- PERSONA
- Automation Engineer
- CATEGORY
- Integration
- ENDPOINTS
- 4 used
- UPDATED
- April 2026
Security automation with n8n one key, every workflow
n8n security flows die in credential sprawl
- 6+ vendor API credentials per workflow — each with its own auth header, rate limit, and retry logic in a separate HTTP Request node.
- Fragmented quota pools: 500 VT queries/day here, 1,000 AbuseIPDB/day there, no unified view of monthly spend.
- Free tiers of major TI vendors explicitly disallow MSP / commercial use — breaking any reseller or managed-SOC workflow.
- No native DFIR Platform community node yet — so engineers waste time assuming they need one when the generic HTTP Request node is the shipped path.
“6+ vendor API credentials per workflow — each with its own auth header, rate limit, and retry logic in a separate HTTP Request node.”
The endpoints that solve it
Batch IOC enrichment
Accepts an indicators[] array of IPs, domains, URLs, and hashes. Each gets a normalized verdict aggregated across up to 11 sources per IP, 8 per domain/URL, 6 per hash (VirusTotal, AbuseIPDB, GreyNoise, Shodan, urlscan, OTX, and more). Perfect for n8n's Split In Batches + HTTP Request pattern.
Phishing email analyzer
Parses raw .eml or RFC 822 headers. Returns SPF/DKIM/DMARC alignment, extracted indicators, and a deterministic risk score. Drop the n8n Email Trigger (IMAP) node in front and you have an auto-triage flow in under 10 nodes.
Public exposure scan
Given a domain or IP range, returns open ports, exposed services, TLS posture, and public-facing risk findings. Wire it behind an n8n Cron or Webhook node for scheduled attack-surface monitoring of your own or customer assets.
Single credential, any workflow
Configure the API key once as an n8n HTTP Header Auth credential (Name: `Authorization`, Value: `Bearer <api_key>`) and every HTTP Request node in any workflow can reuse it — no per-workflow secret shuffling.
Wiring it into n8n in under five minutes
{
"nodes": [
{
"name": "DFIR Enrich IOCs",
"type": "n8n-nodes-base.httpRequest",
"parameters": {
"method": "POST",
"url": "https://api.dfir-lab.ch/v1/enrichment/lookup",
"authentication": "genericCredentialType",
"genericAuthType": "httpHeaderAuth",
"sendBody": true,
"contentType": "json",
"jsonBody": "={{ { indicators: $json.indicators } }}"
},
"credentials": {
"httpHeaderAuth": { "id": "dfir-lab-api-key", "name": "DFIR Platform" }
}
}
]
}- 01Step 01
Create the credential
In n8n → Credentials → New → HTTP Header Auth. Name: `Authorization`. Value: `Bearer <your_api_key>`. Save as `DFIR Platform`.
- 02Step 02
Add the HTTP Request node
Drop a HTTP Request node into your workflow. Method: POST. URL: `https://api.dfir-lab.ch/v1/enrichment/lookup` (or `/phishing/analyze`, `/exposure/scan`). Authentication: Generic → HTTP Header Auth → select `DFIR Platform`.
- 03Step 03
Shape the body
Send Body: on, JSON. Use an expression to pass indicators from upstream nodes — e.g. `{{ { indicators: $json.extracted_iocs } }}` from an IMAP trigger or a Set node.
- 04Step 04
Fan out results
Use Split In Batches to rate-limit where needed, then an IF node on `verdict === "malicious"` to branch into containment actions (Slack alert, ticket creation, firewall block).
- 05Step 05
Validate before wiring
Sanity-check the response shape using the public `/ioc-check` tool in the browser first — same enrichment pipeline, no signup needed.
Pricing that tracks your workload
- 01
Single flow — IOC enrichment for a small SOC (40 IOCs/day)
40 × 30 × 3 credits = 3,600 credits/month — overshoots Starter; 15 IOCs/day = 15 × 30 × 3 = 1,350 credits/mo15 IOCs/day fits Professional ($99, 2,500 credits). For 5 IOCs/day (5 × 30 × 3 = 450 credits) Starter ($29, 500 credits) is the right fit. - 02
Multi-flow SecOps — phishing + IOCs + weekly exposure scan
(30 phishing × 1) + (90 IOCs × 3) + (4 weekly scans × 10) = 30 + 270 + 40 = 340 credits/monthFits Starter ($29, 500 credits) with room to grow, if volumes stay modest. Most growing MSPs land here first. - 03
MSP pipeline — 5 client tenants, daily enrichment + scans
(5 × 20 IOCs × 22 workdays × 3) + (5 × 4 weekly × 10) = 6,600 + 200 = 6,800 credits/monthBeyond Professional (2,500) — take Professional + a 5,000-credit top-up, or move to Enterprise for unlimited-usage pricing.
Three ways to evaluate
Create a free account (100 credits/mo)
Full API access, dashboard, and your own credits. Includes everything the free tier offers.
Try /ioc-check — no signup
Paste an IP, domain, URL, or hash in the browser to see the exact enrichment response shape your n8n HTTP Request node will receive. Useful for designing downstream IF / Switch branches before wiring the real API call.
API reference
Full schema, error codes, rate limits, and copy-ready code snippets for every endpoint referenced above.
Frequently asked
- Q / 01
- Not today. The sanctioned path is n8n's built-in HTTP Request node (n8n-nodes-base.httpRequest) with an HTTP Header Auth credential holding `Authorization: Bearer <api_key>`. That covers every endpoint with zero maintenance overhead on either side — a dedicated community node may land later, but it wouldn't unlock new capabilities.
- Q / 02
- The enrichment endpoint accepts batched `indicators[]` arrays, so prefer one call with 10 IOCs over 10 calls with 1 IOC each. For high-volume loops, use n8n's Split In Batches node with a Wait node between iterations. Non-2xx responses include a JSON `error` — wire an IF node on `$json.error` for retry / backoff.
- Q / 03
- Yes. Unlike several free-tier TI APIs that explicitly forbid commercial use, DFIR Platform's paid tiers (Starter and up) permit MSP and reseller usage. Dedicated sub-accounts per client tenant are an Enterprise feature.
- Q / 04
- Both. The HTTP Request node is a core n8n node — identical behavior on n8n.cloud, Docker self-host, and desktop. The only difference worth mentioning: egress IP will differ between the two, so if you IP-allowlist outbound traffic from your automation, account for that.
- Q / 05
- The response still returns a normalized verdict with `reputation: "unknown"` and an empty `sources[]` array for that indicator. No partial failures — you always get a predictable shape, which makes downstream n8n logic much easier to write.
- Q / 06
- Self-hosted DFIR Platform is Enterprise-only. If you already run n8n on-prem and need the TI layer air-gapped too, get in touch — otherwise the SaaS API is what every self-serve tier ships against.
Other teams solving adjacent problems
Stop triaging by hand.
Create a free account — 100 credits per month, no credit card. Or keep browsing to find the use case that matches your workflow.