Hookbase
LoginGet Started Free
Back to Blog
Product Update

Static IP Delivery: Whitelist a Single IP for Webhooks

Hookbase now offers static IP delivery for outbound webhooks. Whitelist one IP address in your firewall and receive all webhook traffic through a dedicated, fixed endpoint.

Hookbase Team
February 27, 2026
5 min read

The Firewall Problem with Webhook Delivery

If you have ever tried to receive webhooks behind a corporate firewall, you know the pain. Your security team asks a simple question: "What IP addresses should we whitelist?" And the answer, for most webhook platforms running on serverless infrastructure, is some variation of "it depends" or "here is a list of 2,000 CIDR ranges that might change."

Cloudflare Workers -- the infrastructure Hookbase runs on -- use a shared IP pool. The IP address that delivers your webhook today might be different tomorrow. For teams with strict network policies, this makes webhook integration either impossible or requires punching holes wide enough to undermine the firewall's purpose.

Today we are releasing Static IP Delivery, a feature that routes all outbound webhook traffic through a single, fixed IP address that you can whitelist once and forget about.

How It Works

When Static IP delivery is enabled for a destination, Hookbase changes the delivery path:

Without Static IP (default): Worker processes delivery -> Sends HTTP request directly from Cloudflare's edge -> Destination receives from unpredictable IP

With Static IP enabled: Worker processes delivery -> Sends request through Cloudflare Tunnel -> Go relay service on dedicated Hetzner server -> Destination receives from fixed IP address

The relay server runs on dedicated infrastructure with a static IP address that does not change. Traffic between the Cloudflare Worker and the relay travels through an encrypted Cloudflare Tunnel -- no ports are exposed on the server, and no traffic touches the public internet between the two.

Authentication and Security

Every request from the Worker to the relay is authenticated with HMAC-SHA256. The relay verifies the signature before forwarding any traffic. This prevents unauthorized use of the static IP endpoint even if someone discovers the tunnel address.

The relay also includes built-in SSRF protection:

  • Private IP ranges blocked -- requests to 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, and other private ranges are rejected
  • Cloud metadata endpoints blocked -- requests to 169.254.169.254 and similar cloud provider metadata URLs are rejected
  • Localhost blocked -- no requests to 127.0.0.0/8 or ::1

These protections ensure that the relay cannot be used to probe internal networks, even if a destination URL is misconfigured or malicious.

Enabling Static IP Delivery

Dashboard

Navigate to your destination or endpoint settings. In the create or edit modal, you will find a Static IP Delivery toggle under the delivery options. It is enabled by default for eligible plans.

Per-Destination Control

Static IP delivery is configured individually for each destination. This gives you flexibility:

  • Enable it for destinations behind corporate firewalls that require IP whitelisting
  • Leave it disabled for destinations that do not need it, keeping deliveries on the faster direct path
  • Mix and match across your organization as needed

Getting Your Static IP

Once you enable the feature, your organization's static IP address is displayed in your dashboard under Settings. Share this IP with your network team for firewall configuration. The IP is fixed and dedicated -- it will not change unless we explicitly notify you.

Architecture Details

For teams that want to understand the infrastructure:

| Component | Detail | |-----------|--------| | Relay Server | Dedicated Hetzner bare-metal server | | Relay Software | Go service with HTTP proxy capabilities | | Tunnel | Cloudflare Tunnel (encrypted, no exposed ports) | | Authentication | HMAC-SHA256 per-request signing | | SSRF Protection | Private IP and metadata endpoint blocking | | IP Stability | Fixed IP bound to dedicated hardware |

The Go relay is intentionally minimal. It receives authenticated requests from the Cloudflare Tunnel, validates the HMAC signature, checks the destination against the SSRF blocklist, and forwards the request. Response headers and body are passed back through the tunnel to the Worker, which records the delivery result as usual.

Because the tunnel is managed by Cloudflare, there are no open ports on the relay server. The only inbound traffic comes through the tunnel itself. This eliminates an entire class of network-level attacks against the relay infrastructure.

Plan Availability

Static IP delivery is available on Pro and Business plans.

| Plan | Static IP Delivery | |------|-------------------| | Free | Not available | | Starter | Not available | | Pro | Available | | Business | Available |

If you are on a Free or Starter plan, you can upgrade from Settings -> Billing to unlock the feature.

Performance Considerations

Adding the relay hop introduces a small amount of additional latency compared to direct delivery from the Cloudflare edge. In practice, this is typically 10-30ms depending on the geographic distance between the nearest Cloudflare data center and the relay server.

For most webhook use cases, this latency is negligible. Webhooks are asynchronous by nature, and the reliability benefits of a whitelistable IP address far outweigh a few milliseconds of additional delivery time.

If latency is critical and your destination does not require IP whitelisting, you can leave Static IP delivery disabled for that destination and benefit from Cloudflare's global edge delivery.

Common Use Cases

Enterprise SaaS integrations. Your customer's IT team requires a static IP before they will open their firewall to receive webhooks from your application. With Hookbase as your delivery layer, you hand them a single IP and move on.

Financial services. Banks and payment processors often mandate IP whitelisting for any inbound HTTP traffic. Static IP delivery lets you route payment webhooks to systems behind these strict network policies.

Healthcare systems. Hospital networks and EHR platforms frequently restrict inbound traffic to known IP addresses. Combined with Hookbase's Transient Mode for payload privacy, Static IP delivery makes healthcare webhook integrations practical.

Government and regulated industries. Agencies with FedRAMP or SOC 2 requirements often need to demonstrate that inbound traffic comes from known, documented sources. A static IP simplifies this compliance documentation.

What's Next

Static IP delivery is the first step in our network infrastructure roadmap. We are exploring dedicated IP pools for Business plan customers, regional IP options for data residency requirements, and IPv6 support.

If you have specific networking requirements for your webhook infrastructure, reach out to us at [email protected].

product-updatestatic-ipfirewallenterprisesecuritywebhooksnetworking

Related Articles

Product Update

Warehouse Destinations: Send Webhooks Directly to S3, R2, GCS, and Azure Blob

Hookbase now supports warehouse destinations. Route webhook events directly to Amazon S3, Cloudflare R2, Google Cloud Storage, or Azure Blob Storage as structured JSONL or JSON files with automatic batching, field mapping, and encrypted credentials.

Product Update

Transient Mode: Process Webhooks Without Storing Payloads

New per-source Transient Mode skips payload storage entirely. Designed for HIPAA, GDPR, and data minimization requirements in webhook pipelines.

Product Update

Introducing the Hookbase Kubernetes Operator

Manage webhook sources, destinations, routes, and tunnels as native Kubernetes CRDs. GitOps-ready with Helm, sidecar injection, and drift detection.

Ready to Try Hookbase?

Start receiving, transforming, and routing webhooks in minutes.

Get Started Free
Hookbase

Reliable webhook infrastructure for modern teams. Built on Cloudflare's global edge network.

Product

  • Features
  • Pricing
  • Use Cases
  • Integrations
  • ngrok Alternative

Resources

  • Documentation
  • API Reference
  • CLI Guide
  • Blog
  • FAQ

Legal

  • Privacy Policy
  • Terms of Service
  • Contact
  • Status

© 2026 Hookbase. All rights reserved.