Dictionary All Terms
API
Application Programming Interface. A set of protocols and tools that allows different software applications to communicate with each other. In the context of proxies, APIs enable programmatic control over proxy selection, rotation, and management.
Backconnect Proxy
A proxy server that automatically rotates IP addresses with each request or at set intervals. Users connect to a single endpoint, and the provider handles IP rotation on the backend.
Bandwidth
The amount of data that can be transferred through a proxy connection in a given time period. Proxy services typically measure and bill based on bandwidth usage (in GB).
Bot Detection
Systems and techniques used by websites to identify and block automated traffic, including scraping bots. Common methods include CAPTCHAs, fingerprinting, and behavioral analysis.
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart. A challenge-response test used to determine whether a user is human, commonly encountered during web scraping.
Concurrent Connections
The number of simultaneous connections that can be active through a proxy at the same time. Higher concurrency allows for faster data collection across multiple targets.
Datacenter Proxy
Proxies hosted in data centers rather than on residential ISP networks. They offer high speed and reliability but are easier to detect as they come from known datacenter IP ranges.
Dedicated Proxy
A proxy IP address exclusively assigned to a single user. Also known as private proxies, they offer consistent performance and are not shared with other users.
DNS
Domain Name System. The system that translates human-readable domain names into IP addresses. DNS leaks through proxies can reveal your true location.
Endpoint
A specific URL or connection point for accessing a proxy service. Endpoints typically include host address, port number, and authentication parameters.
Fingerprinting
The technique of collecting unique characteristics of a browser or device to identify and track users. Used by websites to detect bots and proxies.
Gateway
The entry point for proxy connections. A gateway server receives client requests and routes them through the appropriate proxy IPs in the pool.
Geo-Targeting
The practice of selecting proxy IPs from specific geographic locations. Essential for accessing region-locked content or collecting location-specific data.
Geolocation
The geographic location associated with an IP address. Proxy services offer geo-targeting to appear as if browsing from specific countries, cities, or regions.
HTTP Proxy
A proxy server that handles HTTP and HTTPS traffic. The most common type of proxy for web scraping and general browsing.
IP Address
Internet Protocol Address. A unique numerical identifier assigned to each device connected to a network. Proxies mask your real IP with a different address.
IP Pool
A collection of IP addresses available for use through a proxy service. Larger pools provide more variety and reduce the chance of IP bans.
IP Rotation
The practice of automatically switching between different IP addresses during web requests. Helps avoid detection and IP-based blocking.
ISP Proxy
Static residential proxies that combine the legitimacy of residential IPs with the reliability of datacenter infrastructure. Registered with Internet Service Providers.
Latency
The time delay between sending a request through a proxy and receiving a response. Lower latency means faster connections and better performance.
Mobile Proxy
Proxies using IP addresses from mobile carrier networks (3G, 4G, 5G). Highly trusted by websites due to the dynamic nature of mobile IPs.
Pay-As-You-Go (PAYG)
A billing model where users pay only for the bandwidth or resources they consume, without monthly commitments or minimum usage requirements.
Port
A numerical identifier for specific network services. Proxy servers listen on designated ports (e.g., 8080, 3128) for incoming connections.
Proxy Authentication
The process of verifying user identity before allowing proxy access. Common methods include username/password and IP whitelisting.
Rate Limiting
A technique used by websites to control the number of requests a user can make within a time period. Proxies help distribute requests to avoid rate limits.
Residential Proxy
Proxies that use IP addresses assigned by Internet Service Providers to homeowners. They appear as regular users and are harder to detect and block.
Rotating Proxy
A proxy that automatically changes the IP address with each request or at specified intervals. Ideal for large-scale scraping to avoid detection.
Scraping
Web scraping is the automated extraction of data from websites. Proxies are essential for scraping at scale to avoid IP blocks and access geo-restricted content.
Session
A period during which a user maintains the same proxy IP address. Sticky sessions allow maintaining identity across multiple requests.
SOCKS Proxy
Socket Secure proxy protocol that handles any type of traffic, not just HTTP. SOCKS5 supports UDP and authentication.
Static Proxy
A proxy with a fixed IP address that doesn't change. Useful for tasks requiring consistent identity like account management.
Sticky Session
A session type where the same IP address is maintained for a specified duration or number of requests, allowing persistent identity.
Subnet
A logical subdivision of an IP network. Diverse subnets in a proxy pool provide better anonymity and reduce the chance of mass blocking.
Success Rate
The percentage of proxy requests that complete successfully without errors or blocks. A key metric for evaluating proxy quality.
TLS/SSL
Transport Layer Security/Secure Sockets Layer. Encryption protocols that secure data transmitted through proxies. HTTPS uses TLS.
Uptime
The percentage of time a proxy service is operational and available. Enterprise proxies typically guarantee 99.9% uptime.
User-Agent
A string that identifies the browser and operating system to web servers. Rotating user agents with proxies helps avoid detection.
Whitelist
An IP whitelist allows connections only from approved IP addresses. Used for proxy authentication without username/password.
Support Still Have Questions?
Our support team is here to help you understand proxy technology.