Access raspberry pi remotely to control iot devices

    iot guide raspberrypi
    In this blog, we’ll discuss how to securely connect to your Raspberry Pi or IoT device remotely from anywhere over the internet without port forwarding, allowing you to remotely manage your devices more effectively. There are three main ways to access your Raspberry Pi remotely over the internet: SSH - Secure Shell, a cryptographic network protocol for secure remote access to devices over an unsecured network such as the internet.

    Localtunnel - Easiest way to create a local tunnel

    Starting a local tunnel is as simple as pasting the following command into your Terminal / Command Prompt: ssh -p 443 -R0:localhost:8000 Change 8000 to your required port. Visit for more details. Your browser does not support HTML video. Local tunnels are simple using Pinggy Local Tunnels using a single command Local tunnels are tunnels to localhost which helps in hosting websites, web applications, share files, remote access etc.

    T-Mobile Port Forwarding

    guide tcp
    Summary Open terminal or command prompt. Paste the following command in the terminal (replace 22 with the port you want to forward): ssh -p 443 -R0:localhost:22 After running the tunneling command, you will receive a public URL in the following format: tcp:// You can use this address and port to connect to your local port from outside the local network. Sign in to to get persistent URLs and persistent TCP ports for your tunnels.

    Domain Outage Incident Report April 26, 2024

    outage incident
    Incident Issue with DNS detected. The domain went to “serverHold”. No prior notice or response from the domain registrar. All “” URLs are operational. Update: April 29, 2024, 07.45 UTC - domain is back online. All services are operational. What can you do to access your tunnel? For subdomains If you have a subdomain such as, you can still access your tunnels through For custom domains Log in to your DNS provider.

    Sharing a Minecraft Server running on Localhost with Your Friends Online

    guide minecraft
    In this guide, we’ll walk through the process of exposing your localhost Minecraft server to the internet using Pinggy. By following these steps, you can seamlessly play with friends from around the world. Summary In Minecraft, launch a map and initiate the server setup. Click on Open to LAN. Note the port number. Example: 25565. Open a terminal / cmd, and run the following command (replace 25565 with your port): ssh -p 443 -R0:localhost:25565 tcp@a.

    Outage Incident Report Nov 6, 2023

    outage incident
    Summary November 6, 2023 1.30 AM UTC - Major outage detected. All regions are affected. 2.30 AM UTC - Issue with DNS detected. The domain went to “serverHold”. No prior notice or response from the domain registrar. 5.30 AM UTC - Transferred domain from Porkbun to AWS Route53. 6.30 AM UTC - “serverHold” status persisted on AWS. Support tickets opened. 12.10 PM UTC - New domain “” configured. Tunnels accessible.

    Scaling across Multiple Regions

    engineering update
    A user from South Korea brought to our attention that Pinggy works great for them, but it is slow. The answer to “why” was obvious to us. Pinggy was hosting its servers in the USA, specifically in Ohio. One key goal of Pinggy is to provide not only tunnels but fast and reliable tunnels. To improve the situation, we decided to host the tunnels in the region nearest to where the user is creating the tunnel from (as the default behavior).

    TLS Tunnel

    guide tls
    A TLS tunnel, often referred to as an SSL tunnel, establishes a secure channel that enables encrypted data transmission between two endpoints. This safeguards the information from eavesdropping and tampering, as it relies on the TLS protocol to create an encrypted connection between a client and a server. TLS tunneling ensures end-to-end encryption, a crucial element in preserving the confidentiality and integrity of data transmitted over the internet. This security feature shields sensitive information from prying eyes and malicious eavesdroppers, including internet service providers.