About Periscope
Secure tunneling for teams that need visibility and control — every request logged, every action audited
What Is Periscope?
Developers expose local services to the internet every day — for webhooks, mobile testing, demos, and collaboration. Organizations that care about security need tunneling that runs on their own infrastructure, authenticates through their own SSO, and logs to their own systems.
Periscope is a secure tunneling platform designed for teams that need visibility and control. Every request logged, every action audited, every tunnel attributed to a specific developer.
60-day free trial: Secure tunnels with user attribution, live HTTP request logging, request capture and replay, and email-based authentication — hosted on our server so you can try the experience today. No credit card required.
Self-hosted deployment: Deploy on your own infrastructure with your own SSO, audit logs shipped to your own SIEM, and full data sovereignty. One Docker container, one license key. Reach out about our early adopter program.
How It Works
1. Install
Install the Periscope CLI via npm
2. Authenticate
Sign in with your email address
3. Share
Share your local service with a single command
4. Share
Share the public URL — all access is authenticated and logged
The CLI establishes an SSH tunnel to your Periscope server. Incoming requests are forwarded to your local machine. The server handles TLS termination, user authentication for tunnel creation, and comprehensive request logging with user attribution.
The Core Differences
Full User Attribution
Every tunnel creation and HTTP request is attributed to the user who created the tunnel. Know who opened a tunnel, when, and what traffic flowed through it.
You Run It
Deploy Periscope on your own infrastructure. Traffic goes from the internet to your server to the developer's machine — no third-party hop. Full control over traffic routing, data sovereignty, and compliance.
SSO Integration
Self-hosted deployments authenticate through your existing identity provider. Remove a user from your organization and their tunnel access is revoked automatically.
Simple Deployment
Pull a Docker image (amd64 or arm64), set a license key, and point your DNS. No complex infrastructure, no multi-step provisioning, no vendor ecosystem to buy into.
Transparent Pricing
Flat, competitive pricing. No tiers, no per-feature upsells. You know exactly what you're paying before you sign up.
Audit & Compliance
Full audit logging with per-user attribution. Ship logs to your own SIEM. Built for teams where compliance matters.
Who Is Periscope For?
Expose local services for webhook development, API testing, mobile app development, and work-in-progress demos. Every tunnel is attributed to the user who created it — full accountability for all tunnel activity. Remember to secure your local services with authentication.
Get visibility into who is exposing what. Periscope logs every tunnel connection and every request with user attribution, so you know which developer opened a tunnel, when, and what traffic flowed through it.
Self-host to keep tunnel traffic on your own infrastructure. Integrate with your existing identity provider, ship logs to your SIEM, and maintain your compliance posture without introducing a third-party data path.
Built by Elf 5
A small team focused on developer infrastructure tools that are secure, simple to deploy, and transparently priced.
Learn About the Company