How to Investigate Suspicious IP Addresses with OpenClaw

Investigate Suspicious IP Addresses with OpenClaw and ToolRouter. Check IP addresses against abuse databases and threat feeds to assess risk before allowing traffic into your network.

Tool
Security Scanner icon
Security Scanner

OpenClaw lets you run `check_ip` across hundreds of addresses from a log export or network scan in a single batch job. This is the right approach for bulk triage, scheduled reputation monitoring of known-external IPs, or building an automated block-list refresh.

Connect ToolRouter to OpenClaw

1Install the CLI
npm install -g toolrouter-mcp
2Call tools directly from OpenClaw
toolrouter-mcp call web-search search --query "AI tools"
toolrouter-mcp tools

Steps

Once connected (see setup above), use the Security Scanner tool:

  1. Export the IP list from your firewall logs, SIEM, or network scan output.
  2. Run `security-scanner` with `check_ip` for each IP and collect the results in a normalized schema.
  3. Filter to IPs with abuse scores above your threshold and sort by risk descending.
  4. Export the block-list candidates as a structured file for your firewall or security tooling.

Example Prompt

Try this with OpenClaw using the Security Scanner tool
Use security-scanner to check these IPs in batch: 185.220.101.45, 45.33.32.156, 203.0.113.77, 91.108.4.1, 198.51.100.42. Return all results in a stable schema with ip, abuse_score, verdict, country, and isp. Flag any with abuse_score above 75 as block candidates.

Tips

  • Set a clear abuse-score threshold before the run so the block-list output is consistent.
  • Schedule weekly batch scans of your known-external partner IPs to catch reputation changes.
  • Lock the output schema so results from different runs can be diffed to spot newly flagged addresses.