WhiteIntel Webhook API
WhiteIntel webhooks allow your organization to receive real-time alerts when your watchlist items (such as domains, IPs, hostames, or emails) are detected in leaked stealer logs.
🔧 Setup
To configure a webhook:
Go to your WhiteIntel dashboard
Set your receiving HTTPS endpoint
A secure HMAC secret will be auto-generated
⚠️ Configuring a webhook will override any existing configuration.
Endpoint Requirements
Must use
https://
(orhttp://
in dev/test)Must not point to internal/private addresses (e.g.
localhost
,.local
,127.0.0.1
)Must not target WhiteIntel-owned domains
🔐 Security & Signature
Every webhook POST is signed with an HMAC SHA256 signature.
NEVER PROCESS THE REQUEST BEFORE VERIFYING THE SIGNATURE.
Headers
X-Signature
Base64-encoded HMAC signature
X-Signature-Version
Currently always "v1"
X-Timestamp
ISO 8601 UTC timestamp
User-Agent
WhiteIntel-Webhook
Signature Generation (example)
📬 Events & Payload Structure
Webhook notifications are triggered for the following types based on your watchlist:
consumer
corporate
email
ip
hostname
Sample Payload: consumer
consumer
Sample Payload: corporate
corporate
Sample Payload: email
email
Sample Payload: ip
ip
Sample Payload: computername
computername
Webhook Simulation
In order to simulate webhook calls before deploying to production, visit your Webhook page on WhiteIntel platform.
Last updated