Skip to content

About Periscope

Secure tunneling for teams that need visibility and control — every request logged, every action audited

What Is Periscope?

Developers expose local services to the internet every day — for webhooks, mobile testing, demos, and collaboration. Organizations that care about security need tunneling that runs on their own infrastructure, authenticates through their own SSO, and logs to their own systems.

Periscope is a secure tunneling platform designed for teams that need visibility and control. Every request logged, every action audited, every tunnel attributed to a specific developer.

60-day free trial: Secure tunnels with user attribution, live HTTP request logging, request capture and replay, and email-based authentication — hosted on our server so you can try the experience today. No credit card required.

Self-hosted deployment: Deploy on your own infrastructure with your own SSO, audit logs shipped to your own SIEM, and full data sovereignty. One Docker container, one license key. Reach out about our early adopter program.

How It Works

download

1. Install

Install the Periscope CLI via npm

lock_open

2. Authenticate

Sign in with your email address

settings_ethernet

3. Share

Share your local service with a single command

share

4. Share

Share the public URL — all access is authenticated and logged

The CLI establishes an SSH tunnel to your Periscope server. Incoming requests are forwarded to your local machine. The server handles TLS termination, user authentication for tunnel creation, and comprehensive request logging with user attribution.

The Core Differences

person_pin

Full User Attribution

Every tunnel creation and HTTP request is attributed to the user who created the tunnel. Know who opened a tunnel, when, and what traffic flowed through it.

cloud_done

You Run It

Deploy Periscope on your own infrastructure. Traffic goes from the internet to your server to the developer's machine — no third-party hop. Full control over traffic routing, data sovereignty, and compliance.

verified_user

SSO Integration

Self-hosted deployments authenticate through your existing identity provider. Remove a user from your organization and their tunnel access is revoked automatically.

flash_on

Simple Deployment

Pull a Docker image (amd64 or arm64), set a license key, and point your DNS. No complex infrastructure, no multi-step provisioning, no vendor ecosystem to buy into.

attach_money

Transparent Pricing

Flat, competitive pricing. No tiers, no per-feature upsells. You know exactly what you're paying before you sign up.

assessment

Audit & Compliance

Full audit logging with per-user attribution. Ship logs to your own SIEM. Built for teams where compliance matters.

Who Is Periscope For?

group Development Teams

Expose local services for webhook development, API testing, mobile app development, and work-in-progress demos. Every tunnel is attributed to the user who created it — full accountability for all tunnel activity. Remember to secure your local services with authentication.

visibility Engineering Leadership

Get visibility into who is exposing what. Periscope logs every tunnel connection and every request with user attribution, so you know which developer opened a tunnel, when, and what traffic flowed through it.

verified_user Security and Compliance Teams

Self-host to keep tunnel traffic on your own infrastructure. Integrate with your existing identity provider, ship logs to your SIEM, and maintain your compliance posture without introducing a third-party data path.

Built by Elf 5

A small team focused on developer infrastructure tools that are secure, simple to deploy, and transparently priced.

Learn About the Company