Localhost to HTTPS in seconds

One SSH command. Zero config. Three-word domains.

$ ssh -R 443:localhost:3000 ssh.p0rt.xyz

Your app is now live at:

whale-guitar-fox.p0rt.xyz

✨ Open Access Mode

P0rt is open to everyone! Any SSH key can create tunnels instantly.

No registration required. Just run the SSH command and start tunneling.

Instant

🔒

Secure

🎯

Persistent

Why developers love P0rt

🧠 Smart Domain Generation

Your SSH key fingerprint generates a unique three-word domain. Always get the same domain with the same key.

SSH Key → SHA256 → 3 Words
304 million unique combinations

🛡️ Enterprise-Grade Security

End-to-end encryption with SSH. Automatic HTTPS with valid certificates. Advanced abuse prevention and forensic tracking for enterprise compliance.

Security Headers for Traceability:
X-P0rt-Fingerprint: SHA256:abc123...
X-P0rt-Origin: 192.168.1.100
✓ SSH Encrypted ✓ HTTPS Ready ✓ Abuse Reporting ✓ Forensic Tracking ✓ IP Traceability ✓ Auto Domain Banning

⚡ Built for Speed

Written in Go for blazing fast performance. Handles thousands of concurrent connections with minimal resource usage.

< 50ms
Latency
99.9%
Uptime

🔄 Live Connection Monitoring

See real-time connections directly in your SSH terminal. Know who's accessing your tunnel and when.

[15:04:05] 192.168.1.100 /api/users
[15:04:12] 10.0.0.5 /dashboard

🚨 Advanced Anti-Abuse System

Built-in protection and forensic capabilities to maintain service quality and security compliance.

📝 Community Reporting

Public reporting endpoint allows users to report malicious domains. Automated review and blocking system.

POST /report-abuse
→ Admin review → Domain blocking

🔍 Forensic Tracking

Every HTTP response includes traceability headers linking requests to SSH users for security investigations.

X-P0rt-Fingerprint: SHA256:user-key
X-P0rt-Origin: source-ip

🛡️ Automated Protection

Real-time IP banning, rate limiting, and domain filtering. Malicious traffic is blocked before it reaches your application.

• IP Blacklisting • Rate Limiting • DDoS Protection

📊 Admin Dashboard

Comprehensive abuse report management, security analytics, and incident response tools for administrators.

./p0rt abuse list
./p0rt security stats

Get online in 3 steps

1

Run SSH Command

ssh -R 443:localhost:3000 ssh.p0rt.xyz

Point P0rt to your local development server

2

Get Your Domain

whale-guitar-fox.p0rt.xyz
Generated from your SSH key

Instantly receive a memorable HTTPS domain

3

Share & Monitor

[15:04:05] 192.168.1.100 /api/users
[15:04:12] 10.0.0.5 /dashboard

Watch real-time traffic in your terminal

Common Questions

What makes P0rt different?

P0rt focuses on simplicity and developer experience. Three-word domains are memorable, real-time monitoring shows you exactly who's using your tunnel, and everything works with just SSH - no additional tools required.

Is this production-ready?

P0rt is perfect for development, demos, and sharing prototypes. For production workloads, consider running your own instance or using dedicated infrastructure.

How do I monitor connections?

Connection logs appear directly in your SSH terminal in real-time. See visitor IPs, user agents, and timestamps without leaving your terminal.

How do you prevent abuse?

P0rt includes automated security monitoring for phishing, spam, and scam patterns. Suspicious domains are automatically blocked. Rate limiting prevents excessive use. Report abuse here.