Expose local services to the internet.
No firewall changes needed.
A bidirectional proxy that connects agents behind NAT and firewalls to the public internet through secure encrypted tunnels. Single binary. Zero configuration.
How It Works
Agents behind firewalls connect outbound to the NFLTR server. The server proxies inbound HTTP requests through the established gRPC tunnel — no port forwarding needed.
Agent Connects Out
The agent initiates an encrypted connection outbound to the NFLTR server. No inbound ports or port forwarding needed. Works behind NAT, CGNAT, and corporate firewalls.
Server Proxies Traffic
HTTP requests to <agent-id>.nfltr.xyz are dispatched through the encrypted tunnel to the agent. The agent forwards them to your local service and returns the response.
Instant Public URL
Your local service is now accessible from the internet with a stable subdomain or a temporary share link like swift-bay.nfltr.xyz.
10 Communication Patterns
One platform, many patterns. NFLTR handles everything from simple HTTP proxying to agent-to-agent messaging, file streaming, and IoT command-and-control.
HTTP Reverse Proxy
Requests to <agent>.nfltr.xyz are proxied through the tunnel to your local web server. Low-latency direct mode or durable async delivery.
gRPC Bidirectional Streaming
Full bidirectional streaming between cloud services and on-premise agents. Agent-initiated or cloud-initiated connection patterns.
Agent-to-Agent
Agents communicate directly with each other through the server relay. Build distributed systems, chat apps, or peer-to-peer file sharing.
File Streaming
Transfer files between agents with chunked streaming and SHA-256 integrity verification. Large file support with progress tracking.
TCP & SSH Tunneling
Raw TCP frame forwarding for SSH, RDP, database connections, and any TCP-based protocol. Access remote machines as if they were local.
IoT Command & Control
Send commands to device fleets and receive telemetry. Label-based routing with fleet tokens lets you target specific device groups.
Webhook Relay
Receive webhooks from GitHub, Stripe, Slack and relay them to local development servers. Built-in HMAC signature verification.
End-to-End Encrypted
Agent-native encryption where the server only sees opaque bytes. Build secure messaging, private data transfer, and zero-knowledge applications.
Built for Every Use Case
From a Raspberry Pi in your garage to 10,000 IoT sensors across a factory floor.
Homelab & Self-Hosted
- Expose Jellyfin, Home Assistant, Nextcloud to the internet
- Works behind CGNAT — no port forwarding needed
- Single binary, zero external dependencies
- Built-in storage and messaging — nothing else to install
- Share links for temporary access:
swift-bay.nfltr.xyz
./nfltr-agent --api-key KEY --routes http://localhost:8096
Developer Tunnels
- Share localhost with teammates for review or pairing
- Receive webhooks from Stripe, GitHub, Slack on your machine
- Multi-route support:
/api→:3000, /web→:5173 - Auto-generated agent ID from hostname
- Word-pair share codes — human-readable, DNS-safe
./nfltr-agent --api-key KEY \
--routes /api=http://localhost:3000,/=http://localhost:5173
Enterprise & Fleet Management
- Manage thousands of on-prem agents from a control plane
- Fleet tokens with Kubernetes-style label selectors
- Fan-out commands to device groups:
fleet=hvac,zone=building-a - API key rotation, audit logging, and policy-based authorization
- Horizontally scalable for multi-instance deployments
# Target specific fleet members
curl -H "X-Fleet-Selector: zone=building-a" \
https://nfltr.xyz/api/v1/fleet/invoke
IoT & Edge Computing
- Command/telemetry patterns for sensor networks
- Agent runs on ARM devices (Raspberry Pi, Jetson Nano)
- Agent-to-agent messaging for edge mesh networks
- WASM agent for sandboxed, minimal-footprint deployment
- Persistent endpoints: offline agents return 503, not 404
# Run sandboxed WASM agent on edge device
wasmer run --net nfltr-agent.wasm -- \
--api-key KEY --routes http://localhost:8080
Multiple Agent Types
Choose the agent that fits your deployment. From a CLI binary to an embedded Go SDK to a sandboxed WASM module.
Security at Every Layer
Six authentication methods, policy-based authorization, and end-to-end encryption support.
Verified Identity
Agent identity is derived from authentication credentials, not headers. Prevents spoofing. Each auth method maps to a unique, verifiable agent identity.
Policy-Based Authorization
Fine-grained access control policies define who can access which agents, which routes, and which operations. Flexible rules for any security requirement.
Webhook Signature Verification
Built-in signature verification for GitHub, Stripe, and Slack webhooks. Replay detection with timestamp validation. Extensible for custom providers.
Deploy Anywhere
From a single binary on a Raspberry Pi to a horizontally-scaled multi-pod Kubernetes cluster.
Self-Hosted
Zero Dependencies- Single binary — download and run
- No external databases or message brokers required
- mTLS or API key auth — no external identity provider
- Bundled authorization policies
- Runs on Linux, macOS, ARM, x86
Cloud / SaaS
Horizontally Scalable- Multi-instance with intelligent agent routing
- Shared state across all server instances
- Durable async messaging for high throughput
- JWT + OAuth + fleet tokens at scale
- Kubernetes-native with autoscaling
Runs On
Full Observability
Rich Metrics
Request latency, agent connection counts, throughput, fleet operations, and rate limiting. Prometheus-compatible with pre-built Grafana dashboards.
Admin Dashboard
Built-in web dashboard for agent management, API key rotation, server metrics, connection analytics, and fleet operations. OAuth-protected with Google SSO.
Structured Logging
JSON-formatted structured logs with audit trail for security events. Compatible with any centralized log aggregation platform.
Download the Agent
The tunnel agent is a single binary. Download for your platform, make it executable, and connect.
Latest version: v1.0.8
| Platform | Architecture | Download |
|---|---|---|
| Linux | x86_64 (amd64) | Download |
| Linux | ARM64 (aarch64) | Download |
| macOS | Apple Silicon (arm64) | Download |
| macOS | Intel (amd64) | Download |
| Windows | x86_64 (amd64) | Download |
| WebAssembly | WASI (sandboxed) | Download |
Quick Start
# Make executable (Linux/macOS)
chmod +x nfltr-agent-*
# Connect to this server
./nfltr-agent-linux-amd64 \
--api-key YOUR_API_KEY \
--routes http://localhost:8080
What happens next?
The agent connects outbound to the server over gRPC. Your local service becomes accessible at:
https://<agent-id>.nfltr.xyz/— direct subdomain (auto-generated from hostname)- Or request a share link for a temporary URL like
swift-bay.nfltr.xyz
No inbound ports, no firewall changes, no static IP needed.
Contact Us
Have questions, feedback, or need help getting started? Drop us a message.
Ready to get started?
Sign in with your API key or Google account to manage agents and create share links.
Sign in