Query List of Sign-in IPs
This workflow automatically retrieves authentication event data from the past 24 hours, including successful logins and OAuth authorizations. It filters and deduplicates IP information, generating a login report in CSV format. The report is automatically sent to users via the SMTP2Go email service, enhancing data accuracy and delivery efficiency. It addresses the issues of manual queries and information dispersion, making it suitable for IT security teams, SaaS platform administrators, and compliance management departments, significantly saving time and labor costs.
Tags
Workflow Name
Query List of Sign-in IPs
Key Features and Highlights
This workflow automates the retrieval of multiple authentication event data from the past 24 hours—including successful logins, OAuth authorizations, and Office365 Shell successful logins. It filters and deduplicates the collected login IP information, ultimately generating a CSV-format IP login report. The report is then automatically sent to users via the SMTP2Go email service. Highlights include multi-source event integration, data deduplication, and automated email delivery, enhancing data accuracy and delivery efficiency.
Core Problems Addressed
Enterprises and security teams often need timely insights and audits of user login behaviors and IP origins to prevent unauthorized access and security risks. This workflow addresses the challenges of manual login log queries, redundant data, scattered information, and inconvenient report distribution by automating data collection, cleansing, and distribution—saving significant time and labor costs.
Use Cases
- IT security teams regularly obtaining and auditing user login IP information
- SaaS platform administrators tracking user login activities to identify anomalous access
- Corporate compliance and risk management departments generating login event reports
- Any organization requiring automated monitoring and reporting of login activities
Main Workflow Steps
- User inputs name, email, and API key via a form to trigger the workflow
- Set the query time variable to the past 24 hours
- Use HTTP requests to call the SaaS Alerts API for three types of login event data
- Merge all authentication event data
- Filter and extract user, IP, and geographic location fields
- Remove duplicate IP records to ensure data uniqueness
- Convert the cleaned data into CSV format
- Encode the CSV file content in Base64
- Send the CSV file as an email attachment to the user via the SMTP2Go API
Involved Systems or Services
- SaaS Alerts API (multi-authentication event data source)
- SMTP2Go (email delivery service)
- n8n automation platform built-in nodes (HTTP requests, data processing, file conversion, form triggers, etc.)
Target Audience and Value
- IT operations and security analysts: Automatically generate login IP reports to support security monitoring and anomaly detection
- SaaS product administrators: Convenient access to user login data to improve operational and security management efficiency
- Compliance and risk management teams: Quickly obtain standardized login audit data to support internal and external compliance requirements
- Any enterprise or organization needing automated login data aggregation and email notifications, significantly reducing time costs and enhancing automation in data processing and report delivery.
Error Trigger and Webhook Data Extraction Workflow
This workflow is designed to capture runtime errors and automatically extract relevant execution data and Webhook request payload information. By using custom code to accurately filter Webhook nodes and their data, users can conduct in-depth analysis of the error context and quickly pinpoint the root cause of issues. This workflow significantly enhances troubleshooting efficiency and is suitable for anomaly monitoring in automation projects, debugging interface call issues, and error log management for operations teams, helping enterprises achieve system stability and business continuity.
Automated PDF Download and Password Protection Process
This workflow automates the downloading and password protection of PDF files, utilizing ConvertAPI for encryption processing. The encrypted files are simultaneously saved to both local disk and Google Drive. The entire process requires no manual intervention and supports flexible password settings, ensuring file security and convenient access. It is suitable for sending confidential documents within enterprises, managing sensitive documents in the legal and financial industries, and protecting important materials in remote work environments, significantly enhancing the efficiency and security of file management.
n8n Execution History Auto-Cleanup Workflow
This workflow is designed to periodically scan and automatically delete old execution records that have been running for more than 10 days, thereby maintaining a clean and efficient system and preventing redundant data from occupying storage resources. By regularly cleaning up expired execution records, users can effectively manage historical data, ensuring system performance and response speed. Additionally, it supports manual triggering for testing and debugging purposes, simplifying data cleanup operations for maintenance personnel and enhancing the operational efficiency of the automation platform.
Batch Message Sending with External Approval Waiting Workflow
This workflow focuses on batch processing customer data, sending personalized messages one by one through rate limiting, while generating approval links for external personnel to confirm. It combines batch processing, timed waiting, and external event triggering mechanisms to ensure that message sending is orderly and the process is controllable. It is suitable for scenarios requiring personalized marketing and online approval, effectively avoiding request overload and enhancing automation efficiency and customer experience. It is designed for use by automation operators, sales teams, and customer service departments.
Google Cal to Zoom Meeting
This workflow automatically retrieves meeting schedules from Google Calendar for the next 12 hours and creates Zoom online meetings based on those schedules. Through secure authentication, it ensures a seamless connection between Google Calendar and Zoom, supporting both scheduled and manual triggers. This greatly enhances the efficiency and accuracy of meeting arrangements, avoiding duplicate operations and omissions. It is suitable for various scenarios, including remote working teams, sales personnel, and educational institutions.
Low Stock & Sold Out Watcher for Shopify
This workflow is designed to automatically monitor the inventory status of a Shopify store. When the inventory falls below a set threshold or a product is sold out, it promptly sends a notification to a designated Discord channel. The notification includes the product name, inventory quantity, variants, and images, helping the operations team to stay updated on inventory dynamics in real time, respond quickly to restocking needs, optimize sales strategies, and avoid sales losses due to stockouts.
Syncro Alert to OpsGenie
This workflow automates the reception of alarm information from the Syncro monitoring system and automatically creates or closes alarms in OpsGenie based on the alarm status. It retrieves information in real-time through Webhook and intelligently determines whether the alarm has been resolved, ensuring that the operations team can respond promptly and improving the accuracy and efficiency of alarm handling. It is suitable for IT operations teams and technical support departments, helping them reduce manual operations and optimize the alarm management process.
Get SSL Certificate
This workflow is primarily used for the automatic monitoring of the SSL certificate status for specified domain names, ensuring website security. It can detect in real-time whether the certificate has expired and sends instant alert notifications via Telegram when it does, helping users respond promptly to security risks and enhancing the website's accessibility and user trust. It is suitable for website administrators, operations personnel, and security teams, addressing the cumbersome issue of manual checks and ensuring that certificates remain valid at all times.