Webhooks

View as Markdown

ShipBob webhooks automatically notify your app when key events occur, allowing you to keep your data in sync.

Getting Started

1

Subscribe to webhooks

Create a webhook to subscribe to an event and define a subscription URL.

2

Receive Webhook Events

When the event occurs, ShipBob sends a POST request to your subscription URL with relevant data.

3

Acknowledge Receipt

Your system should return a 2XX response to confirm successful receipt.

4

Handle Retries

If no 2XX response is received, ShipBob retries delivery using an exponential backoff strategy.


Key Concepts

  • Subscription: A request to receive webhook notifications at a specified URL.
  • Subscription URL: The endpoint where webhook data is sent.
  • Event: A trigger that generates webhook data (e.g., an order being shipped).
  • Topic: The category of event data being sent.
  • Payload: The actual event data sent in the webhook.
  • Response: A 2XX HTTP response is required to confirm webhook receipt.

Common Use Cases

  • Real-time Order Tracking - Receive order.shipped and order.shipment.delivered events to provide live tracking updates to customers.
  • Inventory Management - Monitor order.shipment.exception events to detect and respond to stock shortages.
  • Return completed notifications - Use return.completed events to update your system when a return has successfully been processed and completed by ShipBob.

Webhook Topics & Events

TopicsDescriptionScopes Required
order.shippedFires when a shipping label is purchased and printed. If the order is split into multiple shipments, this fires when all the labels in the shipments have been printed.orders_read
order.shipment.deliveredFires when a shipment is delivered to the customer.orders_read or fulfillments_read
order.shipment.exceptionFires when a shipment is moved to exception status (e.g., out-of-stock items).orders_read or fulfillments_read
order.shipment.on_holdFires when a shipment moves to On-Hold status due to missing information (e.g., address issue, payment issue).orders_read or fulfillments_read
order.shipment.cancelledFires when a shipment is canceled. Does not fire for orders manually created on the dashboard.orders_read or fulfillments_read
return.createdFires when a return is created.returns_read
return.updatedFires when a return is updated.returns_read
return.completedFires when a return is completed.returns_read
Topic (1.0, 2.0)DescriptionScopes Required
order_shippedFires when a shipping label is purchased and printed. If the order is split into multiple shipments, this fires when all the labels in the shipments have been printed.orders_read
shipment_deliveredFires when a shipment is delivered to the customer.orders_read or fulfillments_read
shipment_exceptionFires when a shipment is moved to exception status (e.g., out-of-stock items).orders_read or fulfillments_read
shipment_onholdFires when a shipment moves to On-Hold status due to missing information (e.g., address issue, payment issue).orders_read or fulfillments_read
shipment_cancelledFires when a shipment is canceled. Does not fire for orders manually created on the dashboard.orders_read or fulfillments_read

Webhook Headers

ShipBob sends webhook notifications with the following headers:

1{
2 "x-webhook-topic": "order.shipment.on_hold",
3 "webhook-timestamp": "1755884852",
4 "webhook-signature": "v1,5BO0uMAu1XYGkAJOpZb0Piel11YaChVEZCpXY6mwUMA",
5 "webhook-id": "msg_31eW7bWRi16lL0Ajjik68kfyeUh",
6 "content-type": "application/json"
7}
1{
2 "shipbob-subscription-id": "1582",
3 "shipbob-topic": "order_shipped",
4 "content-type": "application/json"
5}

Verifying Signatures

Each webhook call includes three headers used for verification:

  • webhook-id: The unique message identifier for the webhook message. This identifier is unique across all messages, but will be the same when the same webhook is being resent (e.g. due to a previous failure)
  • webhook-timestamp: Unix timestamp in seconds (seconds since epoch).
  • webhook-signature: A space-delimited list of signatures, where each signature value is base64-encoded and may include a version prefix.

Constructing the signed content

The content to sign is composed by concatenating the id, timestamp and payload, separated by the full-stop character (.). In code, it will look something like:

1const signedContent = `${webhook_id}.${webhook_timestamp}.${body}`;

Where body is the raw request body. The signature is sensitive to any changes, so even a small change in the body will cause the signature to be completely different. This means that you should not change the body in any way before verifying.

Determining the expected signature

ShipBob uses HMAC with SHA-256 to sign the webhooks.

To calculate the expected signature, you should HMAC the signed_content from above using the base64-decoded bytes of your signing secret as the key. Specifically, take the portion after the whsec_ prefix, base64-decode it, and use the decoded bytes as the HMAC key. For example, given the secret whsec_MfKQ9r8GKYqrTwjUPD8ILPZIo2LaLaSw, you would base64-decode MfKQ9r8GKYqrTwjUPD8ILPZIo2LaLaSw and use the resulting bytes as the key.

For example, this is how you can decode the secret and calculate the signature in Node.js:

1const crypto = require('crypto');
2
3const signedContent = `${webhook_id}.${webhook_timestamp}.${body}`;
4const secret = "whsec_5WbX5kEWLlfzsGNjH64I8lOOqUB6e8FH";
5
6// Take the portion after `whsec_`, base64-decode it, and use the resulting bytes as the HMAC key.
7const decodedSecret = Buffer.from(secret.split('_')[1], "base64");
8
9const signature = crypto
10 .createHmac('sha256', decodedSecret)
11 .update(signedContent)
12 .digest('base64');
13
14console.log(signature);

This generated signature should match one of the signatures sent in the webhook-signature header.

Understanding the webhook-signature header

The webhook-signature header is composed of a list of space-delimited signatures and their corresponding version identifiers. The signature list is most commonly of length one, though there could be any number of signatures. For example:

v1,g0hM9SsE+OTPJTGt/tmIKtSyZlE3uFJELVlNIOLJ1OE=

Be sure to remove the version prefix (e.g. v1,) before verifying the signature.

Security Note: It is recommended to use a constant-time string comparison method in order to prevent timing attacks.


Webhook Payloads

The best way to see examples of webhook payloads is to create a webhook in the ShipBob Dashboard by going to:
Integrations → Webhooks → Create new subscription.

  1. Add your subscription URL — this is the endpoint on your server where ShipBob will send the webhook data.
  2. Select a topic — choose an event type such as order.shipped or return.completed.
  3. Click “Send example” — ShipBob will immediately send a sample JSON payload to your URL so you can preview the structure.

This approach makes it easy to test your integration, validate your endpoint, and understand the exact payload format without waiting for a real event to occur.

Webhooks payloads

Retry Schedule

Each message is attempted based on the following schedule, where each period is started following the failure of the preceding attempt: 

  • Immediately 
  • 5 seconds 
  • 5 minutes 
  • 30 minutes 
  • 2 hours 
  • 5 hours 
  • 10 hours 
  • 10 hours (in addition to the previous) 

If an endpoint is removed or disabled delivery attempts to the endpoint will be disabled as well. 

For example, an attempt that fails three times before eventually succeeding will be delivered roughly 35 minutes and 5 seconds following the first attempt. 

Indicating successful delivery 

The way to indicate that a webhook has been processed is by returning a 2xx (status code 200-299) response to the webhook message within a reasonable time-frame (15s). Any other status code, including 3xx redirects are treated as failures. 

Failed delivery handling 

After the conclusion of the above attempts the message will be marked as Failed for this endpoint, and the webhook sender’s account will get email notification for notifying them of this error. 

Manual retries 

You can also use the application portal to manually retry each message at any time, or automatically retry (“Recover”) all failed messages starting from a given date.

Webhooks Manual Retries Pn

Disabling failing endpoints

If all attempts to a specific endpoint fail for a period of 5 days, the endpoint will be disabled and an email will be sent to the account owner. The clock only starts after multiple deliveries fail within a 24-hour span, with at least 12 hours difference between the first and the last failure.


Static Source IP Addresses

In case your webhook receiving endpoint is behind a firewall or NAT, you may need to allow traffic from static IP addresses.

This is the full list of IP addresses that webhooks may originate from.

44.228.126.217
50.112.21.217
52.24.126.164
54.148.139.208
2600:1f24:64:8000::/56

Best Practices

Use HTTPS - Subscription URLs must support SSL. Use RequestBin for testing if needed.

Implement Redundancy - Webhooks may be delayed or lost. Use GET endpoints to periodically reconcile data.

Retry Handling - Events may arrive out of order due to retries—handle them as independent updates.

Use Idempotency - Store webhook event ids and discard duplicates to prevent redundant processing.

Logging & Monitoring - Log webhook requests and responses to diagnose issues.


Troubleshooting Guide

Yes, you can view webhook logs in the ShipBob dashboard by going to Integrations > Webhooks. Then, click into your webhook and you will be able to see logs at the bottom of the page.

Tracking received webhook

  • Ensure your subscription URL is correct and publicly accessible.
  • Confirm your app returns a 2XX response to ShipBob’s POST request.
  • Verify that your app has the correct webhooks_read or webhooks_write permissions.
  • Ensure your system processes events efficiently and responds within 5 seconds.
  • Return a 2XX response before doing heavy processing.
  • Use timestamps from the payload to sort events properly.
  • Handle events individually, rather than relying on strict order.
  • Webhooks are not guaranteed to be sent only once.
  • Implement idempotency checks: Store received event IDs and ignore duplicates.