Free Plan

Know When Sensitive Files Are Accessed

Plant realistic documents across your infrastructure — config files, database exports, credential sheets. When anyone opens them, you get an instant alert with their IP address and user agent.

Supported Document Types

Word Documents

.docx files with embedded tracking. Indistinguishable from real documents.

Excel Spreadsheets

.xlsx files that phone home when opened. Perfect for financial decoys.

PDF Files

PDF documents that alert on open. Use for contracts, reports, policies.

Config Files

YAML, JSON, TOML, .env — any text-based config format with embedded tripwire URLs.

SQL Dumps

Database export files that trigger when accessed. Detect backup theft.

Custom Formats

Upload any file type. We'll embed tracking that fires when the file is opened or downloaded.

Where to Plant

Strategic placement for maximum detection coverage.

Cloud Storage Buckets

S3, GCS, Azure Blob — place alongside real data for maximum believability.

Internal File Shares

Network drives and shared folders employees browse daily.

Code Repositories

Config files and credential templates in private repos.

Backup Directories

Database dumps and system backups that shouldn't be accessed.

Database Dump Locations

Export directories where sensitive data is staged.

Documentation Sites

Internal wikis and knowledge bases with sensitive-looking files.

What Gets Captured

Full forensic data on every access.

IP Address with Geolocation

Know exactly where the access came from, with city-level precision.

Full User Agent String

Browser, OS, version — identify the exact device used.

Referrer URL

How they found the file — direct access, search, or internal link.

Exact Access Timestamp

Millisecond-precise timing for correlation with other events.

Custom Metadata & Labels

Tag tripwires by department, sensitivity level, or location for easy filtering.

Alert: Sensitive File Accessed
File Name
kubeconfig.yaml
Time
2026-03-22 08:15:33 UTC
Source IP
203.0.113.42
Location
São Paulo, Brazil
User Agent
curl/7.88.1
Referrer URL
Direct access — no referrer

Real-World Scenarios

Detect Unauthorized Database Access

Plant tripwire SQL dumps in backup directories. Know immediately when someone accesses production data exports.

Monitor Backup File Security

Place decoy backups alongside real ones. Catch unauthorized access to your backup infrastructure.

Track Config File Exposure

Embed tripwires in config files. Detect when kubeconfig, .env, or database.yml files are accessed.

Audit Document Access

Place decoy contracts, financial reports, and HR documents. Create a verifiable access audit trail.

Supply Chain Monitoring

Plant tripwire files in shared repositories and vendor-accessible storage. Detect third-party snooping.

How It Works

1

Generate Tripwire Document

Choose your file type and give it a realistic filename. We create a document with invisible tracking embedded.

2

Place in Sensitive Locations

Drop the file in cloud storage, shared drives, repos, or backup directories — anywhere you want to monitor.

3

Get Alerted When Opened

The moment anyone opens or downloads the file, you get a full access report with IP, user agent, and timing.

Protect Your Sensitive Files

Document tripwires are free on all plans. Start monitoring file access in minutes.