Zero-Configuration, remote-controlled secure tunnels to your computers.

  • "I want to reach my Linux server behind firewall"
  • "I want to reach my Raspberry Pi behind firewall"
  • "I want to reach my Mac behind firewall"
  • "I want to reach my Windows PC behind firewall"
  • "I have a fleet of IoT devices that I need to maintain"
  • "I want to show my webapp in development to the customer"

The Problems:

You have to maintain a bunch of small-office internal networks with linux servers where their only connection to internet is ASDL or a local ISP without static IP. Maintaining their server is, often, a complicated solution.


You have to access a windows PCs through VNC service but they are behind the firewall and do not have a static or publicly visible IPs


You are a web developer and you would like to test your webhook handlers with paypal/stripe/slack or some other similar service


You have an embedded linux system or Raspberry Pi (or similar) system behind a firewall without static IP.


You have a service (like a web server) on your local computer and you would like to share it with someone.

Some of the solutions include:

  • Dynamic dns services with port forwarding and VNC
  • Virtual private networks
  • SSH forwarding

To an extent, all these solution work, but they all come with their own difficulties. Port forwarding is sometimes not an option, virtual private networking must be carefully planned and configured especially if there are many different networks to connect, and do-it-yourself ssh forwarding requires a dedicated server and maintaining a table of ports and clients.

The Solution:

Instead, offers a simple, secure solution. Your servers can create a reverse ssh tunnel to which you can connect. You can instruct your server to open a tunnel through a simple web interface. Once your server has opened the tunnel you can connect to it as if you were on a local network. We only provide a tunnel endpoint and a web interface to control it, while the tunnel security and tunnel creation is done by your server.

How does it work?

Your server creates a forwarding ssh tunnel to one of our publicly visible forwarding servers. When the tunnel is open you can connect to your ssh server without a vpn, port forwarding or any vnc-like services. It is simple, secure and requires zero configuration.

You can create a tunneled connection in just a few steps:

  1. Open an account on
  2. Upload your public key or create a pair through our app
  3. Download a client script and put it on your server
  4. Run a script and ensure it is started upon reboot
  5. You can now start and stop an ssh tunnel to your server through our web interface
  6. Connect to your server through your tunnel

Is it secure?

The tunnel is encrypted using your own private/public key pairs and even if an attacker somehow manages to break into the forwarding server, there'd be nothing to see. Your server is still protected by your password and your public key combination. Furthermore, the tunnels are automatically closed if not used for a period of time. For further information on security check our FAQ.

Why choose us?

Besides ours, there are other solutions out there, paid and free.

This is how we differ:

  • Transparent: You do not need to put third-party applications or binary executables of unknown content on your server. Instead, it only uses the already supplied tools that are already on your server - just a plain and simple python script whose only task is to start and stop ssh tunnel upon request. If you don't like it you can even replace it and use your own.
  • Private: The tunnel is encrypted using your own private/public key combination.
  • Cheap: The price of 10-client licence is less than two coffees a month
  • Portable: It works with Windows (7, Vista, 8, 10), Mac OS X and with all major Linux distributions, including:

    But, since it uses only the standard tools that are already installed on all Linux distributions, it should work with any Linux distribution.

  • Small: Our python script supports dropbear SSH clients for computers with low memory and processor resources.