Maps Bore hostnames to 127.0.0.1 for local-only development
Developer Guide
Written by Casper Fenger Jensen • Updated 2026-04-16
Loopback Hostnames for Local Development on Bore
Use short Bore hostnames that resolve to 127.0.0.1 for local development, including l.bore.dk, local.bore.dk, localhost.bore.dk, and child hosts under each of them.
Sometimes you do not need a public HTTPS tunnel at all. You just need a repeatable hostname that behaves like localhost while still letting you test cookies, host-based routing, callbacks, and subdomain logic on your own machine. Bore now supports loopback hostnames like `l.bore.dk`, `local.bore.dk`, and `localhost.bore.dk`, plus child hosts under each one.
Install Bore
curl -sL https://bore.dk/install.sh | bashSupports child hosts like api.l.bore.dk and auth.local.bore.dk
Useful for cookie, callback, and host-based routing tests without public exposure
How It Works
Simple local workflow, real HTTPS externally
Step 1
Keep your local app on its normal port
Run the local website or API on the same port you already use, such as 3000, 5173, 8080, or 8787.
Step 2
Open the Bore loopback hostname on that port
Use any of the Bore loopback hostnames directly in the browser, including `l.bore.dk`, `local.bore.dk`, or `localhost.bore.dk`.
http://l.bore.dk:3000
http://local.bore.dk:5173
http://localhost.bore.dk:8080Step 3
Use child hosts when one hostname is not enough
Host-based routing and multi-origin local setups can use child hosts under the same loopback namespace.
http://api.l.bore.dk:3001
http://auth.local.bore.dk:3000
http://admin.localhost.bore.dk:4173Step 4
Use Bore tunnels only when you need outside access
The loopback hostnames are for local-only access on your own machine. Switch to `bore up` when a phone, teammate, webhook sender, or OAuth provider needs to reach the service from outside your computer.
Where Bore Differs
Bore can keep HTTPS on reserved child hosts too
Most tunnel workflows stop at one public hostname. Bore can keep your main app on one HTTPS namespace and reserve a child host like `api.<namespace>.bore.dk` for a second local service.
bore host add <namespace> api
bore host set-port <namespace> api 3001That matters when frontend and API origins need to stay separate in local development, or when webhook, auth, and admin traffic should not all share one hostname.
FAQ
Common questions
What do l.bore.dk, local.bore.dk, and localhost.bore.dk do?
They give you Bore-managed hostnames that resolve to 127.0.0.1 for local development. That means your browser can use a named host instead of plain localhost or a raw loopback IP.
Can I use subdomains like api.l.bore.dk or app.local.bore.dk?
Yes. Bore supports child hosts under these loopback names, so you can test host-based routing and split local origins on your own machine.
Are these hostnames public?
No. They are meant to point back to your own local machine at 127.0.0.1, so they are useful for local-only browser and development workflows rather than public sharing.
Related Guides
More HTTPS development guides
How to Split Frontend and API Origins in Local HTTPS Development
Keep the frontend and API on separate HTTPS origins in local development so you can test CORS, cookies, auth rules, and realistic host-based behavior.
HTTPS for Child Subdomains in Local Development
Bore lets you expose a local app on one HTTPS hostname and a second local service on a reserved child host like api.bo.bore.dk. That makes app and API origin splits much easier in development.
How to Expose a Local API Over HTTPS
Put a local API on a real HTTPS URL for browser clients, mobile apps, webhook callbacks, and partner integrations without adding local TLS complexity.
How to Open Localhost on HTTPS From Your Phone or Another Device
Test a local app or API on a phone, tablet, or another laptop over HTTPS without opening your whole machine to the internet or sharing raw LAN URLs.