Debugging Guide

This guide will help you get started debugging your Node.js apps and scripts.

Enable Inspector

When started with the --inspect switch, a Node.js process listens via WebSockets for diagnostic commands as defined by the Inspector Protocol, by default at host and port Each process is also assigned a unique UUID (e.g. 0f2c936f-b1cd-4ac9-aab3-f63b0f33d55e).

Inspector clients must know and specify host address, port, and UUID to connect to the WebSocket interface. The full URL is ws://, of course dependent on actual host and port and with the correct UUID for the instance.

Inspector also includes an HTTP endpoint to serve metadata about the debuggee, including its WebSocket URL, UUID, and Chrome DevTools URL. Get this metadata by sending an HTTP request to http://[host:port]/json/list. This returns a JSON object like the following; use the webSocketDebuggerUrl property as the URL to connect directly to Inspector.

  "description": "node.js instance",
  "devtoolsFrontendUrl": "chrome-devtools://devtools/bundled/inspector.html?experiments=true&v8only=true&ws=",
  "faviconUrl": "",
  "id": "0f2c936f-b1cd-4ac9-aab3-f63b0f33d55e",
  "title": "node",
  "type": "node",
  "url": "file://",
  "webSocketDebuggerUrl": "ws://"

A Node.js process started without --inspect can also be instructed to start listening for debugging messages by signaling it with SIGUSR1 (on Linux and OS X). As of Node 7 this activates the legacy Debugger API; in Node 8 and later it will activate the Inspector API.

Security Implications

Since the debugger has full access to the Node.js execution environment, a malicious actor able to connect to this port may be able to execute arbitrary code on behalf of the Node process. It is important to understand the security implications of exposing the debugger port on public and private networks.

Exposing the debug port publicly is unsafe

If the debugger is bound to a public IP address, or to, any clients that can reach your IP address will be able to connect to the debugger without any restriction and will be able to run arbitrary code.

By default node --inspect binds to You explicitly need to provide a public IP address or, etc., if you intend to allow external connections to the debugger. Doing so may expose you a potentially significant security threat. We suggest you ensure appropriate firewalls and access controls in place to prevent a security exposure.

See the section on 'Enabling remote debugging scenarios' on some advice on how to safely allow remote debugger clients to connect.

Local applications have full access to the inspector

Even if you bind the inspector port to (the default), any applications running locally on your machine will have unrestricted access. This is by design to allow local debuggers to be able to attach conveniently.

Browsers, WebSockets and same-origin policy

Websites open in a web-browser can make WebSocket and HTTP requests under the browser security model. An initial HTTP connection is necessary to obtain a unique debugger session id. The same-origin-policy prevents websites from being able to make this HTTP connection. For additional security against DNS rebinding attacks, Node.js verifies that the 'Host' headers for the connection either specify an IP address or localhost or localhost6 precisely.

These security policies disallow connecting to a remote debug server by specifying the hostname. You can work-around this restriction by specifying either the IP address or by using ssh tunnels as described below.

Inspector Clients

Several commercial and open source tools can connect to Node's Inspector. Basic info on these follows:


  • CLI Debugger supported by the Node.js Foundation which uses the Inspector Protocol.
  • A version is bundled with Node and can be used with node inspect myscript.js.
  • The latest version can also be installed independently (e.g. npm install -g node-inspect) and used with node-inspect myscript.js.

Chrome DevTools 55+

Visual Studio Code 1.10+

  • In the Debug panel, click the settings icon to open .vscode/launch.json. Select "Node.js" for initial setup.

Visual Studio 2017

JetBrains WebStorm 2017.1+ and other JetBrains IDEs

  • Create a new Node.js debug configuration and hit Debug. --inspect will be used by default for Node.js 7+. To disable uncheck js.debugger.node.use.inspect in the IDE Registry.


  • Library to ease connections to Inspector Protocol endpoints.

Command-line options

The following table lists the impact of various runtime flags on debugging:

  • Enable inspector agent
  • Listen on default address and port (
  • Enable inspector agent
  • Bind to address or hostname host (default:
  • Listen on port port (default: 9229)
  • Enable inspector agent
  • Listen on default address and port (
  • Break before user code starts
  • Enable inspector agent
  • Bind to address or hostname host (default:
  • Listen on port port (default: 9229)
  • Break before user code starts
node inspect script.js
  • Spawn child process to run user's script under --inspect flag; and use main process to run CLI debugger.
node inspect --port=xxxx script.js
  • Spawn child process to run user's script under --inspect flag; and use main process to run CLI debugger.
  • Listen on port port (default: 9229)

Enabling remote debugging scenarios

We recommend that you never have the debugger listen on a public IP address. If you need to allow remote debugging connections we recommend the use of ssh tunnels instead. We provide the following example for illustrative purposes only. Please understand the security risk of allowing remote access to a privileged service before proceeding.

Let's say you are running Node on remote machine,, that you want to be able to debug. On that machine, you should start the node process with the inspector listening only to localhost (the default).

$ node --inspect server.js

Now, on your local machine from where you want to initiate a debug client connection, you can setup an ssh tunnel:

$ ssh -L 9221:localhost:9229 [email protected]

This starts a ssh tunnel session where a connection to port 9221 on your local machine will be forwarded to port 9229 on You can now attach a debugger such as Chrome DevTools or Visual Studio Code to localhost:9221, which should be able to debug as if the Node.js application was running locally.

Legacy Debugger

The legacy debugger has been deprecated as of Node 7.7.0. Please use --inspect and Inspector instead.

When started with the --debug or --debug-brk switches in version 7 and earlier, Node.js listens for debugging commands defined by the discontinued V8 Debugging Protocol on a TCP port, by default 5858. Any debugger client which speaks this protocol can connect to and debug the running process; a couple popular ones are listed below.

The V8 Debugging Protocol is no longer maintained or documented.

Built-in Debugger

Start node debug script_name.js to start your script under Node's builtin command-line debugger. Your script starts in another Node process started with the --debug-brk option, and the initial Node process runs the _debugger.js script and connects to your target.


Debug your Node.js app with Chrome DevTools by using an intermediary process which translates the Inspector Protocol used in Chromium to the V8 Debugger protocol used in Node.js.

Scroll to top