// use case
Expose your Express dev server to Stripe for Stripe webhooks
Reserve a stable subdomain
On the lrok free plan you keep one reserved subdomain forever. Pick a name your Stripe dashboard can hold onto — webhook URLs that survive laptop restarts mean fewer dashboard re-pastes.
$ lrok reserve exp-stripe Reserved https://exp-stripe.lrok.ioRun your Express app
Start the dev server on port 3000 (the Express default).
$ node server.jsTunnel localhost to the public URL
lrok forwards https://exp-stripe.lrok.io/webhook → http://127.0.0.1:3000/webhook. The flag --hint binds your reserved subdomain to this tunnel.
$ lrok http 3000 --hint exp-stripe Forwarding https://exp-stripe.lrok.io -> http://127.0.0.1:3000Paste the URL into Stripe
Developers → Webhooks → Add endpoint. Paste https://exp-stripe.lrok.io/webhook as the destination.
Watch deliveries land in the request inspector
Every webhook Stripe sends shows up at lrok.io/dashboard with full body, headers, status, and latency. Re-deliver any request to your Express handler with one click. Verify the Stripe-Signature header against the raw request body — not the parsed JSON. The /tools/webhook-signature-verifier tool catches mismatches in seconds.
// why lrok for this
lrok's reserved subdomain is free and lives forever, so your Stripe stripe webhooks URL never rotates. $9/mo flat for unlimited tunnels — no SSO tax, no enterprise-only signature verification, no bandwidth metering. The request inspector is built in.
Related workflows
- Expose your Next.js dev server to Stripe for Stripe webhooks
- Expose your Django dev server to Stripe for Stripe webhooks
- Expose your Rails dev server to Stripe for Stripe webhooks
- Expose your Express dev server to GitHub for GitHub webhooks
- Expose your Express dev server to the OAuth provider for OAuth callback