A canary token is a type of digital trap that alerts you when someone accesses or uses a resource that contains the token.
It can be embedded in various types of files, networks, or systems, and it can help you detect unauthorized or malicious activity on your network or devices.
A canary token works by generating a unique identifier that is associated with your email address and a description of where you placed the token.
When the token is triggered, you will receive an email notification with information about the source and time of the trigger
Here are some places to get canary tokens
Canarytokens.org: A free service provided by Thinkst that generates different types of tokens and provides the back end trip wire logging and recording. You can create tokens for web bugs, DNS queries, AWS keys, Azure certificates, Microsoft documents, credit cards, and more.
Lacework: A commercial product that provides physical and virtual devices that act as honeypots on your network. You can also create canary tokens for files, web bugs, DNS queries, and more and integrate them with your existing security tools.
Thinkst Canary: A commercial product that provides physical and virtual devices that act as honeypots on your network. You can also create canary tokens for files, web bugs, DNS queries, and more and integrate them with your existing security tools.
Canarytokens.net:A free service that lets you create simple web bug tokens that alert you when someone visits a URL. You can also customize the image and text that are displayed when the token is triggered.