What Is a Proxy: Your Go-To Guide in 2020
Learn all about proxies, their types, and main use cases.
Each device that connects to the internet is assigned a public IP address. What if you don’t feel like broadcasting this information all over the place? Then you might want a proxy to change that.
A proxy is an intermediary between your device and the internet. When you’re not using one, any website can see your IP address. Not only that: it can also determine your approximate location, device information, and more. With a proxy, the website will see a different IP from your real one.
This guide will teach you all about how proxies work, their main use cases, different proxy types, and how a proxy compares with a VPN.
Think of a proxy server as a middleman between you and the internet. Instead of connecting to a website directly, a proxy server will route your connection through itself, sending the request on your behalf. It will then return the website’s response, also through itself.
What Is a Proxy?
In essence, a proxy is a different IP address you receive when you connect to a proxy server. The terms ‘proxy server’ and ‘proxy’ are often used interchangeably. There’s little harm in doing so outside the most technical circles.
First, proxies can improve your privacy by hiding your original IP address. This is an important feature, but it alone hardly justifies choosing a proxy over, say, a VPN.
Second, you can choose proxy IPs from many locations around the world. Some websites serve different information for specific geographic regions. So, being able to change your perceived location can be very useful both for consuming content and achieving business goals, such as verifying ads or doing market research.
Third, and the most important point – you can use several proxies at the same time to run a large number of automated tasks. Price aggregation, data scraping, multiple account management, sneaker shopping, and many other jobs would be much harder or even impossible without proxy IPs.
Finally, a reverse proxy server can filter all incoming and outgoing requests. So, you can use it like a load balancer to improve stability, cache website content to boost performance, or limit access to certain websites like a firewall.
You can read about proxy use cases in greater detail here.
There are several types of proxies with different characteristics. These differences could be what makes or breaks your projects and tasks.
Perhaps the largest distinction is between forward and reverse proxy servers. Forward proxies modify all connection requests leaving your device, while reverse proxy servers intercept all connections reaching a server or a website. The most common proxy use cases, such as web scraping or changing your location, use forward proxy servers.
The second important distinction is based on proxy anonymity. High anonymous proxies (also called elite proxies) hide both your IP address and the fact that you’re using a proxy server. Anonymous proxies hide your IP but reveal that you’re using a proxy. Transparent proxies don’t hide anything. The latter type is often found in airports and other places with public Wi-FI.
The third major distinction shows proxy origin. Datacenter proxies get their IPs from servers in data centers. They’re very fast and stable but easier to identify as proxy addresses. Residential proxies borrow the IPs from real residential users – their desktop and mobile devices.
These are but a few of the many ways to categorize proxies. You can read more in this article on the main proxy types.
When choosing proxies, I’d recommend having a solid idea what you’re going to use the proxies for. From here, you can start narrowing down the qualities of proxies that would be the most important for your tasks. Do you need a static IP or a rotating one? Is it better for you to have very fast proxies with several blocks or can you go for slower ones with less of a chance of being blocked?
If you’re still not too sure which proxies would work the best for your project, take a look at our Best Proxies list. We’ve compiled not only the best proxy providers according to types, but also according to use cases. Basically, we’ve done the thinking for you. You’re welcome!
Unlike VPNs, which have their own app and affect all your connections, you can (and sometimes have to) configure proxies with each application separately. The setup process largely depends on the software you use. Here are the instructions for some of the most popular software:
When you get proxies, it’s important to test them. Most providers offer a free trial, or at least a money-back guarantee; use them. Doing so will reveal you several important things:
- If the proxy server works.
- If the IPs can access the websites you need.
- If the proxies make you anonymous.
- If they belong to the country you intended and use the right IP type.
You can learn how to test your proxies here.
Virtual Private Networks (VPNs) and proxies follow the same principle: they put an intermediary between you and the internet. However, people mostly use proxies for bulk tasks, to establish many connections at the same time. On the other hand, VPNs create one connection with increased privacy and security.
You can read more about their differences here.
Proxies are perfectly safe to use, as long as you’re getting them from a reputable proxy provider. Such companies have legal commitments, and it’s in their business interest to keep your data secure. However, you should be very careful with free proxy lists online. They are not safe and can cause much harm: from injecting ads into pages you visit, to outright stealing your personal information.
You can learn more about the dangers of free proxies here.
Are Proxies Legal?
Proxies themselves are legal. While you can’t always be sure where a proxy provider gets its IPs from (especially when it’s residential IPs), the use of proxy servers is not prohibited. What matters is how you use them. For example, ticket scalping is forbidden in the US, and web scraping is a legal gray area; so, you should always read the website’s policies and the robots.txt file before doing something with it.