LIVEAI Bootcamps · May 2026 · 🇫🇷 CET
Resources · Integrations · n8n FREE · 2026Logo of Misp featuring a stylized letter 'M' in blue and gray colors

MISP n8n INTEGRATION: AUTOMATE MISP WITH N8N

Looking to automate your threat intelligence workflows with MISP and n8n? The MISP n8n integration opens up powerful possibilities for security teams who want to streamline their malware information sharing processes without writing complex scripts.

This integration gives you access to 44 actions covering the full spectrum of MISP resources—from events and attributes to organisations, tags, feeds, and galaxies. Whether you need to automatically create threat events, manage user permissions, search through indicators of compromise, or synchronize data with other security tools, our n8n automation agency can help you implement it through a visual, no-code interface.

In this comprehensive guide, you'll discover exactly how to connect MISP to n8n, explore every available action in detail, and learn practical automation scenarios that can transform your security operations.

Need help

Need help automating Misp with n8n?

Our team will get back to you in minutes.

Reply within 1 business hour
Why automate

Why automate Misp with n8n?

MISP (Malware Information Sharing Platform) is a cornerstone tool for security teams worldwide, but manual threat intelligence management can quickly become overwhelming. The n8n MISP integration provides 44 distinct actions spanning 10 different resource types: Attributes, Events, Event Tags, Feeds, Galaxies, Noticelists, Objects, Organisations, Tags, Users, and Warninglists.

Significant time savings: No more logging into MISP to manually create events, add attributes, or update tags. Set up intelligent workflows that automatically ingest threat data from multiple sources, create properly formatted MISP events, and distribute intelligence to relevant parties—all without human intervention. What used to take analysts 30 minutes can happen in seconds.

Improved responsiveness: In threat intelligence, timing is everything. With n8n automation, you can instantly create MISP events when your SIEM detects anomalies, automatically add indicators to existing events when new IOCs are discovered, or immediately publish critical threat data to partner organisations. Your security posture stays current without manual bottlenecks.

Zero oversight on critical processes: Configure automated workflows that run 24/7—searching for new attributes matching specific criteria, enabling or disabling feeds based on conditions, or synchronizing user permissions across your security infrastructure. Every important action is captured and executed consistently.

Seamless integration with your security stack: Connect MISP to over 400+ applications available in n8n. Automatically pull threat feeds from external APIs into MISP, push alerts to Discord or Slack when high-severity events are published, sync IOCs with your firewall or EDR solution, or create tickets in Jira when investigation is required.

Credentials

How to connect Misp to n8n?

  1. !
    1 step

    How to connect Misp to n8n?

    1. 01

      Add the node

      Connecting MISP to n8n requires API authentication using your MISP instance credentials. Here's how to establish the connection:Generate your MISP API key: Log into your MISP instance, navigate to your user profile, and locate the "Auth Keys" section. Generate a new authentication key with appropriate permissions for your automation needs.Access n8n credentials: In your n8n workflow editor, click on "Credentials" in the left sidebar, then select "Add Credential" and search for "MISP".Configure the MISP credential: Enter your MISP instance URL (e.g., https://your-misp-instance.com) and paste your API key into the designated field.Test the connection: n8n will validate your credentials against the MISP server. Ensure your MISP instance is accessible from your n8n environment and that any firewalls allow the connection.Save and use: Once validated, your MISP credential is ready to use across all MISP actions in your workflows.

    Misp credentials
    TIP
    💡 TIP: Create dedicated API keys for n8n automation rather than using your personal admin key. This allows you to set specific permission levels for automated actions and makes it easier to revoke access if needed without affecting your manual MISP access. For more automation best practices, check out our n8n training resources.
Need help

Need help automating Misp with n8n?

Our team will get back to you in minutes.

Reply within 1 business hour
Actions

Misp actions available in n8n

  1. 01
    Action 01

    Get Many Warninglists

    The Get Many Warninglists action allows you to retrieve multiple warning lists from your MISP instance in a single operation. Warninglists in MISP help identify potential false positives by flagging known benign indicators such as common DNS servers, CDN IP ranges, or legitimate software hashes.

    Key parameters: Credential to connect with (required dropdown), Resource set to "Warninglist", Operation set to "Get Many", Return All toggle, and Limit numeric field (default 50) for maximum warninglists to retrieve.

    Use cases: Audit your MISP instance by fetching all active warninglists and comparing against a baseline, synchronize warninglist data with external documentation systems, build dashboards showing which warninglists are deployed, or feed warninglist information into attribute validation workflows.

    When to use it: This action is ideal when you need to review or export multiple warninglists at once, rather than fetching individual entries.

    Get Many Warninglists
  2. 02
    Action 02

    Get Warninglist

    The Get Warninglist action retrieves detailed information about a specific warning list by its ID. This is useful when you need complete data about a particular warninglist for processing or validation purposes.

    Key parameters: Credential to connect with (required), Resource set to "Warninglist", Operation set to "Get", and Warninglist ID text field (required) supporting fixed values or expressions for dynamic input.

    Use cases: Fetch specific warninglist content to validate attributes before creating events, retrieve warninglist details for logging or documentation purposes, or check if a particular warninglist has been updated before running correlation workflows.

    When to use it: Use this action when you know exactly which warninglist you need and want its complete details, rather than scanning through multiple lists.

    Get Warninglist
  3. 03
    Action 03

    User Update

    The User Update action modifies existing user accounts in your MISP instance. This is essential for maintaining proper access control and user management in automated security operations.

    Key parameters: Credential to connect with (required), Resource set to "User", Operation set to "Update", User ID text field (required), and Update Fields expandable section where you add specific fields and values to modify.

    Use cases: Automatically update user roles based on HR system changes, sync user organization assignments when team structures change, batch update user permissions as part of security policy enforcement, or disable/modify accounts based on activity monitoring results.

    When to use it: Ideal for maintaining user data consistency across systems or implementing automated access management based on external triggers.

    User Update
  4. 04
    Action 04

    Get Many Users

    The Get Many Users action retrieves multiple user accounts from your MISP instance, providing visibility into who has access to your threat intelligence platform.

    Key parameters: Credential to connect with (required), Resource set to "User", Operation set to "Get Many", Return All toggle, and Limit numeric field (default 50) for maximum users to retrieve.

    Use cases: Generate regular user access reports for compliance audits, sync MISP user data with identity management systems, monitor for unauthorized or inactive accounts, or build user activity dashboards combining MISP data with other sources.

    When to use it: Use this action for bulk user data retrieval in audit, reporting, or synchronization workflows.

    Get Many Users
  5. 05
    Action 05

    User - Get

    The User - Get action retrieves information about a specific user by their ID. This provides detailed data about individual accounts for targeted operations.

    Key parameters: Credential to connect with (required), Resource set to "User", Operation set to "Get", and User ID text input field (required).

    Use cases: Verify user details before granting additional permissions, fetch user information for personalized notification workflows, or check user status as part of event attribution processes.

    When to use it: When you need complete details about a single, specific user rather than bulk data retrieval.

    User - Get
  6. 06
    Action 06

    Delete User

    The Delete User action removes a user account from your MISP instance. This is a destructive operation that should be used carefully in automated workflows.

    Key parameters: Credential to connect with (required), Resource set to "User", Operation set to "Delete", and User ID text field (required).

    Use cases: Automate user offboarding when employees leave the organization, clean up test accounts after quality assurance processes, or implement automatic account removal for inactive users after a defined period.

    When to use it: Use in carefully controlled workflows where user removal has been validated through appropriate approval processes.

    Delete User
  7. 07
    Action 07

    User Create

    The User Create action adds new user accounts to your MISP instance, enabling automated user provisioning as part of your identity management workflows.

    Key parameters: Credential to connect with (required), Resource set to "User", Operation set to "Create", Email text field (required), Role ID text field (optional), and Additional Fields expandable section for extra user properties.

    Use cases: Automatically provision MISP accounts when new analysts join the security team, create service accounts for automated integrations, set up temporary accounts for external partners or incident responders, or sync user creation with HR onboarding systems.

    When to use it: Ideal for implementing automated user provisioning that maintains consistency with your organization's identity management policies.

    User Create
  8. 08
    Action 08

    Update Tag

    The Update Tag action modifies existing tags in your MISP instance. Tags are crucial for categorizing and filtering threat intelligence, making this action valuable for taxonomy management.

    Key parameters: Credential to connect with (required), Resource set to "Tag", Operation set to "Update", Tag ID text field (required), and Update Fields section where you add fields to update such as name, colour, or exportable status.

    Use cases: Standardize tag naming conventions across your MISP deployment, update tag colors to match organizational taxonomy guidelines, modify tag export settings based on sharing policy changes, or batch update tags as part of taxonomy migration projects.

    When to use it: When you need to modify tag properties while maintaining the tag's relationships with existing events and attributes.

    Update Tag
  9. 09
    Action 09

    Misp: Get Many Tags

    The Get Many Tags action retrieves multiple tags from your MISP instance, essential for understanding your current taxonomy and maintaining tag consistency.

    Key parameters: Credential to connect with (required), Resource set to "Tag", Operation set to "Get Many", Return All toggle for fetching all tags or limiting results, and Limit numeric field (default 50) for maximum tags to retrieve.

    Use cases: Audit your complete tag taxonomy for compliance documentation, sync MISP tags with external taxonomy management systems, build tag selection interfaces for other automation tools, or generate reports on tag usage patterns.

    When to use it: Use when you need visibility into your complete tag landscape or need to export tag data for external processing.

    Misp: Get Many Tags
  10. 10
    Action 10

    Misp - Delete Tag

    The Delete Tag action removes a tag from your MISP instance. This operation should be used carefully as it affects all events and attributes using that tag.

    Key parameters: Credential to connect with (required), Resource set to "Tag", Operation set to "Delete", and Tag ID text field (required).

    Use cases: Clean up deprecated tags as part of taxonomy maintenance, remove duplicate or incorrectly created tags, or implement controlled tag lifecycle management.

    When to use it: Use in taxonomy cleanup workflows where tag removal has been properly validated.

    Misp - Delete Tag
  11. 11
    Action 11

    Create Tag

    The Create Tag action adds new tags to your MISP instance, enabling programmatic taxonomy expansion based on threat intelligence requirements.

    Key parameters: Credential to connect with (required), Resource set to "Tag", Operation set to "Create", Name text field (required), and Additional Fields section allowing users to add more fields like colour, exportable status, or organization restrictions.

    Use cases: Automatically create campaign-specific tags when new threat actors emerge, sync external taxonomy sources with your MISP tag database, generate tags dynamically based on threat feed classifications, or implement standardized tag creation following naming conventions.

    When to use it: Ideal for workflows that need to extend your taxonomy programmatically while maintaining consistency.

    Create Tag
  12. 12
    Action 12

    Update Organisation

    The Update Organisation action modifies organisation records in MISP, essential for maintaining accurate partner information in your threat sharing community.

    Key parameters: Credential to connect with (required), Resource set to "Organisation", Operation set to "Update", Organisation ID text field (required), and Update Fields section for specifying which organisation properties to change.

    Use cases: Keep organisation contact information synchronized with CRM data, update organisation metadata when partnership terms change, or modify organisation types or sectors based on updated classifications.

    When to use it: When organisation details need updating while preserving the organisation's existing relationships with events and users.

    Update Organisation
  13. 13
    Action 13

    Get Many Organisation

    The Get Many Organisation action retrieves multiple organisation records from MISP, providing visibility into your threat sharing community membership.

    Key parameters: Credential to connect with (required), Resource set to "Organisation", Operation set to "Get Many", Return All toggle for complete or limited results, and Limit numeric field (default 50) for maximum organisations to fetch.

    Use cases: Generate reports on community membership for governance purposes, sync MISP organisation data with partner management systems, build organisation selection interfaces for event distribution workflows, or audit organisation configurations for security compliance.

    When to use it: Use for bulk organisation data retrieval in reporting, synchronization, or audit workflows.

    Get Many Organisation
  14. 14
    Action 14

    Misp - Organisation Get

    The Organisation Get action retrieves details about a specific organisation by ID, providing complete information for targeted operations.

    Key parameters: Credential to connect with (required), Resource set to "Organisation", Operation set to "Get", and Organisation ID text field (optional but necessary for specific lookups).

    Use cases: Verify organisation details before sharing sensitive threat intelligence, fetch organisation metadata for event attribution workflows, or retrieve contact information for automated notification processes.

    When to use it: When you need complete details about a single organisation rather than bulk retrieval.

    Misp - Organisation Get
  15. 15
    Action 15

    Delete Organisation

    The Delete Organisation action removes an organisation from your MISP instance. This is a significant operation affecting event ownership and sharing relationships.

    Key parameters: Credential to connect with (required), Resource set to "Organisation", Operation set to "Delete", and Organisation ID text field (required).

    Use cases: Clean up test organisations after quality assurance processes, remove defunct partner organisations from your community, or implement controlled organisation lifecycle management.

    When to use it: Use with extreme caution in well-validated workflows where organisation removal has been properly approved.

    Delete Organisation
  16. 16
    Action 16

    Create Organisation

    The Create Organisation action adds new organisations to your MISP instance, enabling automated community management.

    Key parameters: Credential to connect with (required), Resource set to "Organisation", Operation set to "Create", Name text field (required), and Additional Fields section for extra properties like description, sector, nationality, or contact information.

    Use cases: Automatically onboard new threat sharing partners, create organisations based on external community management systems, set up organisations for new departments or subsidiaries, or sync with partner registration workflows.

    When to use it: Ideal for automating community expansion while maintaining data quality standards.

    Create Organisation
  17. 18
    Action 18

    Get Many Noticelist

    The Get Many Noticelist action retrieves multiple noticelists from MISP. Noticelists contain informational notices about specific types of data, helping analysts understand context and potential issues.

    Key parameters: Credential to connect with (required), Resource set to "Noticelist", Operation set to "Get Many", Return All toggle, and Limit numeric field (default 50) for maximum noticelists.

    Use cases: Audit deployed noticelists for configuration management, export noticelist data for documentation purposes, or build validation workflows that reference noticelist information.

    When to use it: When you need to retrieve multiple noticelists for audit, documentation, or validation purposes.

    Get Many Noticelist
  18. 19
    Action 19

    Misp - Noticelist Get

    The Noticelist Get action retrieves details about a specific noticelist by ID.

    Key parameters: Credential to connect with (required), Resource set to "Noticelist", Operation set to "Get", and Noticelist ID text field (optional).

    Use cases: Fetch specific noticelist content for validation workflows or retrieve noticelist details for documentation.

    When to use it: When you need complete details about a specific noticelist.

    Misp - Noticelist Get
  19. 20
    Action 20

    Galaxy - Get Many

    The Get Many Galaxies action retrieves multiple galaxies from MISP. Galaxies provide threat intelligence context like threat actors, attack patterns, and malware classifications.

    Key parameters: Credential to connect with (required), Resource set to "Galaxy", Operation set to "Get Many", Return All toggle, and Limit numeric field (default 50) for maximum galaxies.

    Use cases: Sync MISP galaxies with external threat intelligence platforms, build galaxy selection interfaces for event enrichment workflows, generate reports on available threat classifications, or audit galaxy configurations across MISP instances.

    When to use it: Use for bulk galaxy retrieval in synchronization, reporting, or integration workflows.

    Galaxy - Get Many
  20. 21
    Action 21

    MISP - Get Galaxy

    The Get Galaxy action retrieves details about a specific galaxy by ID.

    Key parameters: Credential to connect with (required), Resource set to "Galaxy", Operation set to "Get", and Galaxy ID text field (required).

    Use cases: Fetch specific galaxy clusters for event enrichment or retrieve galaxy details for threat actor attribution workflows.

    When to use it: When you need complete details about a specific galaxy.

    MISP - Get Galaxy
  21. 22
    Action 22

    Delete Galaxy

    The Delete Galaxy action removes a galaxy from your MISP instance.

    Key parameters: Credential to connect with (required), Resource set to "Galaxy", Operation set to "Delete", and Galaxy ID text field (required).

    Use cases: Clean up custom galaxies that are no longer needed or remove deprecated threat classifications.

    When to use it: Use carefully in controlled cleanup workflows.

    Delete Galaxy
  22. 23
    Action 23

    Feed Update

    The Feed Update action modifies existing feed configurations in MISP. Feeds provide automated ingestion of external threat intelligence.

    Key parameters: Credential to connect with (required), Resource set to "Feed", Operation set to "Update", Feed ID text field (required), and Update Fields section for specifying which feed properties to change.

    Use cases: Update feed URLs when sources change, modify feed authentication credentials, adjust feed caching or pulling intervals, or change feed distribution settings.

    When to use it: When feed configurations need updating without recreating the feed entirely.

    Feed Update
  23. 24
    Action 24

    Misp - Feed: Get Many

    The Get Many Feeds action retrieves multiple feed configurations from MISP.

    Key parameters: Credential to connect with (required), Resource set to "Feed", Operation set to "Get Many", Return All toggle, and Limit numeric field (default 50) for maximum feeds.

    Use cases: Audit all configured threat feeds for documentation, monitor feed status across your MISP infrastructure, generate reports on feed sources and configurations, or sync feed configurations between MISP instances.

    When to use it: Use for feed inventory, audit, or synchronization workflows.

    Misp - Feed: Get Many
  24. 25
    Action 25

    Misp Feed - Get

    The Feed Get action retrieves details about a specific feed by ID.

    Key parameters: Credential to connect with (required), Resource set to "Feed", Operation set to "Get", and Feed ID text field (required).

    Use cases: Check specific feed configuration before triggering pulls or verify feed status for health monitoring workflows.

    When to use it: When you need complete details about a specific feed.

    Misp Feed - Get
  25. 26
    Action 26

    Feed Enable

    The Feed Enable action activates a disabled feed in MISP, allowing it to resume pulling data.

    Key parameters: Credential to connect with (required), Resource set to "Feed", Operation set to "Enable", and Feed ID text field (required).

    Use cases: Automatically enable feeds during business hours and disable overnight, reactivate feeds after maintenance periods, or implement conditional feed activation based on threat levels.

    When to use it: When you need to programmatically activate feeds as part of feed management workflows.

    Feed Enable
  26. 27
    Action 27

    Disable Feed

    The Disable Feed action deactivates an active feed in MISP, pausing data ingestion.

    Key parameters: Credential to connect with (required), Resource set to "Feed", Operation set to "Disable", and Feed ID text field (required).

    Use cases: Temporarily disable feeds during maintenance windows, stop noisy or problematic feeds pending investigation, or implement scheduled feed management based on operational requirements.

    When to use it: When you need to programmatically pause feeds without deleting them.

    Disable Feed
  27. 28
    Action 28

    Create Feed

    The Create Feed action adds new feed configurations to MISP, enabling automated threat intelligence ingestion from new sources.

    Key parameters: Credential to connect with (required), Resource set to "Feed", Operation set to "Create", Name text field (required), Provider text field (optional), URL text field (required for most feed types), and Additional Fields section for extra properties.

    Use cases: Automatically add new threat feed sources based on recommendations, implement self-service feed provisioning for security teams, sync feed configurations from centralized management systems, or set up feeds for new threat intelligence partnerships.

    When to use it: Ideal for automating feed provisioning while maintaining configuration standards.

    Create Feed
  28. 29
    Action 29

    Remove Event Tag

    The Remove Event Tag action removes a specific tag from an event in MISP.

    Key parameters: Credential to connect with (required), Resource set to "Event Tag", Operation set to "Remove", Event ID text field (required), and Tag Name or ID field to specify which tag to remove.

    Use cases: Clean up incorrect tags added during initial event triage, remove temporary workflow tags after processing is complete, or implement tag lifecycle management based on event states.

    When to use it: When specific tags need removal from events as part of tagging workflows.

    Remove Event Tag
  29. 30
    Action 30

    Misp - Event Tag Add

    The Event Tag Add action attaches a tag to an existing event in MISP.

    Key parameters: Credential to connect with (required), Resource set to "Event Tag", Operation set to "Add", Event ID text field (required), and Tag Name or ID text field specifying which tag to add.

    Use cases: Automatically tag events based on attribute content or patterns, add workflow status tags as events progress through analysis, apply classification tags based on external intelligence sources, or implement consistent tagging based on organizational policies.

    When to use it: Essential for automated event categorization and workflow management.

    Misp - Event Tag Add
  30. 31
    Action 31

    Update Event

    The Update Event action modifies existing events in MISP, enabling automated event management and enrichment.

    Key parameters: Credential to connect with (required), Resource set to "Event", Operation set to "Update", Event ID text field (required), and Update Fields section for specifying which event properties to change.

    Use cases: Automatically update event threat levels based on new intelligence, modify event distribution as sharing requirements change, update event analysis status through automated triage workflows, or enrich event information with data from external sources.

    When to use it: Critical for automated event lifecycle management and enrichment workflows.

    Update Event
  31. 32
    Action 32

    Unpublish Event

    The Unpublish Event action removes the published status from an event, preventing further distribution until republished.

    Key parameters: Credential to connect with (required), Resource set to "Event", Operation set to "Unpublish", and Event ID text field (required).

    Use cases: Temporarily unpublish events when corrections are needed, remove events from distribution pending additional validation, or implement controlled event withdrawal workflows.

    When to use it: When events need to be temporarily removed from distribution without deletion.

    Unpublish Event
  32. 34
    Action 34

    Publish Event

    The Publish Event action marks an event as published, triggering distribution to connected instances and users based on sharing rules.

    Key parameters: Credential to connect with (required), Resource set to "Event", Operation set to "Publish", and Event ID text field (required).

    Use cases: Automatically publish events after validation workflows complete, trigger immediate distribution of high-priority threat intelligence, implement scheduled publishing based on operational requirements, or build approval workflows that publish after review.

    When to use it: Essential for controlling when threat intelligence is shared with your community.

    Publish Event
  33. 35
    Action 35

    Get Many Event

    The Get Many Event action retrieves multiple events from MISP, providing bulk access to threat intelligence data.

    Key parameters: Credential to connect with (required), Resource set to "Event", Operation set to "Get Many", Return All toggle, and Limit numeric field (default 50) for maximum events.

    Use cases: Export recent events for external analysis platforms, generate regular threat intelligence reports, sync event data with SIEM or SOAR platforms, or build dashboards showing current threat landscape.

    When to use it: Use for bulk event retrieval in reporting, export, or synchronization workflows.

    Get Many Event
  34. 36
    Action 36

    Misp Event - Get

    The Event Get action retrieves complete details about a specific event by ID.

    Key parameters: Credential to connect with (required), Resource set to "Event", Operation set to "Get", and Event ID text field (required).

    Use cases: Fetch complete event data for investigation workflows, retrieve event details for enrichment processes, or access event metadata for reporting.

    When to use it: When you need complete details about a specific event for processing or analysis.

    Misp Event - Get
  35. 37
    Action 37

    Delete Event

    The Delete Event action removes an event from MISP. This is a destructive operation that should be used carefully.

    Key parameters: Credential to connect with (required), Resource set to "Event", Operation set to "Delete", and Event ID text field (required).

    Use cases: Clean up false positive or duplicate events, remove test events after quality assurance, or implement controlled event deletion workflows with proper approvals.

    When to use it: Use carefully in validated workflows where event deletion is appropriate.

    Delete Event
  36. 38
    Action 38

    Misp - Event Create

    The Event Create action creates new events in MISP, the foundation for automated threat intelligence ingestion.

    Key parameters: Credential to connect with (required), Resource set to "Event", Operation set to "Create", Organization Name or ID field (dynamically fetched), Information text field for the event's main description, and Additional Fields section for extra properties.

    Use cases: Automatically create events from threat feed ingestion, generate events based on SIEM alerts or security tool detections, build event templates that standardize threat documentation, or implement automated incident response that creates MISP events.

    When to use it: Fundamental for any automated threat intelligence ingestion workflow.

    Misp - Event Create
  37. 39
    Action 39

    Misp Attribute Update

    The Attribute Update action modifies existing attributes in MISP events.

    Key parameters: Credential to connect with (required), Resource set to "Attribute", Operation set to "Update", Attribute ID text field (required), and Update Fields section for specifying which attribute properties to change.

    Use cases: Update attribute comments with analysis findings, modify attribute distribution or sharing settings, change attribute categories or types based on validation, or enrich attributes with correlation results.

    When to use it: When attribute properties need modification without deletion and recreation.

    Misp Attribute Update
  38. 41
    Action 41

    Get Many Attribute

    The Get Many Attribute action retrieves multiple attributes from MISP.

    Key parameters: Credential to connect with (required), Resource set to "Attribute", Operation set to "Get Many", Return All toggle, and Limit numeric field (default 50) for maximum attributes.

    Use cases: Export IOCs for integration with defensive tools, generate indicator feeds for firewalls or proxies, build reports on attribute types and volumes, or sync indicators with external platforms.

    When to use it: Use for bulk indicator export and synchronization workflows.

    Get Many Attribute
  39. 42
    Action 42

    Get Attribute

    The Get Attribute action retrieves details about a specific attribute by ID.

    Key parameters: Credential to connect with (required), Resource set to "Attribute", Operation set to "Get", and Attribute ID text field (required).

    Use cases: Fetch complete attribute details for analysis or retrieve attribute metadata for processing workflows.

    When to use it: When you need complete details about a specific attribute.

    Get Attribute
  40. 43
    Action 43

    Delete Attribute

    The Delete Attribute action removes an attribute from MISP.

    Key parameters: Credential to connect with (required), Resource set to "Attribute", Operation set to "Delete", and Attribute ID text field (required).

    Use cases: Remove false positive indicators, clean up duplicate attributes, or delete attributes that fail validation.

    When to use it: Use in controlled cleanup workflows where attribute removal is validated.

    Delete Attribute
  41. 44
    Action 44

    Misp Attribute - Create

    The Attribute Create action adds new indicators to MISP events, fundamental for building threat intelligence.

    Key parameters: Credential to connect with (required), Resource set to "Attribute", Operation set to "Create", Event UUID text field (optional but necessary for proper attachment), Type dropdown for attribute type, Value text field for the actual indicator value (required), and Additional Fields section for extra properties.

    Use cases: Automatically ingest IOCs from threat feeds into events, add indicators discovered during investigations, build automated attribute creation from security tool alerts, or implement standardized indicator formatting and categorization.

    When to use it: Fundamental for any automated indicator ingestion workflow.

    Misp Attribute - Create
You've seen the integration

Build your first workflow with our team

Drop your email and we'll send you the catalog of automations you can ship today.

  • Free n8n & Make scenarios to import
  • Step-by-step setup docs
  • Live cohort + community support

Frequently asked questions

  • Is the MISP n8n integration free?
    The MISP integration itself is free and included in n8n's core node library—you don't need to pay extra to access it. However, your overall costs depend on how you run n8n. Self-hosting n8n is free (you only pay for your server infrastructure), while n8n Cloud offers various pricing tiers based on workflow executions and features. On the MISP side, the platform is open-source and free, though you'll need infrastructure to host your MISP instance. The API access required for the n8n integration is included in standard MISP deployments with no additional licensing costs.
  • What data can I sync between MISP and n8n?
    The n8n MISP integration provides comprehensive access to MISP's data model through 44 actions covering 10 resource types. You can manage Events (create, read, update, delete, search, publish/unpublish), Attributes (IOCs like IP addresses, domains, hashes), Event Tags, Feeds (external threat intelligence sources), Galaxies (threat actor and malware classifications), Organisations, Users, Objects (complex multi-attribute entities), Noticelists, and Warninglists. This enables complete workflows from threat feed ingestion through event creation, attribute management, and intelligence distribution to your sharing community. For more complex integrations, explore our Make automation services as an alternative.
  • How long does it take to set up the MISP n8n integration?
    Initial setup typically takes 10-15 minutes if you already have a working MISP instance. The process involves generating an API key in MISP (2 minutes), creating the credential in n8n (2 minutes), and testing with a simple workflow (5 minutes). The main prerequisite is ensuring network connectivity between your n8n instance and MISP server—if they're on different networks, firewall rules may need configuration. Once connected, you can immediately start building workflows using any of the 44 available actions. More complex production workflows may take additional time to design and test, but the integration itself is quick to establish. If you encounter issues, our n8n troubleshooting guide can help resolve common problems.
Hack'celeration Lab

Get our weekly integration tips.

No spam. Unsubscribe anytime.