Hooklistener is a complete webhook toolkit for developers that combines various tools for capturing, inspecting, and forwarding webhooks.

12sub-processors
HeadquartersSan Francisco, United States
Founded2019
Size51-200
MarketB2B
PublicPrivate
ProductsDebug Endpoints, Webhook Monitors, Email Inboxes, CLI Tool, MCP Server

All Sub-Processors

NameCategory
AppSignalAnalytics & Monitoring
Brevo (Sendinblue)Communication
CloudflareCloud Infrastructure
GitHub (Microsoft)Security & Identity
GoogleSecurity & Identity
HetznerCloud Infrastructure
PlanetScaleCloud Infrastructure
PostHogAnalytics & Monitoring
RedditAnalytics & Monitoring
StripePayments & Billing
TelegramCommunication
Typeform

Data Processing Locations

US (EU-US DPF certified)
4 sub-processors
EU (Netherlands)
1 sub-processor
EU (France)
1 sub-processor
Global (EU-adequate)
1 sub-processor
EU (Germany/Finland)
1 sub-processor
EU (Frankfurt)
1 sub-processor
EU
1 sub-processor
Global
1 sub-processor

Frequently Asked Questions

How many sub-processors does Hooklistener use?
Hooklistener uses 12 sub-processors (third-party data processors) as disclosed on their public sub-processor page.
What are Hooklistener's main sub-processors?
Hooklistener's sub-processors include AppSignal (Application performance monitoring and error tracking), Brevo (Sendinblue) (Email delivery and marketing automation), Cloudflare (CDN, DDoS protection, and website hosting), GitHub (Microsoft) (Authentication (OAuth)), Google (Authentication (OAuth)), and 7 more.
Where does Hooklistener process data?
Hooklistener's sub-processors are located in US (EU-US DPF certified), EU (Netherlands), EU (France), Global (EU-adequate), EU (Germany/Finland), EU (Frankfurt), EU, Global.