SlideShare a Scribd company logo
Made by:- Submitted to:-
Miss Himani Kapadia
Avinash Singh
Bhavik solanki
Dishant soni
Dev patel
Jhill soni
Priyank Thada
A webhook in web development, is
a method of augmenting or altering
the behaviour of a web page, or web
application, with customs call
backs. These call backs may be
maintained, modified and managed
by third party users and developers
who may not necessarily affiliated
with the originating website or
application. The term “webhook”
was coined by Jeff Lindsay in 2007
from the computer programing
term hook.
Webhooks are user defined HTTP
call backs, they are triggered by
some event, such as pushing code to
repository or a comment being
posted to a blog. When that event
occurs, the source site makes an
HTTP request to the URL
configured from the webhook. User
can configure them to cause events
on one site to invoke behaviour on
another. The action takes may be
anything. Common uses are to
trigger builds with continuous
integration system or to notify bug
tracking system.
“XYZ” company wants to send some investment
related schemes to their new prospects. Once a
new prospect opens or clicks on any link inside
the email, then their internal CRM/call centre
software should get updated, so that their sales
executive can immediately call and acquire new
prospect.
Now, this can be done using third party vendor
to send emails . Here the third party is
FALCONIDE webhooks. It gives you immense
flexible to gather real time data directly on to
your system. Just specify a call-back URL on
falconide and as soon as a prospects click on
link an event will be triggered that will POST
the information to your specific URL
You can configure webhooks through falconide
account here are the basic steps:
1. Login to falconide account.
2. Navigate to settings-> API
3. Click the API menu option in the sidebar
sub menu
4. Click webhooks under API
5. Enter a valid callback URL where falconide
can POST the event data. As per your
business requirement, you can configure
webhooks for all or selected categories of
events.
1. If your system are behind a firewall
that blocks access to all traffic except
for certain domains then your
network has to grant access to
falconide.com, in order for the
webhooks to function correctly, the
administrators of your network will
have to allow all the following range
of IPs on your network.
2. Your webhooks URLs should be set
up to accept the POST request coming
from our falconide server. When you
provide the URL where you want
falconide to POST the data for events
we'll do a quick check that the URL
exists by using a HEAD request (not
POST).
When an event occur that you have
specified a callback URL for,
webhook will send a HTTP POST
request to the URL you’ve specified
and it will do its best to deliver the
events to your endpoint. But, if that
URL is unavailable or takes to long
to respond , we’ll cancel the request
and dispatcher will attempt several
retries until the maximum retry
limit of 5 is reached.
1. TRANSID  Falconide assigns a
Unique ID transaction for each and
every emails which were sent.
2. EMAIL  Recipient’s email ID
3. Event  Type of event:
delivered/dropped/invalid/bounced/
opened/clicked/ unsubscribed/spam.
4. RESPONSE  response received from
the end server like delivery, logs,
bounced reason, reason for drop
(blacklisted user/already
unsubscribed).
5. X- APIHEADER  Information
passed by you in the APIHEADER,
during the time of email sent.
6. TIMESTAMP  Unix
TIMESTAMP of the occurrence of
the event.
7. USERAGENT  User agent
contains the detailed information
about the browser from where a
specific event is initiated.
8. IPADDRESS  IP address of the
device from where the recipient has
responded.
Webhook currently support on
number of events, which are
detailed below:
• Delivered
• Dropped
• Invalid
• Bounced
• Opened
• Clicked
• Unsubscribed
TRANSI
D
EMAIL EVEN
T
RESPONS
E
X-
APIHEADE
R
TIMES
TAMP
19898796752
6
test@gmail.co
m
DELIVER
ED
175.158.64.3
9->250 2.0
OK
ACC12312 1358402
419
1. Delivered
Email has been successfully delivered to the
receiving server
2. Dropped
Users who have already unsubscribed in
past or blacklisted because of hard
bounce complaints will be treated as
dropped. And no further communication
is allowed on this type of rid.
TRANSI
D
EMAIL EVEN
T
RESPONS
E
X-
APIHEAD
ER
TIMES
TAMP
19898796752
6
test@gmail.co
m
DROPPE
D
Blacklisted
user /
already
unsubscribe
d
ACC12312 1358402
419
3. INVALID
All API requests with syntactically incorrect
email ids will be treated as invalid and no
further processing will be done on such ids. You
can capture all such invalid events in real time
and try correcting them offline.
TRANSI
D
EMAIL EVEN
T
RESPONS
E
X-
APIHEADE
R
TIMES
TAMP
19898796752
6
test@gmail.co
m
INVALID Invalid
Email
Address
ACC12312 1358402
419
4. BOUNCED
Receiving server could not or would not
accept message because of multiple
reasons like receiving server is not
reachable, email id doesn’t exist etc.
TRANSI
D
EMAIL EVEN
T
RESPONS
E
X-
APIHEADE
R
TIMES
TAMP
19898796752
6
test@gmail.co
m
BOUNCE
D
550 5.1.1
email
account
doesn’t
exist
ACC12312 1358402
419
5. OPENED
Recipient has opened all emails
TRANSI
D
EMAIL EVEN
T
RESPONS
E
X-
APIHEADE
R
TIMES
TAMP
19898796752
6
test@gmail.co
m
DELIVER
ED
175.158.64.3
9->250 2.0
OK
ACC12312 1358402
419
6. CLICKED
Recipient has clicked on a link within a message.
TRANSI
D
EMAIL EVEN
T
RESPONS
E
X-
APIHEADE
R
TIMES
TAMP
19898796752
6
test@gmail.co
m
CLICKED 175.158.64.3
9->250 2.0
OK
BC12311 1358402
419
7. UNSUBSCRIBED
Recipient clicked on unsubscribed
management link.
TRANSI
D
EMAIL EVENT RESP
ONSE
X-
APIHEAD
ER
TIMES
TAMP
19898796752
6
test@gmail.co
m
UNSUBSCRIB
ED
175.158.6
4.39-
>250 2.0
OK
ACC12312 1358402
419
Below is a sample script which needs to be
written at your end for collecting the event data
posted by Webhooks. This is language as well as
platform independent. You can write script in
any programming language and collect the data.
<?php
$fp=fopen(‘/tmp/weblog.txt’,’a’);
Foreach($_POST as $key=>$val) {
Fwrite($fp,”$key=>$val”);
}
Fwrite($fp,”n”);
fclose($fp);
?>
Webhooks

More Related Content

What's hot

Vaadin codemotion 2014
Vaadin codemotion 2014Vaadin codemotion 2014
Vaadin codemotion 2014
Manuel Carrasco Moñino
 
Building Event Driven API Services Using Webhooks
Building Event Driven API Services Using WebhooksBuilding Event Driven API Services Using Webhooks
Building Event Driven API Services Using Webhooks
Cloud Elements
 
Steps to publish an application to azure service fabric
Steps to publish an application to azure service fabricSteps to publish an application to azure service fabric
Steps to publish an application to azure service fabric
Baskar rao Dsn
 
A 4 line login - line platform
A 4 line login - line platformA 4 line login - line platform
A 4 line login - line platform
LINE Corporation
 
WebHooks in 10 Minutes
WebHooks in 10 MinutesWebHooks in 10 Minutes
WebHooks in 10 Minutes
Jeff Lindsay
 
Windows Applications in the Cloud
Windows Applications in the CloudWindows Applications in the Cloud
Windows Applications in the Cloud
RightScale
 
Apteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App PerformanceApteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent
 
Vaadin 7 by Joonas Lehtinen
Vaadin 7 by Joonas LehtinenVaadin 7 by Joonas Lehtinen
Vaadin 7 by Joonas Lehtinen
Codemotion
 
Vaadin NYC Meetup
Vaadin NYC MeetupVaadin NYC Meetup
Vaadin NYC Meetup
Marcus Hellberg
 
Reducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at NetflixReducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at Netflix
SBWebinars
 
Detecting windows horizontal password blog
Detecting windows horizontal password blogDetecting windows horizontal password blog
Detecting windows horizontal password blog
Portcullis Computer Security
 
Webhooks
WebhooksWebhooks
Using Cookies to Store Your Postman Secrets
Using Cookies to Store Your Postman SecretsUsing Cookies to Store Your Postman Secrets
Using Cookies to Store Your Postman Secrets
Postman
 
How to integrate bulk sms api in ASP.NET
How to integrate bulk sms api in ASP.NETHow to integrate bulk sms api in ASP.NET
How to integrate bulk sms api in ASP.NET
KAP Computer Solution Pvt Ltd
 
How to set https server
How to set https serverHow to set https server
How to set https server
ytanno
 
API Security with Postman and Qualys
API Security with Postman and QualysAPI Security with Postman and Qualys
API Security with Postman and Qualys
Postman
 
Detecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-timeDetecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-time
Portcullis Computer Security
 

What's hot (19)

Vaadin codemotion 2014
Vaadin codemotion 2014Vaadin codemotion 2014
Vaadin codemotion 2014
 
Building Event Driven API Services Using Webhooks
Building Event Driven API Services Using WebhooksBuilding Event Driven API Services Using Webhooks
Building Event Driven API Services Using Webhooks
 
Steps to publish an application to azure service fabric
Steps to publish an application to azure service fabricSteps to publish an application to azure service fabric
Steps to publish an application to azure service fabric
 
A 4 line login - line platform
A 4 line login - line platformA 4 line login - line platform
A 4 line login - line platform
 
WebHooks in 10 Minutes
WebHooks in 10 MinutesWebHooks in 10 Minutes
WebHooks in 10 Minutes
 
Windows Applications in the Cloud
Windows Applications in the CloudWindows Applications in the Cloud
Windows Applications in the Cloud
 
Apteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App PerformanceApteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App Performance
 
Site opsys
Site opsysSite opsys
Site opsys
 
Vaadin 7 by Joonas Lehtinen
Vaadin 7 by Joonas LehtinenVaadin 7 by Joonas Lehtinen
Vaadin 7 by Joonas Lehtinen
 
Vaadin NYC Meetup
Vaadin NYC MeetupVaadin NYC Meetup
Vaadin NYC Meetup
 
Reducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at NetflixReducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at Netflix
 
Detecting windows horizontal password blog
Detecting windows horizontal password blogDetecting windows horizontal password blog
Detecting windows horizontal password blog
 
Iam f42 a
Iam f42 aIam f42 a
Iam f42 a
 
Webhooks
WebhooksWebhooks
Webhooks
 
Using Cookies to Store Your Postman Secrets
Using Cookies to Store Your Postman SecretsUsing Cookies to Store Your Postman Secrets
Using Cookies to Store Your Postman Secrets
 
How to integrate bulk sms api in ASP.NET
How to integrate bulk sms api in ASP.NETHow to integrate bulk sms api in ASP.NET
How to integrate bulk sms api in ASP.NET
 
How to set https server
How to set https serverHow to set https server
How to set https server
 
API Security with Postman and Qualys
API Security with Postman and QualysAPI Security with Postman and Qualys
API Security with Postman and Qualys
 
Detecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-timeDetecting Windows horizontal password guessing attacks in near real-time
Detecting Windows horizontal password guessing attacks in near real-time
 

Viewers also liked

Balanced scorecard
Balanced scorecardBalanced scorecard
Balanced scorecard
SIHOMBINGNABABAN
 
Fiche sur les structures
Fiche sur les structuresFiche sur les structures
Fiche sur les structures
abdellah nasser
 
INDIAN GAAP vs US GAAP
INDIAN GAAP vs US GAAPINDIAN GAAP vs US GAAP
INDIAN GAAP vs US GAAPPriyank Thada
 
Exercise 1.4 Cade Ray and Anthony Mercer
Exercise 1.4 Cade Ray and Anthony MercerExercise 1.4 Cade Ray and Anthony Mercer
Exercise 1.4 Cade Ray and Anthony Mercer
cadewzrd
 
Sales Institute Schedule of Events 2014-15
Sales Institute Schedule of Events 2014-15Sales Institute Schedule of Events 2014-15
Sales Institute Schedule of Events 2014-15Bob Hoffman
 
Study On Automobile Market of India
Study On Automobile Market of India Study On Automobile Market of India
Study On Automobile Market of India
Priyank Thada
 
Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014
Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014  Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014
Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014
Natura Armond
 
Automate it – open access (compliance) as by-product of better workflows
Automate it – open access (compliance) as by-product of better workflowsAutomate it – open access (compliance) as by-product of better workflows
Automate it – open access (compliance) as by-product of better workflows
Torsten Reimer
 
Русокон примеры концепций логотипа
Русокон   примеры концепций логотипаРусокон   примеры концепций логотипа
Русокон примеры концепций логотипа
dialz
 
Imperial College London - journey to open scholarship
Imperial College London - journey to open scholarshipImperial College London - journey to open scholarship
Imperial College London - journey to open scholarship
Torsten Reimer
 
Linked in addon ret readiness wrkshp pres 0614
Linked in addon   ret readiness wrkshp pres 0614Linked in addon   ret readiness wrkshp pres 0614
Linked in addon ret readiness wrkshp pres 0614Brig De León, CRPC®
 
Job rotation reward and recognition
Job rotation reward and recognitionJob rotation reward and recognition
Job rotation reward and recognition
Priyank Thada
 

Viewers also liked (14)

Balanced scorecard
Balanced scorecardBalanced scorecard
Balanced scorecard
 
Fiche sur les structures
Fiche sur les structuresFiche sur les structures
Fiche sur les structures
 
INDIAN GAAP vs US GAAP
INDIAN GAAP vs US GAAPINDIAN GAAP vs US GAAP
INDIAN GAAP vs US GAAP
 
Exercise 1.4 Cade Ray and Anthony Mercer
Exercise 1.4 Cade Ray and Anthony MercerExercise 1.4 Cade Ray and Anthony Mercer
Exercise 1.4 Cade Ray and Anthony Mercer
 
Sales Institute Schedule of Events 2014-15
Sales Institute Schedule of Events 2014-15Sales Institute Schedule of Events 2014-15
Sales Institute Schedule of Events 2014-15
 
Aqidah
AqidahAqidah
Aqidah
 
Study On Automobile Market of India
Study On Automobile Market of India Study On Automobile Market of India
Study On Automobile Market of India
 
Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014
Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014  Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014
Catalogo Deerhunter Abbigliamento Caccia e Outdoor 2014
 
Automate it – open access (compliance) as by-product of better workflows
Automate it – open access (compliance) as by-product of better workflowsAutomate it – open access (compliance) as by-product of better workflows
Automate it – open access (compliance) as by-product of better workflows
 
Русокон примеры концепций логотипа
Русокон   примеры концепций логотипаРусокон   примеры концепций логотипа
Русокон примеры концепций логотипа
 
Imperial College London - journey to open scholarship
Imperial College London - journey to open scholarshipImperial College London - journey to open scholarship
Imperial College London - journey to open scholarship
 
Linked in addon ret readiness wrkshp pres 0614
Linked in addon   ret readiness wrkshp pres 0614Linked in addon   ret readiness wrkshp pres 0614
Linked in addon ret readiness wrkshp pres 0614
 
Berkas persyaratan brigadir
Berkas persyaratan brigadirBerkas persyaratan brigadir
Berkas persyaratan brigadir
 
Job rotation reward and recognition
Job rotation reward and recognitionJob rotation reward and recognition
Job rotation reward and recognition
 

Similar to Webhooks

Progressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent ConventoProgressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent Convento
DEVCON
 
SharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning ModelsSharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning Models
Shailen Sukul
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?
Colin McGovern
 
Slack Integration Noida Meetup.pptx
Slack Integration Noida Meetup.pptxSlack Integration Noida Meetup.pptx
Slack Integration Noida Meetup.pptx
Shiva Sahu
 
RESTful services and OAUTH protocol in IoT
RESTful services and OAUTH protocol in IoTRESTful services and OAUTH protocol in IoT
RESTful services and OAUTH protocol in IoT
Yakov Fain
 
Automation of web attacks from advisories to create real world exploits
Automation of web attacks from advisories to create real world exploitsAutomation of web attacks from advisories to create real world exploits
Automation of web attacks from advisories to create real world exploits
Munir Njiru
 
Using the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceUsing the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & Finance
Hitesh Sahu
 
2023-May.pptx
2023-May.pptx2023-May.pptx
2023-May.pptx
mnaeemuetcs
 
Watch How the Giants Fall
Watch How the Giants FallWatch How the Giants Fall
Watch How the Giants Fall
jtmelton
 
OAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST ServicesOAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST Services
Intuit Developer
 
App Indexing: Blurring the Lines Between Your Website and App
App Indexing: Blurring the Lines Between Your Website and AppApp Indexing: Blurring the Lines Between Your Website and App
App Indexing: Blurring the Lines Between Your Website and App
Juan Gomez
 
Microsoft Lync Server 2010 Installation
Microsoft Lync Server 2010 InstallationMicrosoft Lync Server 2010 Installation
Microsoft Lync Server 2010 Installation
Shahab Al Yamin Chawdhury
 
JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...
JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...
JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...
JSFestUA
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
Ritwik Das
 
Service workers and their role in PWAs
Service workers and their role in PWAsService workers and their role in PWAs
Service workers and their role in PWAs
Ipsha Bhidonia
 
API Security - Null meet
API Security - Null meetAPI Security - Null meet
API Security - Null meet
vinoth kumar
 
Online Bank Hack
Online Bank HackOnline Bank Hack
Online Bank HackCaleb Sima
 
Build and graduate your app in ring central
Build and graduate your app in ring centralBuild and graduate your app in ring central
Build and graduate your app in ring central
Anirban Sen Chowdhary
 
Oauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client ApplicationsOauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client Applications
Kasun Dharmadasa
 

Similar to Webhooks (20)

Progressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent ConventoProgressive Web Apps by Millicent Convento
Progressive Web Apps by Millicent Convento
 
SharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning ModelsSharePoint 2013 App Provisioning Models
SharePoint 2013 App Provisioning Models
 
How Secure Is Your Secure API?
How Secure Is Your Secure API?How Secure Is Your Secure API?
How Secure Is Your Secure API?
 
Slack Integration Noida Meetup.pptx
Slack Integration Noida Meetup.pptxSlack Integration Noida Meetup.pptx
Slack Integration Noida Meetup.pptx
 
RESTful services and OAUTH protocol in IoT
RESTful services and OAUTH protocol in IoTRESTful services and OAUTH protocol in IoT
RESTful services and OAUTH protocol in IoT
 
Automation of web attacks from advisories to create real world exploits
Automation of web attacks from advisories to create real world exploitsAutomation of web attacks from advisories to create real world exploits
Automation of web attacks from advisories to create real world exploits
 
Using the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & FinanceUsing the Google SafetyNet API for Banking & Finance
Using the Google SafetyNet API for Banking & Finance
 
2023-May.pptx
2023-May.pptx2023-May.pptx
2023-May.pptx
 
Watch How the Giants Fall
Watch How the Giants FallWatch How the Giants Fall
Watch How the Giants Fall
 
OAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST ServicesOAuth for QuickBooks Online REST Services
OAuth for QuickBooks Online REST Services
 
App Indexing: Blurring the Lines Between Your Website and App
App Indexing: Blurring the Lines Between Your Website and AppApp Indexing: Blurring the Lines Between Your Website and App
App Indexing: Blurring the Lines Between Your Website and App
 
Microsoft Lync Server 2010 Installation
Microsoft Lync Server 2010 InstallationMicrosoft Lync Server 2010 Installation
Microsoft Lync Server 2010 Installation
 
JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...
JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...
JS Fest 2018. Тимофей Лавренюк. Делаем веб приложение лучше с помощью совреме...
 
Web 2.0 PPT
Web 2.0 PPTWeb 2.0 PPT
Web 2.0 PPT
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
Service workers and their role in PWAs
Service workers and their role in PWAsService workers and their role in PWAs
Service workers and their role in PWAs
 
API Security - Null meet
API Security - Null meetAPI Security - Null meet
API Security - Null meet
 
Online Bank Hack
Online Bank HackOnline Bank Hack
Online Bank Hack
 
Build and graduate your app in ring central
Build and graduate your app in ring centralBuild and graduate your app in ring central
Build and graduate your app in ring central
 
Oauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client ApplicationsOauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client Applications
 

More from Priyank Thada

Red bull marketing strategy
Red bull marketing strategyRed bull marketing strategy
Red bull marketing strategy
Priyank Thada
 
Contract of agencies special contracts
Contract of agencies special contractsContract of agencies special contracts
Contract of agencies special contracts
Priyank Thada
 
Financial inclusion
Financial inclusionFinancial inclusion
Financial inclusion
Priyank Thada
 
Effects of parental marital issues on children
Effects of parental marital issues on childrenEffects of parental marital issues on children
Effects of parental marital issues on children
Priyank Thada
 
Customer perception towards banking services
Customer perception towards banking servicesCustomer perception towards banking services
Customer perception towards banking services
Priyank Thada
 
Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibility
Priyank Thada
 

More from Priyank Thada (6)

Red bull marketing strategy
Red bull marketing strategyRed bull marketing strategy
Red bull marketing strategy
 
Contract of agencies special contracts
Contract of agencies special contractsContract of agencies special contracts
Contract of agencies special contracts
 
Financial inclusion
Financial inclusionFinancial inclusion
Financial inclusion
 
Effects of parental marital issues on children
Effects of parental marital issues on childrenEffects of parental marital issues on children
Effects of parental marital issues on children
 
Customer perception towards banking services
Customer perception towards banking servicesCustomer perception towards banking services
Customer perception towards banking services
 
Corporate social responsibility
Corporate social responsibilityCorporate social responsibility
Corporate social responsibility
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 

Webhooks

  • 1. Made by:- Submitted to:- Miss Himani Kapadia Avinash Singh Bhavik solanki Dishant soni Dev patel Jhill soni Priyank Thada
  • 2. A webhook in web development, is a method of augmenting or altering the behaviour of a web page, or web application, with customs call backs. These call backs may be maintained, modified and managed by third party users and developers who may not necessarily affiliated with the originating website or application. The term “webhook” was coined by Jeff Lindsay in 2007 from the computer programing term hook.
  • 3. Webhooks are user defined HTTP call backs, they are triggered by some event, such as pushing code to repository or a comment being posted to a blog. When that event occurs, the source site makes an HTTP request to the URL configured from the webhook. User can configure them to cause events on one site to invoke behaviour on another. The action takes may be anything. Common uses are to trigger builds with continuous integration system or to notify bug tracking system.
  • 4. “XYZ” company wants to send some investment related schemes to their new prospects. Once a new prospect opens or clicks on any link inside the email, then their internal CRM/call centre software should get updated, so that their sales executive can immediately call and acquire new prospect. Now, this can be done using third party vendor to send emails . Here the third party is FALCONIDE webhooks. It gives you immense flexible to gather real time data directly on to your system. Just specify a call-back URL on falconide and as soon as a prospects click on link an event will be triggered that will POST the information to your specific URL
  • 5.
  • 6. You can configure webhooks through falconide account here are the basic steps: 1. Login to falconide account. 2. Navigate to settings-> API 3. Click the API menu option in the sidebar sub menu 4. Click webhooks under API 5. Enter a valid callback URL where falconide can POST the event data. As per your business requirement, you can configure webhooks for all or selected categories of events.
  • 7.
  • 8. 1. If your system are behind a firewall that blocks access to all traffic except for certain domains then your network has to grant access to falconide.com, in order for the webhooks to function correctly, the administrators of your network will have to allow all the following range of IPs on your network. 2. Your webhooks URLs should be set up to accept the POST request coming from our falconide server. When you provide the URL where you want falconide to POST the data for events we'll do a quick check that the URL exists by using a HEAD request (not POST).
  • 9. When an event occur that you have specified a callback URL for, webhook will send a HTTP POST request to the URL you’ve specified and it will do its best to deliver the events to your endpoint. But, if that URL is unavailable or takes to long to respond , we’ll cancel the request and dispatcher will attempt several retries until the maximum retry limit of 5 is reached.
  • 10. 1. TRANSID  Falconide assigns a Unique ID transaction for each and every emails which were sent. 2. EMAIL  Recipient’s email ID 3. Event  Type of event: delivered/dropped/invalid/bounced/ opened/clicked/ unsubscribed/spam. 4. RESPONSE  response received from the end server like delivery, logs, bounced reason, reason for drop (blacklisted user/already unsubscribed).
  • 11. 5. X- APIHEADER  Information passed by you in the APIHEADER, during the time of email sent. 6. TIMESTAMP  Unix TIMESTAMP of the occurrence of the event. 7. USERAGENT  User agent contains the detailed information about the browser from where a specific event is initiated. 8. IPADDRESS  IP address of the device from where the recipient has responded.
  • 12. Webhook currently support on number of events, which are detailed below: • Delivered • Dropped • Invalid • Bounced • Opened • Clicked • Unsubscribed
  • 13. TRANSI D EMAIL EVEN T RESPONS E X- APIHEADE R TIMES TAMP 19898796752 6 test@gmail.co m DELIVER ED 175.158.64.3 9->250 2.0 OK ACC12312 1358402 419 1. Delivered Email has been successfully delivered to the receiving server
  • 14. 2. Dropped Users who have already unsubscribed in past or blacklisted because of hard bounce complaints will be treated as dropped. And no further communication is allowed on this type of rid. TRANSI D EMAIL EVEN T RESPONS E X- APIHEAD ER TIMES TAMP 19898796752 6 test@gmail.co m DROPPE D Blacklisted user / already unsubscribe d ACC12312 1358402 419
  • 15. 3. INVALID All API requests with syntactically incorrect email ids will be treated as invalid and no further processing will be done on such ids. You can capture all such invalid events in real time and try correcting them offline. TRANSI D EMAIL EVEN T RESPONS E X- APIHEADE R TIMES TAMP 19898796752 6 test@gmail.co m INVALID Invalid Email Address ACC12312 1358402 419
  • 16. 4. BOUNCED Receiving server could not or would not accept message because of multiple reasons like receiving server is not reachable, email id doesn’t exist etc. TRANSI D EMAIL EVEN T RESPONS E X- APIHEADE R TIMES TAMP 19898796752 6 test@gmail.co m BOUNCE D 550 5.1.1 email account doesn’t exist ACC12312 1358402 419
  • 17. 5. OPENED Recipient has opened all emails TRANSI D EMAIL EVEN T RESPONS E X- APIHEADE R TIMES TAMP 19898796752 6 test@gmail.co m DELIVER ED 175.158.64.3 9->250 2.0 OK ACC12312 1358402 419
  • 18. 6. CLICKED Recipient has clicked on a link within a message. TRANSI D EMAIL EVEN T RESPONS E X- APIHEADE R TIMES TAMP 19898796752 6 test@gmail.co m CLICKED 175.158.64.3 9->250 2.0 OK BC12311 1358402 419
  • 19. 7. UNSUBSCRIBED Recipient clicked on unsubscribed management link. TRANSI D EMAIL EVENT RESP ONSE X- APIHEAD ER TIMES TAMP 19898796752 6 test@gmail.co m UNSUBSCRIB ED 175.158.6 4.39- >250 2.0 OK ACC12312 1358402 419
  • 20. Below is a sample script which needs to be written at your end for collecting the event data posted by Webhooks. This is language as well as platform independent. You can write script in any programming language and collect the data. <?php $fp=fopen(‘/tmp/weblog.txt’,’a’); Foreach($_POST as $key=>$val) { Fwrite($fp,”$key=>$val”); } Fwrite($fp,”n”); fclose($fp); ?>