Since day one, Serveo has been about repurposing the battle-tested tools you already have. We started with SSH because it is ubiquitous. By using remote port forwarding, we let you expose local services without installing a single proprietary binary.
Why WireGuard?
We love SSH, but it has a weakness: it is a stateful TCP connection. If you close your laptop lid, change Wi-Fi networks, or hit a spotty LTE patch, the pipe breaks.
WireGuard changes the game. It is a modern, high-performance, stateless protocol.
- It Roams: Switch from coffee shop Wi-Fi to a mobile hotspot instantly. Your tunnel URL stays live.
- It's Fast: Running in the kernel, it handles high-throughput streams that choke user-space SSH clients.
- It's Standard: Just like our SSH support, you do not need a Serveo client. Use the standard WireGuard tools you already trust.
Ergonomics First
Setting up a VPN usually involves complex key management and config files. We automated that. You can generate a complete, ephemeral WireGuard configuration directly below. Run it with wg-quick, and you are online in seconds.
Add this configuration to your WireGuard client:
Generating...Connect, then access your device at this URL (replace 3000 with your local port):
Generating...Note: Anonymous and free tunnels include an interstitial warning page. To get nicer, reserved URLs and interstitial-free endpoints, please upgrade to a paid account.
Registered User Benefits
Anonymous tunnels are fully supported (and free), but the Pro plan ($6/mo) unlocks the infrastructure for production use:
- Custom Subdomains: Claim
your-app.serveousercontent.compermanently. - No Interstitial: Remove the browser warning page for client demos.
- Key Management: Store your public keys in the console so your config files work across reboots.
Try it out
If you have wireguard-tools installed, generate a config above and give it a shot. We think it's the most robust way to expose a localhost server in 2026.
Questions? Found a bug? Email me directly at trevor@serveo.net.