Get Started

Create a Remote.It Account

Sign up here:

Quick Start

Here's what is required.

  1. Download and install the Desktop app or use You will be using this to setup other devices and start connections

  2. Install and configure on your target device (The device you will be connecting to)

    1. Windows or Mac Install the Desktop or CLI

  3. Connect!

Once configured you can then share the device or individual services to others. Learn more.

Check out the Glossary for more details on these terms

We are in the process of adding more to our documentation. Can't find what you are looking for? Please contact us.

What is it? is a platform that brings the world of disconnected networks to your browser, desktop and mobile devices. Securely access devices connected to any network like they were on your own local network. lets you connect between your devices on the internet in a secure and convenient manner. In a connection, the device which begins the connection is called the initiator device and the device which responds is the target device.

Why did we make it?

Our founders expertise started in TCP/IP and it grew from there. As cloud technologies advanced, it begged the question, why hasn’t networking changed? With the cloud, connecting to devices has never been easier. So, we developed to simplify the way people and businesses connect to devices. Our goal is increase your productivity by reducing your time to device, easing access management, and giving you the peace-of-mind of making connections with no open ports.

How does work?

When you register a device, will maintain a minimal connection while the device is online. When the devices have access to the internet you also have access to the device. The service agent requires outbound UDP traffic on ports 5959 through 5970 to communicate with

When you register a service on a target device you're saying that you will communicate to that device on that particular service port. When ready to access we provide a local device or proxy address and port where all traffic will be routed to the target device and port.

There are two methods we use to provide that connection access when you're ready for it. You can use either one on the same connection.

More details can be found on our connection types here

Proxy Connections- maintains geolocated initiators that generate unique addresses. These are great if the endpoint you're trying to access is closer to us than you. This connection type is not persistent and has a defined time to live.

Peer-2-Peer- when you request a peer-2-peer connection the service builds a tunnel from the initiating device to the target device. This connection can only be initiated on devices that have the service agent installed. This has low latency and will maintain the connection for as long as internet connection is available to both devices.

Last updated