Create Key button, a dialog box will appear and ask you to specify a Name:


AbuseIPDB › Account › Nav Menu
AbuseIPDB › Account › Nav Menu


After saving the new name, the page should refresh and show you the new API key:


AbuseIPDB › Account › API Key
AbuseIPDB › Account › API Key


After getting your AbuseIPDB API key, we now need to integrate it into CSF. Open the file /etc/csf/csf.blocklists on your server with the desired editor:

sudo nano /etc/csf/csf.blocklists


Scroll through its contents until you locate the code shown below. If this section does not already exist in your copy of CSF, add the following code:

# #
#   @blocklist              AbuseIPDB
#   @details:               https://abuseipdb.com/account/api
#   @notes:                 Requires you to create an account.
#                           Requires you to generate an API key.
#                           Add your generated API key in the URL below by 
#                               replacing `YOUR_API_KEY`.
#                           Change the 3rd field `10000` to a higher number
#                               if you are on a paid plan.
#                           Replace `&limit=10000` at the end of the URL with
#                               the same limit value.
#   
#                           Full documentation at:
#                               https://docs.configserver.dev/install/integrations/abuseipdb/
# #

#   ABUSEIPDB|86400|10000|https://api.abuseipdb.com/api/v2/blacklist?key=YOUR_API_KEY&plaintext&limit=10000


To enable the AbuseIPDB integration, start by removing the # character at the beginning of the line to uncomment it. Next, edit the URL and replace YOUR_API_KEY with the AbuseIPDB API key you generated earlier.

When finished, the query string should look similar to ?key=abcdefghi0123456789, using your actual API key in place of the example.

If you are subscribed to a paid plan, you can also increase the value 10000 to a higher number. This value defines the maximum number of IP addresses CSF is allowed to retrieve from the AbuseIPDB blocklist via the API. Free accounts are limited to 10,000 IPs, while paid plans allow higher limits depending on your subscription tier.

Plan Price Maximum Blocklist IPs
Individual Free 10,000
Basic $25.00/month 100,000
Premium $99.00/month 500,000
Enterprise - Contact AbuseiPDB Sales


Once you have enabled and configured AbuseIPDB, save the file and close it.

The final step is to restart the CSF services so that the changes take effect and the blocklists can be downloaded.

Open your terminal and run the following command:

csf -ra


Open your lfd log file at /var/log/lfd.log

cat /var/log/lfd.log


You should see the following in your log file:

Dec 15 11:14:24 configserver lfd: Retrieved and blocking blocklist ABUSEIPDB IP address ranges
Dec 15 11:14:24 configserver lfd: IPSET: loading set new_ABUSEIPDB with 10000 entries
Dec 15 11:14:24 configserver lfd: IPSET: switching set new_ABUSEIPDB to bl_ABUSEIPDB


If you see an error in your log file such as the following:

Dec 15 11:14:53 configserver lfd: Unable to retrieve blocklist ABUSEIPDB - Unable to download: Not Found


The error above means that you have configured something incorrectly. Ensure that the URL does not contain typos, and also make sure you copied your AbuseIPDB API key correctly.




While the free tier of AbuseIPDB is a great way to get started, one of the most valuable advantages of becoming a paid supporter is access to the Blacklist customization tools.

Confidence Levels


AbuseIPDB › Blacklist › Confidence
AbuseIPDB › Blacklist › Confidence


The confidence level determines how strict AbuseIPDB is when deciding which IP addresses are included in your blocklist:

  • High Confidence level

    • Only IPs with a strong history of abusive behavior are included.
    • Pros:
      • Significantly reduces the chance of blocking legitimate users.
      • Ideal for production servers where availability and user access are critical.
    • Cons:
      • Some newer or less frequently reported malicious IPs may not be blocked.
  • Low confidence level

    • Includes IPs with fewer or less severe abuse reports.
    • Pros:
      • More aggressive protection against potential threats.
      • Useful for high-risk environments or servers that are frequent attack targets.
    • Cons:
      • Higher risk of false positives, which may block legitimate traffic.

Choosing the right confidence level depends on your server’s purpose and risk tolerance. Paid tiers give you the flexibility to strike the balance that best fits your environment.

With a free account, adjusting the confidence slider does not change the results you receive. Paid plans unlock this feature, allowing you to fine-tune the generated blocklist so you can strike a better balance between security and legitimate access to your server.

Once you have selected your desired confidence level, scroll down to the right-hand side of the page and locate the API Endpoint section. Each time you adjust the confidence slider, the API URL will automatically update to reflect your current settings.


AbuseIPDB › Blacklist › Confidence
AbuseIPDB › Blacklist › Confidence


When you have the desired settings, take note of the values generated within API Endpoint:

AbuseIPDB › Blacklist › Confidence
AbuseIPDB › Blacklist › Confidence


You will need to apply these values to your AbuseIPDB blocklist entry inside of the file /etc/csf/csf.blocklists:

# #
#   @blocklist              AbuseIPDB
#   @details:               https://abuseipdb.com/account/api
#   @notes:                 Requires you to create an account.
#                           Requires you to generate an API key.
#                           Add your generated API key in the URL below by 
#                               replacing `YOUR_API_KEY`.
#                           Change the 3rd field `10000` to a higher number
#                               if you are on a paid plan.
#                           Replace `&limit=10000` at the end of the URL with
#                               the same limit value.
#   
#                           Full documentation at:
#                               https://docs.configserver.dev/install/integrations/abuseipdb/
# #

 ABUSEIPDB|86400|9999999|https://api.abuseipdb.com/api/v2/blacklist?key=YOUR_API_KEY&plaintext&limit=9999999&confidenceMinimum=25


Once you have modified the values; give CSF a restart using the command:

csf -ra


You should now be using the parameters you picked from the Blacklist page.




Conclusion

At the end of this guide, you should now have AbuseIPDB integrated into CSF as one of your blocklist providers. This should dramatically cut down on the attempts by bots to perform tasks such as port sniffing, or even worse.




Next Steps

Select what documentation you would like to proceed with next ...

  •   Geographical IP Block Integration


    Geographical IP blocking allows you to control access to your server based on the country or region an IP address originates from, rather than individual IP reputation or blocklist entries.

    This section explains what geographical IP blocks are, how they differ from blocklists and IPSETs, and when it makes sense to use country-based filtering.

    You’ll also learn how to integrate CSF with GeoIP data providers to apply regional access rules safely and efficiently.