Webhooks notify your application in real-time when events happen — payments, subscription changes, refunds, and more.
To activate webhooks for your account, within your Recurrente account, go to:
Settings → Developers and API.
There click on “Webhooks”, and continue to add the endpoint where you want the requests to be sent.
Webhooks are not sent for checkouts created with test keys (pk_test_* / sk_test_*). In test mode, payments with the 4242 4242 4242 4242 card are approved directly without going through the full processing flow, so no webhook events are generated.
To test your webhook integration end-to-end, you need to use production keys (pk_live_* / sk_live_*) with a real card.
Recurrente sends webhooks for the following events:
Emitted with a successful card charge (credit or debit). The funds are already in your Recurrente balance.
For in-person payments (POS, mobile POS, and stablecoins), this webhook is sent after the cashier completes the customer data collection step (NIT, phone, email), so that the payload includes the full customer information. This typically adds a few seconds of delay after the payment itself.
Example response:
Failed card charge.
Example response:
If the product is recurring, this event is emitted in addition to payment.succeeded with the subscription information.
Example response:
Emitted when a subscription’s automatic charge fails for the first time.
Note: In a subscription, when a payment fails, Recurrente attempts to charge it again 3 and 5 days later. If both retry attempts fail, the subscription is canceled at that time.
Emitted when a subscription is paused. A paused subscription will not be charged again until it is reactivated.
Emitted when a subscription’s automatic charge fails for the third time.
Note: In a subscription, when a payment fails, Recurrente attempts to charge it again 3 and 5 days later. If both retry attempts fail, the subscription is canceled at that time.
Emitted when a bank transfer charge is initiated. As soon as the money is received in the account, bank_transfer_intent.succeeded will be emitted. Otherwise, bank_transfer_intent.failed will be emitted.
Emitted with a successful bank transfer charge. The funds are already in your Recurrente balance.
Emitted with a failed bank transfer charge. This happens when the funds are not received in the bank account, or the wrong amount is received.
Emitted when a subscription with a trial period is successfully initiated. Also emitted when a card is tokenized without charging it.
Emitted when a card cannot be tokenized without charging it. This happens when the first payment of a subscription with a trial period fails.
Emitted with a successful charge paid using the customer’s Recurrente balance. The funds are already in your Recurrente balance. This event is delivered to the merchant account (the account that received the payment).
Emitted to the payer account (the account whose balance was debited) when it successfully pays a checkout using its Recurrente balance. You only receive it if the payer account has a webhook endpoint configured.
Note: a single balance-paid charge triggers two independent webhook deliveries: balance_intent.succeeded to the merchant and balance_intent.paid to the payer. The payload follows the same shape as bank_transfer_intent.succeeded (includes checkout, payment, customer, amount_in_cents, currency, product, tax_invoice_url).
Each webhook POST includes a JSON body with the event data. The structure varies by event type.
If your endpoint doesn’t respond with a 2xx code, Recurrente will retry sending the webhook:
Every webhook sent by Recurrente includes a signature so you can verify it’s authentic and hasn’t been tampered with. We strongly recommend verifying signatures in production.
Each webhook endpoint has a unique signing secret. You can find it in the Svix dashboard — accessible from Settings → Developers and API → Webhooks in your Recurrente account. The secret looks like whsec_MfKQ9r8GKYqrTwjUPD8ILPZIo2LaLaSw.
The easiest way to verify signatures is using the Svix webhook verification libraries, available for many languages:
You must use the raw request body when verifying webhooks. Parsing the JSON and re-serializing it will break the signature verification.
Each webhook request includes three headers:
Step 1. Construct the signed content by concatenating the svix-id, svix-timestamp, and the raw request body, separated by dots:
Step 2. Decode the base64 portion of your signing secret (everything after whsec_) and use it as the key for an HMAC-SHA256 hash of the signed content:
Step 3. Compare your computed signature with the one in the svix-signature header. The header value is prefixed with v1, — strip that prefix before comparing. Use a constant-time comparison to prevent timing attacks.
Step 4. Optionally, verify that the svix-timestamp is within a few minutes of your server’s current time to prevent replay attacks.