What counts as a tracked invoice?
Any invoice you send through InvoiceProof. Drafts you save but haven't sent don't count toward your monthly limit.
How does IP logging work?
When your client opens the invoice link, our server records their IP address and the exact time. This happens automatically. Your client does not need to do anything. The IP address is logged with each view, so if they open it multiple times you will see each event separately.
What is a tamper-evident audit trail?
Every event on an invoice (created, sent, opened, signed, paid) is stored with a SHA-256 hash that includes the hash of the previous event. This creates a chain where any retroactive change to a record breaks the chain and becomes detectable. It's the same principle used in blockchain, applied to invoice tracking.
What is a Chain of Custody document?
It's a formatted document showing every event on an invoice in sequence: timestamps, IP addresses, hashes, and any signatures. It's designed to be attached to a demand letter or presented in small claims court or mediation. Export it from the invoice list by clicking "Export PDF."
Can my client see that they're being tracked?
Yes. The invoice page displays a notice that the session is being logged by InvoiceProof. Transparency is both the ethical approach and part of what makes the record credible. A client who knows their open was logged is less likely to later claim they never received it.
What is public hash verification?
Every Chain of Custody document includes a public URL at invoiceproof.io/verify/[hash]. Anyone (a lawyer, a mediator, a judge) can visit that URL and independently confirm that the document hasn't been altered, without needing to trust InvoiceProof's word.
Do my clients need to install anything?
No. Your client receives an email with a link. They click it and view the invoice in their browser. No account, no app, no download required on their end.