Everything you need to know about pricing, licensing,
and how Tracehound works.
A service is a logical application — your API server, your worker process, your webhook handler. If it has its own entry point and runs independently, it's a service. Monoliths count as one service.
No. Replicas of the same service are covered under one license. You pay per logical service, not per instance, pod, or container.
Each microservice that integrates Tracehound counts as one service. If you have 5 microservices using Tracehound, you need 5 licenses. Enterprise tier includes volume discounts.
Request-based pricing creates unpredictable costs and punishes success. Security should not become more expensive when your product grows. Our flat per-service model means no surprise bills.
Yes. The Community tier is free forever for development, testing, and small projects. Upgrade to Pro when you need production features like Evidence Export and Notification API.
Argos is a separate product with its own license. You can use Argos standalone ($49/mo) or as a bundle with Tracehound Pro (+$29/mo). Enterprise tier includes Argos at no additional cost.
Not necessarily. Tracehound handles request-level threats. Argos detects runtime anomalies between requests — event loop stalls, worker drift, scheduling irregularities. They complement each other but solve different problems.
Yes. Argos works as a standalone runtime observer. It emits signals to your existing security infrastructure (SIEM, alerting, etc.) without requiring Tracehound.
Tracehound is designed with a zero-allocation hot path. Critical operations happen synchronously without GC pressure. Evidence collection and export happen asynchronously and never block request handling.
Tracehound uses fail-open semantics by default. If something goes wrong, your application continues to function — we never block your production traffic. This is configurable for high-security environments.
No. WAFs operate at the network edge and filter known attack patterns. Tracehound operates inside your runtime and isolates threats that bypass edge defenses. They work together — WAF is first line, Tracehound is last line.