// use case
Replace ssh -R reverse tunnels with one command
ssh -R works if you have a public-IP server with sshd open and configured for GatewayPorts. Most people don't. lrok does the same job — make a private port reachable from the internet — without you running a server.
Pick the local port to expose
Anything: 22, 5432, 6379, 8080.
Tunnel
$ lrok tcp 22 Forwarding tcp://tcp.lrok.io:30007 -> tcp://127.0.0.1:22SSH from the other side
$ ssh -p 30007 user@tcp.lrok.io
// why lrok for this
No public-IP server to maintain, no sshd config, no firewall rules. The TCP port is allocated dynamically; rebind by re-running the command.