Quick Start Guide

Create your first tripwire in under 5 minutes and start detecting unauthorized access immediately.

Step 1: Sign In or Create an Account

Navigate to the login page and sign in with your existing account, or create a new one to get started.

Login page

Enter your email and password to access the dashboard.

Login form filled

Just Want to Try It Out?

You can create free document tripwires instantly without signing up. No account required - just provide your email for alerts.

Step 2: Access Your Dashboard

Once logged in, you'll see your dashboard. If this is your first time, it will be empty.

Empty dashboard

Step 3: Create Your First Tripwire

Click the "Create Tripwire" button in the top-right corner to open the creation page.

Create tripwire page

Choose a protocol type for your honeypot. We recommend starting with PostgreSQL as it's one of the most commonly targeted database protocols.

Step 4: Name Your Tripwire

Give your tripwire a descriptive name that helps you identify its purpose. For example:

  • Production Database - For credential files near production systems
  • Backup Server Creds - For backup system configurations
  • Dev Database - For development environment canaries
Naming the tripwire

Step 5: Get Your Credentials

After creation, you'll see the tripwire details page with the generated credentials. These include:

  • Hostname - The honeypot server address
  • Port - The protocol port
  • Username - A unique, randomized username
  • Password - A randomly generated password
Tripwire credentials

Step 6: Plant the Credentials

Now comes the important part: placing these fake credentials where an attacker might find them. Some strategic locations include:

Configuration Files

# config/database.yml (commented as "old production")
# DEPRECATED - DO NOT USE
# production_old:
#   host: pg-abc123.gettripwires.com
#   port: 5432
#   username: prod_user_xK9mP
#   password: Rk47!nQz@9vLm3Wp

Environment Files

# .env.backup (left in repository)
DB_HOST=pg-abc123.gettripwires.com
DB_PORT=5432
DB_USER=prod_user_xK9mP
DB_PASS=Rk47!nQz@9vLm3Wp

Internal Documentation

Add to internal wikis or documentation as "legacy" or "backup" credentials.

Step 7: Monitor for Detections

Return to your dashboard to see all your tripwires. When someone attempts to use the planted credentials, you'll receive an instant alert and the detection will appear in your dashboard.

Dashboard with tripwires

You're All Set!

Your first tripwire is now active. Any connection attempt using these credentials will be logged and trigger an alert. Continue to the Dashboard guide to learn about managing your tripwires.