HTTP(S)
Checks the expected status (200, 301, etc.) within the timeout. On HTTPS targets, watches the SSL certificate and warns 30 days before expiry.
Homepage, REST API, admin panel, payment webhook.
Sentinela Uptime
Checks from our infrastructure in Brazil, with a configurable interval from 1 minute. Seven observation modes covering HTTP, keyword, ping, port, push, DNS and Vercel error logs. Alerts in seconds via the channels you choose.
No card to start · 5 monitors free forever · 2-minute setup
Check types
Six in pull mode (Sentinela fetches the target) and one in push mode (the target pings us — for internal jobs with no exposed HTTP).
Checks the expected status (200, 301, etc.) within the timeout. On HTTPS targets, watches the SSL certificate and warns 30 days before expiry.
Homepage, REST API, admin panel, payment webhook.
Extends HTTP by matching (or negating) a keyword in the response body.
Detect an error page that returns 200, an unscheduled maintenance banner, defacement.
Sends an echo packet to a host and measures response time.
Server with no exposed HTTP, gateway, network device.
Opens a socket on a specific port. For services that don’t speak HTTP.
SSH (22), SMTP (25), MySQL (3306), Redis (6379).
Inverts the flow: your cron/worker pings a unique URL. No ping within the interval (with 2x grace) — goes DOWN.
Nightly backup, data sync, queue worker, internal job with no exposed HTTP.
Resolves the host’s A record. UP if ≥1 address comes back. Detects a lost zone and slow propagation without HTTP.
Confirm resolution after an NS change, validate a client’s external zone.
Queries the official Vercel API on every check. Goes DOWN when the production deploy fails or runtime errors exceed the threshold you set (0 = any new error).
Next.js/serverless app on Vercel: catch a broken deploy or a runtime-exception spike before the customer complains.
Notifications
Each monitor can fire to several channels at once. Configure once, reuse everywhere.
Default for everyone. Clean look, direct link to the incident. Multiple recipients per channel.
JSON with full payload. Customizable headers. Connect with n8n, Zapier, or your own system.
Official bot. Set up in 30s by pasting the chat ID. Great for a phone alert without an extra app.
Rich message in the team channel, color by severity. Official Slack webhook.
Colored embed in the server. Ideal for teams already living on Discord.
Creates a PagerDuty incident when the monitor goes down. Auto-resolves when it comes back. For serious on-call.
Same model as PagerDuty: creates an alert on downtime, resolves on recovery. For Atlassian teams.
Opens an issue in your project when the monitor goes down; comments and transitions it to Done when it recovers. Token or OAuth. The same channel turns Security findings into tickets.
The Test channel button fires a real notification, without having to take anything down on purpose. The same channels apply to Security Audit notifications.
Public status page
Every incident tells a story. Your status page tells the whole story — what went down, when it came back, and the uptime over the last 30, 60 or 90 days.
status.seudominio.com on higher plans)/api/status/{slug}/feed.rssexemplo.com.br
operationalUptime 90 days
99.91% over the last 90 days · 4 incidents
Maintenance windows
Going to take the API down at 3 AM Saturday to run a migration? Create a window and:
Auto-pause
A client cancelled and nobody told you. The domain has been down for days and your dashboard turns into visual noise. Configure a window in hours — if the incident stays open beyond that, the monitor pauses automatically.
Latency
Average time lies. When you look at p95, you see how long the tenth-worst user waited. p99 is the worst in 100. Sentinela computes it automatically over all UP checks in the interval and compares week over week with a trend indicator.
api.exemplo.com.br
last 7 days · 10,080 samples
p50
124ms
↓ -8%
p95
487ms
↓ -12%
p99
1.2s
↑ +6%
Samples
10k
Comparison
| Sentinela | UptimeRobot | StatusCake | Better Stack | |
|---|---|---|---|---|
| Minimum interval | 1 min | 5 min (free) / 1 min | 1 min | 30 s |
| Localized (PT-br native) | ✓ | — | — | — |
| Payment in BRL | ✓ | — | — | — |
| Hosted in Brazil | ✓ | — | — | — |
| Includes security audit | ✓ | — | — | — |
| Public status page | ✓ | ✓ | ✓ | ✓ |
Each product has its strength — pick the one that fits your case. Comparison based on the public plans of the respective platforms.
For technical teams
Auth via Sanctum. Read monitors, checks, incidents. Business+ plan has write access.
Versioned payload. Customizable headers. Exponential retry until confirmation.
Global scope at the database — each user only sees what’s theirs, guaranteed in the query.
On every plan. Compatible with Google Authenticator, 1Password, Authy.
Trail of login, lockout, CRUD on monitor/channel — exportable on the Business plan.
Check history of each monitor in CSV via the UI or a dedicated endpoint.
FAQ — uptime
Depends on the configured interval. On the Pro plan, a check every 1 min — the alert goes out within 60s after confirmation. We confirm with a retry before opening an incident, to avoid a false alarm from 1 isolated failure.
Currently from Brazil (São Paulo). Multi-region is on the roadmap.
Not directly — we’re an external observer. But the Heartbeat (push) monitor covers exactly that case: your internal cron pings a unique Sentinela URL, and a missing ping turns DOWN.
No. Webhook has no cost per event. You pay for the plan, not per call.
Yes. By default we confirm with a retry; on very sensitive monitors you can raise the number of consecutive failures needed to open an incident.
You connect a read token and the Project ID. On every check we query the official Vercel API: if the production deploy fails or runtime errors exceed the threshold you set (0 = any new error), it opens an incident and fires the same alert channels. The token is encrypted and never displayed after saving.
Also in the same dashboard
48 probes across 6 layers (TLS, headers, WAF, malware, WordPress CVE, privacy — LGPD-BR by default and GDPR opt-in, SPF/DMARC, domain lock + optional SAST/secret scanning/Dockerfile/IaC/GitHub Actions/Vercel API), with score 0–100 and grade A–F. <strong>Unique edge:</strong> your real uptime incidents feed the <strong>Financial Cyber Risk Score in money/year</strong> — exposure = observed downtime cost + incident probability × impact. Only possible with uptime and security on the same platform. <a href="/blog/como-calculamos-risco-financeiro-em-reais" class="underline">How we compute the number</a>.
Start with Free
No card. Move up to Pro (1-min interval + webhooks) when Free gets tight.