Back to Integrations
integrationHTTP Request node
integrationTheHive node

HTTP Request and TheHive integration

n8n lets you integrate HTTP Request with TheHive to build powerful workflows. Design automation that extracts, transforms and loads data between your apps and services. You can choose from thousands of ready-made apps or use our universal HTTP connector to sync apps not yet in our library.

Integrate HTTP Request and TheHive

Build your own HTTP Request and TheHive integration

Create custom HTTP Request and TheHive workflows by choosing triggers and actions. Nodes come with global operations and settings, as well as app-specific parameters that can be configured. You can also use the HTTP Request node to query data from any app or service with a REST API.

How to connect HTTP Request and TheHive

  • Step 1: Add the first step

  • Step 2: Add HTTP Request and TheHive nodes

  • Step 3: Connect HTTP Request and TheHive

  • Step 4: Run workflow

Weekly Shodan Query - Report Accidents

This n8n workflow, which runs every Monday at 5:00 AM, initiates a comprehensive process to monitor and analyze network security by scrutinizing IP addresses and their associated ports. It begins by fetching a list of watched IP addresses and expected ports through an HTTP request. Each IP address is then processed in a sequential loop.

For every IP, the workflow sends a GET request to Shodan, a renowned search engine for internet-connected devices, to gather detailed information about the IP. It then extracts the data field from Shodan's response, converting it into an array. This array contains information on all ports Shodan has data for regarding the IP.

A filter node compares the ports returned from Shodan with the expected list obtained initially. If a port doesn't match the expected list, it is retained for further processing; otherwise, it's filtered out. For each such unexpected port, the workflow assembles data including the IP, hostnames from Shodan, the unexpected port number, service description, and detailed data from Shodan like HTTP status code, date, time, and headers.

This collected data is then formatted into an HTML table, which is subsequently converted into Markdown format. Finally, the workflow generates an alert in TheHive, a popular security incident response platform. This alert contains details like the title indicating unexpected ports for the specific IP, a description comprising the Markdown table with Shodan data, medium severity, current date and time, tags, Traffic Light Protocol (TLP) set to Amber, a new status, type as 'Unexpected open port', the source as n8n, a unique source reference combining the IP with the current Unix time, and enabling follow and JSON parameters options. This comprehensive workflow thus aids in the proactive monitoring and management of network security.

Nodes used in this workflow

Popular HTTP Request and TheHive workflows

Over 3000 companies switch to n8n every single week

TheHive supported actions

Create
Create task log
Execute Responder
Execute a responder on a selected log
Get Many
Get many task logs
Get
Get a single log

Looking to integrate HTTP Request and TheHive in your company?

Why use n8n to integrate HTTP Request with TheHive

Build complex workflows, really fast

Build complex workflows, really fast

Handle branching, merging and iteration easily.
Pause your workflow to wait for external events.

Code when you need it, UI when you don't

Simple debugging

Your data is displayed alongside your settings, making edge cases easy to track down.

Use templates to get started fast

Use 1000+ workflow templates available from our core team and our community.

Reuse your work

Copy and paste, easily import and export workflows.

Implement complex processes faster with n8n

red iconyellow iconred iconyellow icon