WhiteIntel Webhook API
WhiteIntel webhooks allow your organization to receive real-time alerts when your watchlist items (such as domains, IPs, hostames, or emails) are detected in leaked stealer logs.
π§ Setup
To configure a webhook:
Go to your WhiteIntel dashboard
Set your receiving HTTPS endpoint
A secure HMAC secret will be auto-generated
β οΈ Configuring a webhook will override any existing configuration.
Endpoint Requirements
Must use
https://(orhttp://in dev/test)Must not point to internal/private addresses (e.g.
localhost,.local,127.0.0.1)Must not target WhiteIntel-owned domains
π Security & Signature
Every webhook POST is signed with an HMAC SHA256 signature.
NEVER PROCESS THE REQUEST BEFORE VERIFYING THE SIGNATURE.
Headers
X-Signature
Base64-encoded HMAC signature
X-Signature-Version
Currently always "v1"
X-Timestamp
ISO 8601 UTC timestamp
User-Agent
WhiteIntel-Webhook
Signature Generation (example)
π¬ Events & Payload Structure
Webhook notifications are triggered for the following types based on your watchlist:
consumercorporateemailiphostname
Sample Payload: consumer
consumerSample Payload: corporate
corporate Sample Payload: email
email Sample Payload: ip
ip Sample Payload: computername
computernameWebhook Simulation
In order to simulate webhook calls before deploying to production, visit your Webhook page on WhiteIntel platform.

Last updated