iOS, Android & Web

Be Prepared.

Fake files. Real alerts. Scout drops decoy documents into your cloud storage. When they're opened, you get an instant alert.

From $9/mo. Set up in under 2 minutes. Cancel anytime.

Word, Excel, PDF, QR, URLs & more|Cloud Storage|Alerts in seconds
Token Triggered14 seconds ago
TokenBoard-Pack-Q4-2026.pdf
TypePDF Document
Source IP198.51.100.42
LocationWarsaw, Poland
NetworkVPN / DigitalOcean
BrowserFirefox 128 / Linux
Planted inGoogle Drive / Board / Finance
View Full Alert
View Playbook
Critical Severity
Push sent to 2 devices
The concept

Fake files. Real protection.

Scout creates realistic decoy documents and drops them into your Cloud Storage. When someone accesses a decoy, you get an instant alert.

Plant

Create decoy Word docs, PDFs, spreadsheets, or tracking links. Scout plants them directly into your Cloud Storage.

Detect

When someone opens a decoy file, clicks a tracked link, or looks up a DNS record, Scout captures everything. They don't know you know.

Respond

Get a push notification with source IP, country, city, browser, ISP, and VPN/Tor detection. Plus a step-by-step response playbook.

How it works

Deployed in 60 seconds.
Alerts in under 5.

1

Pick a token type

Word doc, DNS record, QR code, database creds. 17 types to choose from.

2

Plant it where intruders look

Scout connects to your Cloud Storage and drops the decoy directly.

3

Get alerted with forensics

Push notification: who accessed it, from which IP, what country, exact timestamp.

Token Triggered
Tokensalary-data-2026.xlsx
TypeExcel Document
Source IP198.51.100.42
LocationMoscow, Russia
Time2 seconds ago
Planted inGoogle Drive / Shared / HR
Token types

A decoy for every scenario

Drop realistic-looking files into your cloud storage. Each one is a silent alarm.

Word Doc

Excel Sheet

PDF

QR Code

Web URL

DNS Record

Need more? The Infrastructure Pack adds 6 extra token types for configs, credentials & code.+$5/mo

Features

From personal security to enterprise SOC

Auto-plant to cloud storage

Connect Google Drive, OneDrive, Dropbox. Scout plants decoy files directly into your chosen folders.

Push alerts in seconds

Real-time push notifications on iOS and Android. Source IP, geolocation, and device info instantly.

Email draft planting

Plant canary tokens as Gmail or Outlook email drafts with embedded tracking pixels.

Enterprise SSO

Sign in with Microsoft Entra ID. Link your Azure AD tenant for automatic team provisioning.

Incident correlation

Multiple tokens from same IP? Scout auto-escalates severity. Lateral movement detected.

Self-hosted canary engine

Your canary tokens run on Scout's infrastructure. No third-party dependencies. Full control over your data.

Built-in playbooks

Know exactly what to do when a token triggers

Every activation comes with step-by-step recommended actions based on the token type and severity. No security expertise required.

Critical Severity

Database credentials, API keys, VPN configs

1

Rotate all credentials

Change passwords and API keys for the affected service immediately.

2

Block the source IP

Add the attacker's IP to your firewall deny list.

3

Scan for malware

Run a full security scan on systems that had access.

4

Check for lateral movement

If multiple tokens triggered, the attacker may be moving through your network.

5

Escalate to your security team

This is a critical incident. Notify immediately.

High Severity

Documents, DNS records, email addresses

1

Identify who has access

Check sharing settings on the folder where the token was planted.

2

Change sensitive credentials

If the decoy file looked like real credentials, change the real ones.

3

Review access logs

Check Google Drive or OneDrive activity for download events.

4

Enable 2FA everywhere

Turn on two-factor authentication on all affected accounts.

Medium Severity

Web URLs, QR codes, redirect links

1

Identify the source

Check the IP and geolocation. Does it match a known user?

2

Review shared links

Check if the document or link was shared outside your org.

3

Revoke shared access

Remove public or shared links from your cloud storage.

4

Monitor for patterns

Watch for repeated activations from the same IP address.

Playbooks are shown automatically when a token triggers. Available on all plans.

Built for real security scenarios

From protecting source files to detecting lateral movement in enterprise networks.

Detect credential theft

Plant decoy credentials in config files, repos, and build systems. Know instantly when someone tries to use them.

Protect cloud storage

Drop tripwire documents into Google Drive, OneDrive, and SharePoint. Get alerted when sensitive-looking files are opened or downloaded.

Catch insider access

Place canary tokens around executive files, finance folders, and privileged systems. Surface unauthorized access before damage is done.

Pricing

One plan. Everything included.

No tiers. No feature gates. Full power from day one.

Scout

For everyone

$9/month

or $84/year (save 22%)

  • 15 canary tokens
  • 6 token types (Word, Excel, PDF, QR, URL, DNS)
  • 5 connected cloud services
  • Auto-plant to Cloud Storage
  • Full forensics (30+ data points)
  • Push + email alerts
  • IP whitelisting
  • Incident playbooks
  • iOS & Android apps
  • 30-day activation history

Need more coverage?

+$5/mo — Infrastructure Pack: 6 extra token types for configs, credentials & code

Scout for Business

For teams & enterprises

Custom
  • Unlimited tokens
  • All token types + custom
  • Unlimited cloud services + API
  • Full forensics + SIEM export
  • Webhook, Slack, Teams, Sentinel alerts
  • Multi-seat with RBAC
  • Microsoft Entra ID SSO
  • Dedicated canary domains
  • Bring Your Own Domain (BYOD)
  • 1-year activation history
  • Audit logs for compliance
  • Dedicated support + SLA
Contact Sales

Cancel anytime. No long-term contracts.

Plant your first token in under 2 minutes

Know the moment someone accesses your sensitive files, credentials, or cloud storage.

Get Started

$9/month. Cancel anytime.