WhiteIntel Webhook API

WhiteIntel webhooks allow your organization to receive real-time alerts when your watchlist items (such as domains, IPs, hostames, or emails) are detected in leaked stealer logs.


πŸ”§ Setup

To configure a webhook:

  1. Go to your WhiteIntel dashboard

  2. Set your receiving HTTPS endpoint

  3. A secure HMAC secret will be auto-generated

⚠️ Configuring a webhook will override any existing configuration.

Endpoint Requirements

  • Must use https:// (or http:// in dev/test)

  • Must not point to internal/private addresses (e.g. localhost, .local, 127.0.0.1)

  • Must not target WhiteIntel-owned domains


πŸ” Security & Signature

Every webhook POST is signed with an HMAC SHA256 signature.

Headers

Header
Description

X-Signature

Base64-encoded HMAC signature

X-Signature-Version

Currently always "v1"

X-Timestamp

ISO 8601 UTC timestamp

User-Agent

WhiteIntel-Webhook

Signature Generation (example)

πŸ“¬ Events & Payload Structure

Webhook notifications are triggered for the following types based on your watchlist:

  • consumer

  • corporate

  • email

  • ip

  • hostname

Sample Payload: consumer

Sample Payload: corporate

Sample Payload: email

Sample Payload: ip

Sample Payload: computername

Webhook Simulation

In order to simulate webhook calls before deploying to production, visit your Webhook page on WhiteIntel platform.

Last updated