Proxy Glossary

Updated January 2, 2026

The definitive guide to proxy terminology for the AI age. 93+ terms explained with practical context for developers, marketers, and automation professionals.

Showing 93 of 93 terms

A(9 terms)

Account Farming

Use Cases

Creating and nurturing multiple accounts at scale. Common for social media marketing. Requires consistent device/IP fingerprints.

Checking ads appear correctly across regions/devices. Brands verify campaigns aren't showing on inappropriate sites. Requires diverse geo-locations.

AI Agent

AI & Automation

Autonomous AI system that performs tasks on the internet. In 2026, AI agents need proxies to access websites without getting blocked.

Airplane Mode

Mobile

Phone setting that disconnects from cellular. Toggling airplane mode forces a new IP from the carrier. How private proxy rotation works.

Anonymity

Security

Degree to which your real identity is hidden. Mobile proxies provide high anonymity because traffic appears as normal mobile users.

Anonymous Proxy

Security

Proxy that hides your IP but identifies itself as a proxy. Websites know you're using a proxy but not your real IP.

Antidetect Browser

Anti-Detection

Specialized browser that spoofs fingerprints and manages multiple identities. Essential for multi-account management. Popular options: GoLogin, AdsPower, Dolphin Anty.

API

AI & Automation

Application Programming Interface - programmatic access to services. Our API lets you manage proxies, rotate IPs, and check usage programmatically.

Related:REST API,MCP

ASN

Network

Autonomous System Number - identifies networks on the internet. Mobile carrier ASNs (like AT&T, Vodafone) signal legitimate mobile traffic to websites.

B(7 terms)

Backconnect Proxy

Operations

Single endpoint that rotates through multiple IPs. Simplifies configuration - one connection string, automatic rotation behind the scenes.

Bandwidth

Network

Amount of data that can be transferred (measured in GB). Mobile proxy pricing is often per-GB because cellular data has real costs.

Charging based on data transferred (per GB). Standard for mobile proxies due to cellular data costs. Our rates: $3.5-3.7/GB.

Blacklist

Security

Database of blocked IP addresses. IPs get blacklisted for spam, abuse, or bot activity. Mobile IPs rarely get blacklisted due to CGNAT.

Bot Detection

Anti-Bot

Systems identifying automated traffic. Cloudflare, PerimeterX, DataDome analyze behavior, fingerprints, and IP reputation. Mobile IPs bypass most detection.

Browser Automation

AI & Automation

Programmatic browser control for testing/scraping. Puppeteer, Playwright, Selenium. AI agents increasingly use browser automation with proxies.

Browser Fingerprint

Fingerprinting

Unique identifier created from browser characteristics (screen size, fonts, plugins). Even with a proxy, fingerprints can track you across sites.

C(6 terms)

Canvas Fingerprint

Fingerprinting

Tracking method using HTML5 canvas rendering differences. Each device renders slightly differently. Antidetect browsers randomize this.

CAPTCHA

Anti-Bot

Challenge-response test to verify human users. reCAPTCHA, hCaptcha, Turnstile. Mobile IPs see fewer CAPTCHAs due to higher trust scores.

Carrier

Mobile

Mobile network operator (AT&T, Verizon, Vodafone, etc.). Different carriers have different IP pools and reputations. We support multiple carriers per country.

CGNAT

Network

Carrier-Grade NAT - how mobile carriers share limited IPv4 addresses among many users. This is why mobile IPs are trusted: platforms expect multiple accounts per IP.

Cloudflare

Anti-Bot

Leading CDN and security provider protecting millions of sites. Their bot detection is sophisticated but mobile IPs generally pass their checks.

Concurrent Connections

Operations

Number of simultaneous proxy connections. Higher concurrency enables faster scraping. Plan limits may restrict concurrent connections.

D(5 terms)

Datacenter Proxy

Proxy Types

Proxy hosted in data centers with non-ISP IP addresses. Fast and cheap but easily detected and blocked by most platforms. Best for non-sensitive bulk operations.

Dedicated Proxy

Proxy Types

A proxy reserved exclusively for your use. With mobile proxies, this means an entire physical modem dedicated to your traffic.

Device Fingerprint

Fingerprinting

Identifier combining hardware/software characteristics. Mobile proxies from real phones have authentic device fingerprints that pass validation.

DNS

Network

Domain Name System - translates domain names to IP addresses. DNS leaks can reveal your real location even when using a proxy.

DNS Leak

Network

When DNS queries bypass your proxy and reveal your real IP/location. A critical privacy vulnerability. Always test for DNS leaks.

E(2 terms)

Elite Proxy

Security

Highest anonymity level - hides both your IP and the fact you're using a proxy. Mobile proxies are naturally elite because they're real devices.

Endpoint

Network

The connection point for your proxy - typically host:port format. Each endpoint represents one proxy connection you can use.

G(2 terms)

Geo-Restriction

Operations

Content blocked based on location. Streaming services, local pricing, regional features. Proxies bypass geo-restrictions.

Geotargeting

Operations

Selecting proxies from specific locations. Access region-locked content or test localized experiences. We offer 15+ countries.

H(5 terms)

Headless Browser

Anti-Detection

Browser without GUI for automated tasks. Puppeteer, Playwright, Selenium run headless. Modern anti-bot systems can detect headless mode.

HTTP Proxy

Protocols

Proxy handling HTTP traffic on port 80. Basic protocol for web browsing. Sufficient for many scraping tasks but doesn't encrypt traffic.

HTTP/2

Protocols

Modern HTTP protocol with multiplexing and header compression. Faster than HTTP/1.1. Most websites support it, and proper proxy support is essential.

Related:HTTP/3,QUIC

HTTP/3

Protocols

Latest HTTP protocol built on QUIC. Uses UDP instead of TCP for faster connections. Growing adoption in 2026 - advanced proxies must support it.

Related:HTTP/2,QUIC

HTTPS Proxy

Protocols

Proxy handling encrypted HTTPS traffic on port 443. Standard for secure web communication. Supports SSL/TLS encryption end-to-end.

I(6 terms)

IP Address

Network

Unique numerical identifier for devices on a network. IPv4 (like 192.168.1.1) or IPv6 (like 2001:db8::1). The core identity that proxies mask.

IP Authentication

Security

Access control based on IP address. Add your server IP to the whitelist to use proxies without username/password.

IP Reputation

Security

Trust score assigned to IP addresses based on history. Fresh mobile IPs have excellent reputation. Abused IPs get blacklisted.

IP Rotation

Operations

Changing IP addresses periodically. Shared proxies rotate every 5 min, private every 1 min. Essential for avoiding detection and bans.

IPv4

Network

32-bit IP address format (4.3 billion addresses). Still dominant but exhausted - reason why CGNAT exists. Most proxy services use IPv4.

Related:IPv6,CGNAT

IPv6

Network

128-bit IP address format with virtually unlimited addresses. Growing adoption but many sites still IPv4-only. Advanced proxies support both.

J(2 terms)

JA3

Fingerprinting

TLS fingerprinting method hashing client hello parameters. Websites use JA3 to detect automated tools. Real mobile devices have trusted JA3 signatures.

JA4

Fingerprinting

Next-generation TLS fingerprinting improving on JA3. More granular detection. Part of the ongoing cat-and-mouse game between bots and anti-bot systems.

L(2 terms)

Latency

Network

Time delay for data to travel between points (measured in ms). Lower is better. Mobile proxies typically have 50-200ms latency depending on location.

LTE

Mobile

Long-Term Evolution - the technology behind 4G networks. LTE proxies offer reliable speeds and excellent IP reputation.

M(4 terms)

MCP

AI & Automation

Model Context Protocol - standard for AI assistants to interact with external tools. Our MCP server lets Claude/Cursor manage proxies via natural language.

Related:AI Agent,API

Mobile Proxy

Proxy Types

A proxy using real 4G/5G cellular IP addresses from mobile carriers. The gold standard for 2026 - these IPs have the highest trust scores because they come from actual phones on carrier networks.

Modem

Mobile

Hardware device connecting to cellular networks. Mobile proxy infrastructure uses 4G/5G modems with SIM cards for authentic mobile IPs.

Managing multiple accounts on a platform. Requires different IPs per account. Mobile proxies + antidetect browsers = industry standard.

N(1 terms)

NAT

Network

Network Address Translation - maps private IPs to public IPs. Your home router does this. CGNAT does it at carrier scale.

P(9 terms)

P0F

Fingerprinting

Passive OS fingerprinting tool analyzing TCP/IP stack behavior. Detects operating system without active probing. Used to verify traffic authenticity.

Playwright

AI & Automation

Microsoft's cross-browser automation library. Supports Chrome, Firefox, Safari. Modern choice for browser automation in 2026.

Port

Network

Numbered endpoint for network connections. HTTP uses 80, HTTPS uses 443. Proxy endpoints are accessed via specific port numbers.

Port Pricing

Business

Charging per proxy endpoint/connection. Combined with bandwidth for full pricing. Our rates: $18-40/port/month.

Tracking competitor prices across e-commerce sites. Dynamic pricing means prices change by location/device. Proxies reveal true prices.

Private Proxy

Proxy Types

Dedicated proxy exclusively for one user. Premium option for sensitive operations requiring consistent device fingerprints and maximum control.

Proxy Pool

Operations

Collection of available proxy IPs. Larger pools mean more IPs to rotate through. Mobile proxy pools contain thousands of real device IPs.

Proxy Server

Core Concepts

An intermediary server that routes your internet traffic, masking your real IP address. In 2026, proxies are essential infrastructure for AI agents, web scraping, and privacy-conscious businesses.

Puppeteer

AI & Automation

Node.js library for Chrome automation. Popular for scraping and testing. Works seamlessly with proxy configuration.

Q(1 terms)

QUIC

Protocols

Google-developed transport protocol underlying HTTP/3. Reduces latency with 0-RTT connections. Critical for next-gen proxy infrastructure.

Related:HTTP/3,UDP
R(3 terms)

Rate Limiting

Anti-Bot

Restricting request frequency from an IP. Exceeding limits triggers blocks. Rotating proxies distribute requests across IPs to avoid limits.

Residential Proxy

Proxy Types

Proxy using IP addresses assigned to home internet connections. Good trust scores but increasingly detected by sophisticated anti-bot systems compared to mobile IPs.

Rotating Proxy

Proxy Types

Proxy that automatically changes IP addresses at set intervals or per request. Essential for large-scale scraping and avoiding rate limits.

S(16 terms)

Scrapy

AI & Automation

Python framework for large-scale web scraping. Efficient and scalable. Proxy middleware integrates mobile proxies easily.

Selenium

AI & Automation

Veteran browser automation framework. Supports multiple languages. Still widely used despite newer alternatives.

SEO Monitoring

Use Cases

Tracking search rankings across locations. Google results vary by geography. Proxies check rankings from different regions.

SERP

Use Cases

Search Engine Results Page. SEO tools scrape SERPs to track rankings. AI-powered search (Perplexity, SearchGPT) adds new SERP types to monitor.

Session

Operations

Period maintaining the same IP address. Sticky sessions keep IPs for account operations. Session length varies by proxy type.

Shared Proxy

Proxy Types

Proxy endpoint shared among multiple users. Cost-effective for scraping where you benefit from the natural traffic patterns of multiple users sharing IPs.

SIM Card

Mobile

Subscriber Identity Module - authenticates device to carrier network. Each mobile proxy modem has a SIM card for real carrier connectivity.

SLA

Business

Service Level Agreement - guaranteed service parameters. Defines uptime commitments, support response times, and remedies for failures.

Using bots to purchase limited-release sneakers. Highly competitive - requires fastest proxies with clean IPs. Mobile proxies preferred.

SOCKS4

Protocols

Older SOCKS version without authentication or UDP support. Largely superseded by SOCKS5 but still supported for legacy compatibility.

Related:SOCKS5

SOCKS5

Protocols

Versatile protocol supporting any traffic type (TCP/UDP). More flexible than HTTP proxies - handles everything from web browsing to gaming to torrents.

SSL/TLS

Protocols

Encryption protocols securing internet communications. TLS 1.3 is the current standard in 2026, providing both security and performance improvements.

Static Proxy

Proxy Types

Proxy with a fixed IP address that doesn't change. Ideal for account management where consistent identity is required.

Stealth Mode

Anti-Detection

Techniques to make automated browsers appear human. Includes hiding automation flags, mimicking human behavior, and proper fingerprint management.

Sticky Session

Operations

Maintaining the same IP for a set duration. Critical for logged-in operations where IP changes would trigger security alerts.

Success Rate

Business

Percentage of requests that complete successfully. Our mobile proxies achieve 92%+ success rates on major platforms.

T(3 terms)

Throttling

Anti-Bot

Slowing down requests rather than blocking. Websites throttle suspected bots. Proper delays between requests avoid triggering throttles.

TLS Fingerprint

Fingerprinting

Unique signature from how your client negotiates TLS connections. JA3/JA4 fingerprints can identify bots. Mobile devices have distinctive TLS patterns.

Transparent Proxy

Security

Proxy that reveals both your IP and proxy usage. Used by ISPs and corporate networks. Offers no privacy benefits.

U(3 terms)

Uptime

Business

Percentage of time service is operational. We maintain 95%+ uptime. Critical for production workloads relying on proxy availability.

User Agent

Anti-Detection

String identifying your browser/device to websites. Proper user agent rotation is critical - mismatched user agents trigger bot detection.

Username Authentication

Security

Access control via username:password credentials. More flexible than IP auth - works from any location.

W(5 terms)

WAF

Anti-Bot

Web Application Firewall - filters malicious traffic. Cloudflare, AWS WAF, Akamai. May block proxy IPs with poor reputation.

Web Scraping

Use Cases

Automated data extraction from websites. The #1 proxy use case. Mobile proxies excel because they're rarely blocked.

WebGL Fingerprint

Fingerprinting

Fingerprinting via 3D graphics rendering characteristics. Reveals GPU information. Another vector for tracking across sessions.

WebRTC Leak

Network

Browser vulnerability that can expose your real IP even through a proxy. Caused by WebRTC peer-to-peer features. Disable WebRTC for maximum anonymity.

Whitelist

Security

List of approved IPs allowed to access a resource. Often used for API access or admin panels. Your proxy IPs may need whitelisting.

Ready to Use These Concepts?

Put your knowledge into practice with real 4G/5G mobile proxies. Starting at $36/mo for 1 port + 5GB bandwidth.

Buy Proxies

Last updated: January 2, 2026 | 93 terms