{
	"id": "01eb6cfa-304f-4f8b-99de-bd95323f7e43",
	"created_at": "2026-04-06T00:15:05.337702Z",
	"updated_at": "2026-04-10T13:12:19.19879Z",
	"deleted_at": null,
	"sha1_hash": "80289859f7f82cab40bfd6678e213ffe9d365466",
	"title": "ngrok: AI \u0026 API Gateway | Secure Tunnels \u0026 Traffic",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 186025,
	"plain_text": "ngrok: AI \u0026 API Gateway | Secure Tunnels \u0026 Traffic\r\nBy ngrok\r\nArchived: 2026-04-05 20:44:26 UTC\r\nNewIntroducing AI Gateway\r\nAll your traffic.\r\nOne gateway.\r\nngrok is an all-in-one cloud networking platform that secures, transforms, and routes your traffic to services\r\nrunning anywhere.\r\nFrom localhost to live in prod.\r\nInstead of a hodgepodge of nginx, NLBs, VPNs, model routers, and Cloudflare, solve every networking problem\r\nwith one gateway.\r\nYou may also need to…\r\nMore problems we solve\r\nOkay, but how does it work?\r\nConnect anything with Endpoints, Traffic Policy, and Secure Tunnels.\r\nhttps://ngrok.com/product\r\nPage 1 of 5\n\nEndpoints \u0026 Traffic Policy\r\nRoute, transform, and authenticate your traffic.\r\nNo more cryptic nginx configs or Lua plugins. Everything is a URL with traffic rules you attach. Compose them\r\ntogether and offload processing to ngrok’s cloud gateway.\r\nFig. 1 – Traffic flows through\r\nEndpoints \u0026 Traffic Policy\r\nTake action at any phase in the request lifecycle.\r\nTraffic Policy is an expressive CEL-based rules system. When a request hits different phases of its lifecycle, ngrok\r\nexecutes each rule sequentially.\r\nStop cobbling your infrastructure together.\r\nSecurity, performance, and resiliency built in by default.\r\nMore about endpoints More about Traffic Policy\r\nSecure Tunnels\r\nConnect to services anywhere, no firewall changes required.\r\nInstall a lightweight agent to deliver traffic to any service through a secure tunnel.\r\nFig. 3 – Anatomy of a secure tunnel\r\nEnvironment Agnostic\r\nRun your services in any environment\r\nBecause your services are connected to ngrok with secure tunnels, they can be deployed anywhere. If it listens on\r\na port and is connected to the internet, ngrok can deliver traffic to it.\r\nhttps://ngrok.com/product\r\nPage 2 of 5\n\nZero Open Ports\r\nClose every single inbound port\r\nAttackers can't skirt a secure tunnel to scan or attack your origin servers, which means you whittle down your\r\nsurface area and remove an entire class of attack vectors.\r\nLeast Privileged Access\r\nPrecise network access, not risky customer VPNs\r\nDrop the ngrok agent into your customers' networks and tightly scope your access to just the APIs and databases\r\nyou need. Not their whole subnet.\r\nhttps://ngrok.com/product\r\nPage 3 of 5\n\nNative SDKs\r\nimport \"ngrok\"\r\nDon't want to package and babysit an agent sidecar? Embed secure tunnels directly into your code with a native\r\nagent SDK.\r\nMore about secure tunnels\r\nSweatin' the small stuff\r\nDeveloper experience matters.\r\nJoin millions of developers routing billions of requests every day.\r\nSee more love\r\nYou're using ngrok right now.\r\nhttps://ngrok.com/product\r\nPage 4 of 5\n\nngrok received your request on our global network, filtered it through our WAF, applied a rate limit, routed it to\r\nour services, and delivered this web page to your browser.\r\nFig. 4 – ngrok.com's Traffic Policy\r\nYou read the whole page. What are you waiting for?\r\nNo upfront costs. No contact sales. Pay only for what you use.\r\nSource: https://ngrok.com/product\r\nhttps://ngrok.com/product\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://ngrok.com/product"
	],
	"report_names": [
		"product"
	],
	"threat_actors": [],
	"ts_created_at": 1775434505,
	"ts_updated_at": 1775826739,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/80289859f7f82cab40bfd6678e213ffe9d365466.pdf",
		"text": "https://archive.orkl.eu/80289859f7f82cab40bfd6678e213ffe9d365466.txt",
		"img": "https://archive.orkl.eu/80289859f7f82cab40bfd6678e213ffe9d365466.jpg"
	}
}