Integrations
Connect SpoofChecker to your existing security tools to receive threat alerts wherever your team already works. Both integrations are configured from your Account → Integrations page.
Slack — Incoming Webhook
Get a real-time Slack message every time SpoofChecker detects a new threat domain targeting your brand.
-
1
Create or open a Slack App
Go to api.slack.com/apps and click Create New App → From scratch. Give it a name (e.g. "SpoofChecker Alerts") and pick your workspace. If you already have an app you want to reuse, just select it from the list.
-
2
Enable Incoming Webhooks
In the left sidebar of your app settings, click Incoming Webhooks. Toggle the switch to On.
-
3
Add a webhook to your workspace
Scroll down and click Add New Webhook to Workspace. Choose the channel where you want threat alerts to appear (e.g.
#security-alerts) and click Allow.Create a dedicated #spoofchecker-alerts channel to keep threat notifications separate from other team traffic. -
4
Copy the webhook URL
Slack will generate a URL that looks like:
https://hooks.slack.com/services/T00000000/B00000000/XXXXXXXXXXXXXXXXXXXXXXXXCopy this — you'll need it in the next step.
-
5
Paste it into SpoofChecker
Go to Account → Integrations → Slack, paste your webhook URL into the Webhook URL field, and click Save Changes. You can then click Send Test Message to confirm everything is working.
When a threat is detected, SpoofChecker posts a message to your channel containing:
- The suspicious domain name and risk level (e.g. Critical / High / Medium)
- Which of your monitored domains it is targeting
- Active threats detected (lookalike logo, phishing keywords, active MX, etc.)
- Hosting information and SSL issuer
- A direct link to the full threat report in your dashboard
Splunk — HTTP Event Collector (HEC)
Forward every threat event and new-domain discovery directly into your Splunk SIEM for correlation, dashboards, and automated playbooks.
-
1
Enable HTTP Event Collector in Splunk
In Splunk Web, go to Settings → Data Inputs → HTTP Event Collector. If HEC is disabled, click Global Settings and set All Tokens to Enabled. Make sure the HEC port (
8088by default) is reachable from the internet, or from Splunk Cloud's ingestion pipeline. -
2
Create a new HEC token
Click New Token and fill in the wizard:
- Name:
SpoofChecker - Source type:
spoofchecker(or leave as automatic) - Index:
main(or a dedicated security index)
Complete the wizard and copy the generated token — it looks like a UUID:
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx - Name:
-
3
Find your HEC endpoint URL
The URL format depends on your Splunk deployment:
Self-hosted / on-prem:
https://your-splunk-host:8088/services/collector/eventSplunk Cloud (trial/free tier):
https://prd-p-xxxxx.splunkcloud.com:8088/services/collector/eventSplunk Cloud (Enterprise):
https://http-inputs-xxxxx.splunkcloud.com/services/collector/eventFor Splunk Cloud, your HEC hostname is shown in Settings → Data Inputs → HTTP Event Collector → Global Settings. -
4
Enter your credentials in SpoofChecker
Go to Account → Integrations → Splunk, fill in both the HEC URL and HEC Token, and click Save Changes. Use Send Test Event to verify the connection before relying on it in production.
SpoofChecker sends two types of events to Splunk. Both use sourcetype = spoofchecker and index = main.
Threat detected
New domains discovered
Searching in Splunk
Use these SPL queries to get started:
index=main sourcetype=spoofchecker event_type=threat_detected | table _time, target_domain, typo_domain, risk_label, threats
index=main sourcetype=spoofchecker | timechart count by event_type
Microsoft Teams — Incoming Webhook
Route SpoofChecker threat alerts directly into any Teams channel using the built-in Incoming Webhook connector. No app installation required.
-
1
Open your Teams channel
Navigate to the channel where you want to receive alerts. Click the ⋯ (More options) button next to the channel name and select Connectors.
-
2
Configure Incoming Webhook
In the connector list, find Incoming Webhook and click Configure. Give it a name (e.g. SpoofChecker Alerts), optionally upload a logo, then click Create.
If you don't see Connectors, your Teams admin may need to enable them under Teams Admin Center → Org-wide app settings. -
3
Copy the webhook URL
Teams will generate a unique URL that looks like:
https://outlook.office.com/webhook/xxxxxxxx-xxxx.../IncomingWebhook/...Copy this — you'll need it in the next step.
-
4
Paste it into SpoofChecker
Go to Account → Integrations → Teams, paste the webhook URL into the Webhook URL field, and click Save Changes. Then click Send Test Message to confirm it's working.
When a threat is detected, SpoofChecker posts a card to your channel containing:
- The suspicious domain name and the target domain it is spoofing
- Risk level (e.g. Critical / High / Medium)
- Active heuristics that triggered the alert (lookalike logo, phishing keywords, active MX, etc.)
- New-domain alerts when newly registered typosquat domains are discovered
Generic Webhook
Send alerts to any HTTP endpoint — Zapier, Make (Integromat), n8n, Tines, a custom SIEM, or your own API. SpoofChecker POSTs a JSON payload every time a threat is detected.
-
1
Get your webhook URL
Create a webhook trigger in your platform of choice — for example, a Zapier Catch Hook step, a Make HTTP module, or your own API endpoint — and copy the URL.
-
2
Get your Authorization header (optional)
If your endpoint requires authentication, get the full header value. Common formats:
Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...Token abc123Leave this field blank if your endpoint is publicly reachable or uses IP allowlisting instead of a token. -
3
Paste into SpoofChecker
Go to Account → Integrations → Webhook, enter the URL and optional Authorization header, then click Save Changes.
-
4
Send a test request
Click Send Test Request to verify the connection. Any
2xxresponse code means everything is working.
SpoofChecker sends two types of events. Both use Content-Type: application/json.
Threat detected
New domains discovered
2xx response a success. Non-2xx responses are logged as failed deliveries. Ensure your endpoint responds within 10 seconds to avoid timeouts.
Go to your account settings to connect Slack, Splunk, Teams, or a custom webhook in under two minutes.