Round-robin proxy for multiple Claude Max accounts.
Distribute Claude Code requests across N subscriptions to multiply your throughput.
Warning
Read the disclaimer before using this tool.
Claude Code (terminal)
│
│ ANTHROPIC_BASE_URL=http://localhost:3456
│ ANTHROPIC_AUTH_TOKEN=proxy-managed
▼
┌─────────────────────────────────────┐
│ CC-Router :3456 │
│ │
│ 1. Receives request /v1/messages │
│ 2. Round-robin → picks account N │
│ 3. Refreshes token if expiring │
│ 4. Injects Authorization: Bearer │
│ 5. Forwards to Anthropic (or │
│ LiteLLM for advanced mode) │
└──────────────┬──────────────────────┘
│
▼
api.anthropic.com
(authenticated with
OAuth token of account N)
All standard Claude Code features work transparently: streaming, extended thinking, tool use, prompt caching.
Claude Max has rate limits per account. If you hit them regularly mid-session — waiting for cooldowns, getting 429s — you're a good candidate.
With two accounts you double your effective rate limit. With three, you triple it. The proxy distributes requests automatically; you don't change how you use Claude Code at all.
1 account → hit limit, wait 60s, continue
3 accounts → request rotates across all three, limit effectively tripled
A team of five doesn't need five Max subscriptions. In practice, developers don't all peak at the same time. Three accounts can comfortably serve five people working normal hours.
cc-router (hosted on a shared machine or VPS)
│
├── max-account-1 ← alice's subscription
├── max-account-2 ← bob's subscription
└── max-account-3 ← carol's subscription
│
└── serves: alice, bob, carol, dave, eve
Each developer sets their ANTHROPIC_BASE_URL to the shared proxy. Done. The proxy handles routing and token refresh invisibly.
| Setup | Monthly cost |
|---|---|
| 5 individual Max subscriptions | 5 × $100 = $500/mo |
| 3 shared via cc-router | 3 × $100 = $300/mo |
You save $200/mo without any loss in capability for a typical team workload.
Run cc-router on a machine everyone on the team can reach — a home server, a VPS, or a spare machine on the office network.
npm install -g ai-cc-router
cc-router setup # configure the 3 shared accounts
cc-router service install # auto-start on bootBy default cc-router binds to localhost. To accept connections from other machines, set the HOST environment variable:
# Listen on all interfaces (team LAN or VPS)
HOST=0.0.0.0 cc-router start
# Or configure it permanently in the serviceNo installation needed. Just set two environment variables in ~/.claude/settings.json:
{
"env": {
"ANTHROPIC_BASE_URL": "http://192.168.1.50:3456",
"ANTHROPIC_AUTH_TOKEN": "proxy-managed"
}
}Replace 192.168.1.50 with the server's IP or hostname. Then run claude normally.
Or use the CLI to write the settings automatically:
cc-router configure --port 3456
# Then manually update ANTHROPIC_BASE_URL to the remote IPIf your team is distributed or works remotely, run cc-router on a VPS and expose it over HTTPS via a reverse proxy.
server {
listen 443 ssl;
server_name cc-router.yourcompany.com;
# ... SSL cert config (e.g. Let's Encrypt) ...
location / {
proxy_pass http://127.0.0.1:3456;
proxy_buffering off; # required for SSE streaming
proxy_read_timeout 300s; # required for long thinking requests
proxy_set_header X-Forwarded-For $remote_addr;
}
}Each developer then points to:
{
"env": {
"ANTHROPIC_BASE_URL": "https://cc-router.yourcompany.com",
"ANTHROPIC_AUTH_TOKEN": "proxy-managed"
}
}Security note: if the proxy is internet-accessible, add authentication at the nginx level (basic auth, mTLS, or IP allowlist) so only your team can use it. cc-router does not implement user authentication itself.
# 1. Install
npm install -g ai-cc-router
# 2. Wizard: extract tokens + configure Claude Code automatically
cc-router setup
# 3. Start the proxy
cc-router start
# 4. Use Claude Code normally — the proxy is transparent
claudeThat's it. Claude Code will route through the proxy without any further changes.
Optional: install as a system service so it starts automatically on boot:
cc-router service installRequirements: Node.js 20 or 22.
npm install -g ai-cc-routerVerify:
cc-router --versioncc-router can extract OAuth tokens directly from the macOS Keychain — no manual copy-pasting needed.
cc-router setup
# Select "Extract automatically from macOS Keychain"For multiple accounts, you need to switch accounts in Claude Code between extractions:
# Account 1 is already logged in — run setup and extract
cc-router setup
# To add account 2:
claude logout && claude login # log in with account 2
cc-router setup --add # extract and merge
claude logout && claude login # log back in with account 1Tokens are read from ~/.claude/.credentials.json:
cc-router setup
# Select "Read from ~/.claude/.credentials.json"Make sure Claude Code is installed and you have run claude login at least once.
Same as Linux — tokens are read from ~/.claude/.credentials.json (Windows path: %USERPROFILE%\.claude\.credentials.json).
cc-router setupcc-router setup Interactive wizard: extract tokens + configure Claude Code
cc-router setup --add Add another account to an existing configuration
cc-router start Start proxy on localhost:3456 (foreground)
cc-router start --daemon Start in background via PM2
cc-router start --litellm Start with LiteLLM in Docker (advanced mode)
cc-router stop Stop proxy + restore Claude Code to normal auth
cc-router stop --keep-config Stop proxy only (keep settings.json)
cc-router revert Restore Claude Code to normal authentication
cc-router status Live dashboard (updates every 2s, press q to quit)
cc-router status --json Print current stats as JSON and exit
cc-router accounts list List configured accounts (live stats if proxy is running)
cc-router accounts add Add an account interactively
cc-router accounts remove <id> Remove an account
cc-router service install Register cc-router to start on system boot (PM2)
cc-router service uninstall Remove from system startup
cc-router service status Show PM2 service status
cc-router service logs Tail proxy logs from PM2
cc-router configure (Re)write ~/.claude/settings.json
cc-router configure --show Show current Claude Code proxy settings
cc-router configure --remove Remove cc-router settings (same as revert without stopping)
cc-router docker up Start full Docker stack (cc-router + LiteLLM)
cc-router docker up --build Rebuild cc-router image before starting
cc-router docker down Stop Docker containers
cc-router docker logs Tail all Docker logs
cc-router docker ps Show container status
cc-router docker restart [service] Restart a service
Claude Code → cc-router:3456 → api.anthropic.com
Best for personal use. No Docker required.
cc-router startClaude Code → cc-router:3456 → LiteLLM:4000 → api.anthropic.com
Adds a LiteLLM layer for usage logging, rate limiting, and a web dashboard at http://localhost:4000/ui.
cc-router docker up
# or: cc-router start --litellmSee docs/litellm-setup.md for details.
To stop using cc-router and go back to normal Claude Code authentication:
cc-router revertThis stops the proxy process and removes cc-router's settings from ~/.claude/settings.json. Claude Code will use its own authentication on the next launch.
cc-router status CC-Router · standalone → api.anthropic.com · up 2h 14m · [q] quit
ACCOUNTS 2/2 healthy
● max-account-1 ok req 142 err 0 expires 6h 48m last 2s ago
● max-account-2 ok req 139 err 0 expires 6h 51m last 5s ago
TOTALS requests 281 · errors 0 · refreshes 2
RECENT ACTIVITY
14:23:01 → max-account-1 route
14:22:58 → max-account-2 route
14:22:45 ↻ max-account-1 refresh
Press q to quit. Run with --json for non-interactive output.
- Tokens are stored locally in
~/.cc-router/accounts.json, never in the repository - The file is excluded by
.gitignore - Writes are atomic (write to
.tmp, then rename) — no corruption on crash - Keychain reads use
execFilewith a fixed argument array — no shell injection - No telemetry, no external logging
See docs/security.md for details.
CC-Router uses the OAuth tokens of your own Claude Max subscriptions.
Read Anthropic's Terms of Service before using this tool.
Using multiple Max subscriptions to increase throughput may violate the ToS. Anthropic has been known to ban accounts for unusual OAuth usage patterns.The authors are not responsible for any account bans, loss of access, or other consequences resulting from the use of this software. Use at your own risk.
See CONTRIBUTING.md.
Bug reports → GitHub Issues