Free Plan Available

Tripwire Alerts & Canary Tokens, Modernized

The next generation of canary tokens — more types, richer alerts, protocol honeypots, cloud credentials, and a modern dashboard. Everything you love about canary tokens, supercharged.

What Are Canary Tokens?

Digital tripwires planted where attackers look. When touched, they alert you instantly. No agents, no network changes, no maintenance. The simplest and most reliable way to detect unauthorized access.

Digital Tripwires

Plant tokens where attackers look — documents, config files, credential stores, network services. When touched, they fire. Every alert is a confirmed intrusion.

Zero Maintenance

No agents to install, no network changes required, no software to update. Create a token, plant it, and forget about it until it fires. Truly set-and-forget security.

Instant Alerts

Sub-second notification with full context on every trigger — source IP, geolocation, user agent, request details. Delivered to Slack, email, or any webhook endpoint.

Comparison vs Traditional Tools

See how Tripwires stack up against traditional canary token services and having no detection at all.

Feature Tripwires Traditional Canary Tokens No Detection
Token Types 18+ ~10 0
Protocol Honeypots
Cloud Credentials Limited
Dashboard Modern UI Basic N/A
Alerting Multi-channel Email only N/A
Free Tier N/A

Token Types Overview

18+ token types covering every attack vector — from document access to network scanning to credential theft.

Web Tokens

Hidden URL tracking pixels

DNS Tokens

Unique hostname lookups

Word Documents

Tripwired .docx files

Excel Files

Tripwired spreadsheets

PDF Documents

Tracked PDF files

Shell Scripts

Execution-triggered alerts

JavaScript

Browser-triggered tokens

AWS Credentials

Honeytoken IAM keys

GCP Credentials

Service account keys

Azure Credentials

App registration secrets

QR Codes

Physical security tripwires

Protocol Honeypots

SSH, PostgreSQL, MySQL, Redis

Phishing Detection

Cloned website alerts

Honeypot VMs

Full VM with session recording

Config Files

Tracked configuration files

PostgreSQL Dump

Tripwired database dumps

SSH Keys

Monitored key pair usage

Custom Webhooks

Integrate with any system

Rich Alert Capabilities

Every alert comes packed with context so you can understand the threat and respond immediately. No guesswork.

Source IP + Geolocation

Know exactly where the attacker is connecting from, with city-level accuracy.

User Agent Analysis

Identify the tool, browser, or script used to trigger the token.

Full Request Details

Headers, parameters, timing — everything you need for incident response.

Custom Labels

Tag tokens with custom labels to track which assets or locations are being targeted.

Timeline View

See all triggers in chronological order to understand attack patterns.

Integration Options

Slack, email, and webhooks — route alerts wherever your team works.

Alert: Document Token Triggered
Token Name
board-minutes-2025.docx
Time
2025-03-22 09:14:02 UTC
Token Type
Word Document
Label
finance-share
Source IP
203.0.113.42
Location
London, United Kingdom
User Agent
Microsoft Office Word/16.0 (Windows NT 10.0; x64)
Delivered To
Slack #security Email Webhook

How It Works

Modern canary tokens in three simple steps. Start detecting threats in minutes.

1

Choose Your Token Type

18+ types available for every scenario — documents, credentials, honeypots, scripts, QR codes, and more.

2

Plant Where Attackers Look

Drop tokens in file shares, config files, code repos, network segments, credential stores — anywhere valuable.

3

Get Rich Alerts

IP, user agent, geolocation, timing — every detail you need, delivered instantly to Slack, email, or webhook.

Upgrade Your Canary Tokens

Start with the free plan and experience next-generation deception security. More types, richer alerts, better dashboard.