Phishing Analysis Automation with n8n, URLScan.io & VirusTotal

Automate phishing URL analysis with n8n using URLScan.io and VirusTotal. This workflow extracts URLs from unread Outlook emails, scans for threats, and reports via Slack, saving hours on threat detection.
microsoftOutlook
urlScanIo
httpRequest
+9
Workflow Identifier: 1035
NODES in Use: Manual Trigger, Schedule Trigger, Microsoft Outlook, Split In Batches, Code, IF, URLScan.io, HTTP Request, Wait, Merge, Filter, Slack

Press CTRL+F5 if the workflow didn't load.

Learn how to Build this Workflow with AI:

Visit through Desktop for Best experience

2. What This Automation Does

This workflow finds unread emails in Microsoft Outlook and looks for URLs that might be dangerous.

It then sends these URLs to URLScan.io and VirusTotal to check if they are harmful.

After getting the scan results, it sends a summary message to a Slack channel.

This saves time by doing the scanning and alerting automatically.


4. Step-by-Step Guide

Step 1: Setup the Trigger

Add a Schedule Trigger node in n8n to run the workflow at times you want, like every hour.

Or use the Manual Trigger node to start it when needed.

How to configure the schedule trigger

  1. Click on Schedule Trigger node.
  2. Set how often the workflow runs, for example every 60 minutes.
  3. Save the node.

Remember

  1. Make sure the trigger node is active, else the workflow will not run.

Step 2: Fetch Unread Emails from Outlook

Add a Microsoft Outlook node with operation Get All messages.

Use filter isRead eq false to get unread emails.

Connect Microsoft Outlook credentials using OAuth2.

Test the node to see if unread emails load correctly.

Common error to avoid

  1. Not setting OAuth2 credentials properly.
  2. This causes authentication failure, stopping the workflow.

Step 3: Mark Emails as Read

Add a second Microsoft Outlook node set to Update operation.

Use message IDs from fetched emails to mark them as read.

This avoids scanning the same email again.


Step 4: Split Emails into Batches

Add a Split In Batches node.

Set batch size to 1 to process one email at a time.

This makes debugging and processing more controlled.


Step 5: Detect URLs Using Python Code

Add a Code node and choose Python as the language.

Paste the code below to find URLs in email content.

try:
  from ioc_finder import find_iocs
except ImportError:
  import micropip
  await micropip.install("ioc-finder")
  from ioc_finder import find_iocs

text = _input.first().json['body']['content']
iocs = find_iocs(text)

return [{"json": { "domain": item }} for item in iocs["urls"]]

This code uses the ioc-finder library to detect URLs.

Note: The code installs the library if missing, so micropip must be available.


Step 6: Check if URLs Exist

Add an If node to check if URLs were found.

If no URLs, skip scanning and continue to next email batch.


Step 7: Submit URL to URLScan.io

Add a URLScan.io node set to Scan URL.

Pass the URLs found to this node and add your API key.

Set “Continue on Fail” to true to prevent errors stopping the workflow.


Step 8: Submit URL to VirusTotal

Add a HTTP Request node.

Configure it to POST the URL to VirusTotal URL scan endpoint.

Provide the VirusTotal API Key in headers.

This requests VirusTotal to scan the URL.


Step 9: Wait for Results

Add a Wait node.

Set wait time to 60 seconds to allow scan processing.


Step 10: Retrieve URLScan.io Report

Add another URLScan.io node.

Set operation to Get Report using previous scan’s UUID.

This fetches detailed URLScan scan results.


Step 11: Retrieve VirusTotal Report

Add another HTTP Request node.

Retrieve VirusTotal URL report using the scan ID from Step 8.


Step 12: Merge Both Reports

Add a Merge node set to combine by position.

This pairs URLScan and VirusTotal results side by side for the same URL.


Step 13: Filter Non-Empty Results

Add a Filter node.

Only pass URLs with finished scan results to next steps.


Step 14: Send Slack Notification

Add a Slack node.

Compose a message including email subject, sender, and date.

Include scan summaries from both URLScan and VirusTotal.

Send this message to your selected Slack channel to notify your team.


Beginner Step-by-Step: How to Use This Workflow in n8n

Import the Workflow

  1. Download the workflow file using the “Download” button on this page.
  2. Open your n8n editor.
  3. Click on “Import from File” in n8n and select the downloaded file.

Configure Credentials and Settings

  1. Add Microsoft Outlook OAuth2 credentials in n8n credentials manager.
  2. Enter valid API Keys for VirusTotal and URLScan.io in the respective nodes.
  3. Set Slack Bot Token and channel ID in the Slack node to send notifications.
  4. Check or update any IDs, email folders, or any other necessary fields as per your environment.

Test and Activate the Workflow

  1. Manually run the workflow using the Manual Trigger node to verify it works correctly with your data.
  2. Check Slack for the alert messages.
  3. Once confirmed, activate the workflow for scheduled automatic runs.
  4. Adjust the Schedule Trigger frequency to your preferred interval.

If you plan to do self-host n8n, import and configure similarly on your server.


Tools and Services Used

  • Microsoft Outlook: Retrieves unread email messages.
  • URLScan.io: Scans URLs for malicious behavior.
  • VirusTotal: Analyzes URLs for threats.
  • Slack: Sends alerts with scan results.
  • n8n Platform: Runs the automation workflow.

Inputs, Processing, and Outputs

Inputs

  • Unread emails from Microsoft Outlook with email content.
  • URLs extracted from email bodies.

Processing

  • Mark emails as read after fetching.
  • Extract URLs using Python script and ioc-finder.
  • Submit each URL to URLScan.io and VirusTotal for scanning.
  • Wait and retrieve reports from both services.
  • Merge and filter scan results.

Outputs

  • Slack messages with email info and scan summaries for suspicious URLs.

Customization Ideas

  • Replace Microsoft Outlook with Gmail nodes by remapping email fields.
  • Change schedule to run scans more or less often.
  • Add more detail to Slack alerts like malware types.
  • Extract more types of IoCs like IPs or file hashes using the Python code.
  • Send alerts to other platforms such as Microsoft Teams or email.

Troubleshooting Common Problems

Authentication Failed Fetching Emails

Check if Microsoft Outlook OAuth2 tokens are correct and not expired.

Reauthorize or refresh credentials in n8n Credentials Manager.

VirusTotal API Quota Exceeded

Reduce scan frequency or upgrade the VirusTotal plan.

URLScan.io Node Errors

Check network and API key validity.

Enable “Continue on Fail” option to prevent workflow blocking.


Pre-Production Checklist

  • Test Microsoft Outlook credentials fetching unread emails.
  • Verify VirusTotal and URLScan.io API keys work.
  • Run the workflow manually and confirm Slack alert is received.
  • Check Slack channel and bot permission for posting messages.
  • Make sure Python code runs and installs ioc-finder with micropip.

Summary

✓ The workflow finds unread emails and checks URLs for phishing threats.

✓ Uses URLScan.io and VirusTotal for scanning.

✓ Sends scan results automatically to Slack channel.

✓ Saves hours of manual email scanning daily.

→ Helps quickly find dangerous URLs and alerts the security team.

→ Can expand to scan more IoC types and alert platforms.


Frequently Asked Questions

Enter Microsoft Outlook OAuth2 credentials in n8n Credentials Manager and connect it in the Microsoft Outlook nodes.
Yes, each URL scan uses API credits. Adjust scan frequency to avoid hitting limits.
Refresh or reauthorize the Microsoft Outlook OAuth2 credential in n8n credentials.
Yes, replace Microsoft Outlook nodes with Gmail nodes and update relevant field mappings.

Promoted by BULDRR AI

Related Workflows

Automate Viral UGC Video Creation Using n8n + Degaus (Beginner-Friendly Guide)

Learn how to automate viral UGC video creation using n8n, AI prompts, and Degaus. This beginner-friendly guide shows how to import, configure, and run the workflow without technical complexity.
Form Trigger
Google Sheets
Gmail
+37
Free

AI SEO Blog Writer Automation Workflows in n8n

A complete beginner guide to building an AI SEO blog writer automation using n8n.
AI Agent
Google Sheets
httpRequest
+5
Free

Automate CrowdStrike Alerts with VirusTotal, Jira & Slack

This workflow automates processing of CrowdStrike detections by enriching threat data via VirusTotal, creating Jira tickets for incident tracking, and notifying teams on Slack for quick response. Save hours daily by transforming complex threat data into actionable alerts effortlessly.
scheduleTrigger
httpRequest
jira
+5
Free

Automate Telegram Invoices to Notion with AI Summaries & Reports

Save hours on financial tracking by automating invoice extraction from Telegram photos to Notion using Google Gemini AI. This workflow extracts data, records transactions, and generates detailed spending reports with charts sent on schedule via Telegram.
lmChatGoogleGemini
telegramTrigger
notion
+9
Free

Automate Email Replies with n8n and AI-Powered Summarization

Save hours managing your inbox with this n8n workflow that uses IMAP email triggers, AI summarization, and vector search to draft concise replies requiring minimal review. Automate business email processing efficiently with AI guidance and Gmail integration.
emailReadImap
vectorStoreQdrant
emailSend
+12
Free

Automate Email Campaigns Using n8n with Gmail & Google Sheets

This n8n workflow automates personalized email outreach campaigns by integrating Gmail and Google Sheets, saving hours of manual follow-up work and reducing errors in email sequences. It ensures timely follow-ups based on previous email interactions, optimizing communication efficiency.
googleSheets
gmail
code
+5
Free