n8n Integration
Drop ipinsights.io enrichment into any n8n workflow using a single HTTP Request node or the importable workflow JSON below.
Overview
Whether you're triaging webhook payloads, enriching ticket comments or auto-replying to abuse@ inboxes, n8n makes it trivial to add an IP-reputation step. We'll cover the bare HTTP Request node configuration first, then provide a copy-paste workflow JSON that adds caching, retries and a clean output structure.
Prerequisites
- n8n 1.x (self-hosted or n8n.cloud)
- An ipinsights.io API key from your profile page
- A Header Auth credential in n8n (Credentials → New → Header Auth)
with
Name: X-API-KeyandValue: <your-key>
Step 1 — Manual HTTP Request Node
Downstream nodes can reference fields with
={{ $json.data.threat_score }},
={{ $json.data.is_tor }},
={{ $json.data.country_code }} etc.
Step 2 — Importable Workflow JSON
Save the JSON below as ipinsights-enrich.json and import it via
Workflows → menu → Import from File. It exposes a webhook that takes
an ip JSON field and returns enriched data, with conditional routing for
high-threat IPs.
Attach a Slack / Email / Jira node to the true output and a passthrough to the false output, and you have a working triage pipeline.
Step 3 — Verify
The webhook should return a JSON body that includes data.threat_score,
data.country_code, data.asn and the boolean flags.
API Key: Required — store it in an n8n Header Auth credential. Register for free for a key.
Request Higher API Limit
Running a high-volume n8n deployment? If the default rate limit isn't enough for your environment, submit a request below and we'll review it.