The Dynatrace integration with AbuseIPDB enhances alerts and detection investigations by providing valuable context for threat intelligence. This helps organizations combat online abuse, including cyber-attacks, spamming, and other malicious activities.
By enriching observability with reputation data from AbuseIPDB, you can conduct more efficient security investigations, automate alert triaging, and reduce noise through threat-aware prioritization. This streamlines incident response and enhances overall security posture.

Dynatrace integration with AbuseIPDB is an app that you can install from Hub.
The app delivers a workflow action for observable enrichment in
Workflows.
To prevent accidental edits or deletions across environments, connection setup now includes owner-based access control. This ensures reliable automation, avoids unexpected configuration loss, and aligns with minimal access requirements.
For details on sharing and permissions, see Access control for Connectors.
Various consumer apps can perform an on-demand enrichment of observables, for example, via a workflow action.
Dynatrace reaches out to AbuseIPDB to perform the observable enrichment.
The threat intelligence context is displayed within the consumer apps or in
Workflows, helping you drive smarter decisions.
See below for the AbuseIPDB and Dynatrace requirements.
Register with AbuseIPDB and create an API v2 key.
The following IAM permissions are required:
app-engine:apps:runapp-settings:objects:readdocument:documents:readsettings:objects:readstorage:system:readsecurity-intelligence:enrichments:runTo run the enrichment workflow action, all the permissions above need to be enabled in
Workflows as well.
Workflows and select Authorization settings.In Dynatrace, open Hub.
Look for AbuseIPDB and select Install.
Select Set up , then select Configure new connection.
Follow the on-screen instructions to set up the connection using the API key obtained in Prerequisites.
Allowed outbound connections are extended automatically with api.abuseipdb.com.
Test the connection to ensure the correct configuration and save it.
Once you set up the AbuseIPDB integration, you can leverage threat intelligence to enrich observables like IP addresses.
Key use cases include:
IP enrichment directly from investigation results in the Security Investigator app to accelerate threat validation and streamline case triage. For instructions, see Enrich IP addresses.
Workflows
, create a new workflow or edit an existing one.
Threat-informed security investigations Coming soon
Supported observables: IP addresses (more coming soon).
For every new observable enrichment we perform a single API call.