data
AbuseIPDB CLI for AI Agents
Use the AbuseIPDB CLI from KosmoKrator to call AbuseIPDB tools headlessly, return JSON, inspect schemas, and automate workflows from coding agents, scripts, and CI.AbuseIPDB CLI Setup
AbuseIPDB can be configured headlessly with `kosmokrator integrations:configure abuseipdb`.
# Install KosmoKrator first if it is not available on PATH.
curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash
# Configure and verify this integration.
kosmokrator integrations:configure abuseipdb --set api_key="$ABUSEIPDB_API_KEY" --enable --read allow --write ask --json
kosmokrator integrations:doctor abuseipdb --json
kosmokrator integrations:status --json Credentials
Authentication type: API key api_key. Configure credentials once, then reuse the same stored profile from scripts, coding CLIs, Lua, and MCP.
| Key | Env var | Type | Required | Label |
|---|---|---|---|---|
api_key | ABUSEIPDB_API_KEY | Secret secret | yes | API Key |
Command Patterns
The generic command is stable across every integration. The provider shortcut is shorter for humans.
kosmo integrations:call abuseipdb.abuseipdb_check '{}' --json kosmo integrations:abuseipdb abuseipdb_check '{}' --json Discovery
These commands return structured output for coding agents that need to inspect capabilities before choosing a function.
kosmo integrations:docs abuseipdb --json
kosmo integrations:docs abuseipdb.abuseipdb_check --json
kosmo integrations:schema abuseipdb.abuseipdb_check --json
kosmo integrations:search "AbuseIPDB" --json
kosmo integrations:list --json Automation Contexts
The same configured command surface works in these environments. The command does not change unless the host wrapper, credentials, or permissions change.
CLI Functions
Every function below can be called headlessly. Commands are highlighted, copyable, and scroll horizontally when payloads are long.
abuseipdb.abuseipdb_check
Check reputation for one IP address.
read - Parameters
- none
kosmo integrations:call abuseipdb.abuseipdb_check '{}' --json kosmo integrations:abuseipdb abuseipdb_check '{}' --json abuseipdb.abuseipdb_reports
List reports for one IP address.
read - Parameters
- none
kosmo integrations:call abuseipdb.abuseipdb_reports '{}' --json kosmo integrations:abuseipdb abuseipdb_reports '{}' --json abuseipdb.abuseipdb_blacklist
Retrieve the AbuseIPDB blacklist.
read - Parameters
- none
kosmo integrations:call abuseipdb.abuseipdb_blacklist '{}' --json kosmo integrations:abuseipdb abuseipdb_blacklist '{}' --json abuseipdb.abuseipdb_report
Submit an abuse report for one IP address.
write - Parameters
- none
kosmo integrations:call abuseipdb.abuseipdb_report '{}' --json kosmo integrations:abuseipdb abuseipdb_report '{}' --json abuseipdb.abuseipdb_check_block
Check abuse data for a CIDR block.
read - Parameters
- none
kosmo integrations:call abuseipdb.abuseipdb_check_block '{}' --json kosmo integrations:abuseipdb abuseipdb_check_block '{}' --json abuseipdb.abuseipdb_bulk_report
Submit CSV abuse reports in bulk.
write - Parameters
- none
kosmo integrations:call abuseipdb.abuseipdb_bulk_report '{}' --json kosmo integrations:abuseipdb abuseipdb_bulk_report '{}' --json abuseipdb.abuseipdb_clear_address
Clear this account reports for one IP address.
write - Parameters
- none
kosmo integrations:call abuseipdb.abuseipdb_clear_address '{}' --json kosmo integrations:abuseipdb abuseipdb_clear_address '{}' --json Function Schemas
Use these parameter tables when building CLI payloads without calling integrations:schema first.
abuseipdb.abuseipdb_check 0 parameters
kosmo integrations:schema abuseipdb.abuseipdb_check --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
abuseipdb.abuseipdb_reports 0 parameters
kosmo integrations:schema abuseipdb.abuseipdb_reports --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
abuseipdb.abuseipdb_blacklist 0 parameters
kosmo integrations:schema abuseipdb.abuseipdb_blacklist --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
abuseipdb.abuseipdb_report 0 parameters
kosmo integrations:schema abuseipdb.abuseipdb_report --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
abuseipdb.abuseipdb_check_block 0 parameters
kosmo integrations:schema abuseipdb.abuseipdb_check_block --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
abuseipdb.abuseipdb_bulk_report 0 parameters
kosmo integrations:schema abuseipdb.abuseipdb_bulk_report --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
abuseipdb.abuseipdb_clear_address 0 parameters
kosmo integrations:schema abuseipdb.abuseipdb_clear_address --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
Permissions
Headless calls still follow the integration read/write permission policy. Configure read/write defaults with
integrations:configure. Add --force only for trusted automation that should bypass that policy.