Proxy servers knowledge base

What is a proxy server?

Basically, a proxy server is another computer which acts as an intermediary between client (e.g. your computer) and the remote server, which client is accessing to. Using a proxy server, your computer sends requests to the proxy server instead of the desired destination, proxy server processes your request and returns what you were wanting.

What is a proxy server

Why do i need a proxy server?

Proxy servers are used for a number of reasons such as to go around various online restrictions, like a content blocking, request limit and more, and to provide anonymous browsing. The reasons to use a proxy server can be a lot, consider the most common of them.

Bypassing online blocks using a proxy server

What are the different types of proxy servers?

There are several types of proxy servers, each of which has its own possibilities.

HTTP proxy

HTTP is Hypertext Transfer Protocol, and as the name implies, HTTP proxy servers only support the HTTP protocol (80 port) and more often are suitable for web browsing and downloading files. From the viewpoint of anonymity, depending on the content of an HTTP headers proxy server sending, HTTP proxy servers are divided into:

Warning Sometimes it happens that the same proxy may work on different protocols, that provides different anonymity levels. For example, same proxy may be a transparent using HTTP protocol and a high anonymous using HTTPS (CONNECT method). To provide the anonymity level specified for the proxy server in our service, be sure to work with proxy using the specified protocol.

HTTPS (CONNECT) proxy

HTTPS is Hypertext Transfer Protocol over Security Socket Layer (HTTP over SSL). It's similar to an HTTP proxy server, but the difference is HTTPS proxy server supports HTTP CONNECT method, which makes possible to create an HTTP tunneling by connecting to any port of the destination server. This makes HTTPS proxy suitable for surfing web sites over secure SSL connection and using with many network applications like email clients, instant messengers and more. HTTPS proxy servers may be used in chains, raising client anonymity level.

SOCKS proxy

Through SOCKS proxy can work almost any network application, you can use a SOCKS proxy to work with your email, FTP, SSH client or instant messenger. SOCKS proxy servers are always anonymous, because not tied to high-level protocols and don't modify request headers. SOCKS proxy may support different versions of the protocol SOCKS4, SOCKS4a and SOCKS5. Like HTTPS proxy, SOCKS proxy servers may work in chains.

CGI (Web) proxy

A CGI (Common Gateway Interface) proxy appears to a user as a web page that allows the user to access a different site through it, in most cases anonymously. CGI proxy servers are often called as «Web proxy» or «Anonimizer». Web proxy is very easy to use, there is no need to change browser settings to use it. Most of Web proxy servers are supported SSL sites browsing. Web proxy servers may be used in chains.

What is a cascading proxy server?

If you're using an anonymous proxy to access some resource, this resource will determine proxy IP as a remote client address, instead of yours. And often, proxy connection IP address is the same, as an outbound IP, determined by a resource, accessed through the proxy.

Cascading proxy acts as a middle man between the real proxy server and your computer, so its connection and outbound IP's are different. One cascading proxy server can serve multiple ports, connection to each of them will result a connection to the real proxy server with different outbound IP, which may be even from different countries.

Notice For cascading proxies our service is determining the location based on an outbound, not connection IP.

How to choose proxy servers to effectively work with them?

Not all proxy servers are suitable for use with all the resources and protocols. The wrong choice of proxy servers for a specific task can lead to uncomfortable work or even to the failure with achievement of the expected result. The following recommendations will help to significantly improve the efficiency of work with proxy.

  1. Choose proxy servers with only unique IP's to perform multiple requests to the same resource. Many Internet resources temporarily block the IP addresses which abnormally large number of requests are coming from. This happens, for example, when checking the sites positions in search engines. However, many proxy servers are cascading, i.e. connection IP address of such proxies is not equal to the outbound IP. It often happens that a group of cascading proxy servers with different connection IP addresses has the same outbound IP. If this outbound IP will be blocked at the target resource, all requests via other proxy servers with the same outbound IP will be blocked too. It is possible to avoid such situation, choosing proxy servers with only unique IP addresses. You may choose proxy servers with only unique outbound IP's by checking «Only unique IP» checkbox in proxy filter.

  2. Exclude HTTP proxies to operate over a secure HTTPS connections. If you want to work with a resource that works only over secure HTTPS protocol (eg https://google.com), select only HTTPS and/or SOCKS proxy. Ordinary HTTP proxy servers, without the support of CONNECT method will not work.

  3. Exclude Chinese proxy servers to access blocked in China resources. China is a traditional source of a large number of proxies, their part within the total number of available on our service proxy servers may exceed 50%. However, at the present time, China's limited access to some resources due to censorship (for example, Instagram.com , Gmail.com and Twitter.com are blocked in China at the moment). Before you start, check if the target resource blocked in China. You can do it on this website. And, if the target resource is blocked - exclude Chinese proxy servers with our proxy filter.

  4. When working in a browser, choose the long-lived proxies. According to our statistics, the lifetime of the most proxy servers is less than an hour. Any proxy may die at any time. However, you can reduce the probability of this event, by choosing a proxy server with uptime more than 1 hour, by filling our proxy filter «Uptime» field. The more uptime the less chance of sudden proxy death.

Is using a proxy is completely anonymous and safe?

No. Although anonymous proxy servers do not pass the IP address of the client, however, client information may be transferred by means of JavaScript, ActiveX or Cookies. Proxy servers may logging their work, storing all information passed through, including confidential data such as logins and passwords. Proxy servers can be controlled by hackers or security services, or even created by them intentionally to intercept the traffic.

What is a proxy chaining and how it works?

It is possible to use multiple anonymous proxy servers at the same time in a chain. You may use as many proxy servers as you can or want. The more you use, the more anonymous you will be, but you should remember, it doesn’t matter how many proxies you chain together, you will never be 100% anonymous.

Proxy chain

The example of proxy chaining illustrated in the picture above. Connection to a remote server performed sequentially from one proxy server to another. To create a proxy chain, the user should first connect to Proxy1. Once the user is connected to Proxy1, from Proxy1, the user will connect to Proxy2, from Proxy2, the user will connect to Proxy3, from Proxy3, the user will then connect to the intended destination. All together we have 3 proxy servers chained in this example.

If any proxy in the chain dies whole chain stop working.

What is a proxy judge?

Proxy judge is a script, hosted on a web server, that indicates request HTTP headers, depending on which content determining the anonymity level of proxy server, proxy judge is accessed through. Choosing a fast proxy judge, that properly passes HTTP-headers and the remote address, is an important part of the proxy checking software setup. You may choose one from our actual proxy judges list.