Proxy Glossary
Updated January 2, 2026
The definitive guide to proxy terminology for the AI age. 93+ terms explained with practical context for developers, marketers, and automation professionals.
Showing 93 of 93 terms
Account Farming
Use CasesCreating and nurturing multiple accounts at scale. Common for social media marketing. Requires consistent device/IP fingerprints.
Ad Verification
Use CasesChecking ads appear correctly across regions/devices. Brands verify campaigns aren't showing on inappropriate sites. Requires diverse geo-locations.
AI Agent
AI & AutomationAutonomous AI system that performs tasks on the internet. In 2026, AI agents need proxies to access websites without getting blocked.
Airplane Mode
MobilePhone setting that disconnects from cellular. Toggling airplane mode forces a new IP from the carrier. How private proxy rotation works.
Anonymity
SecurityDegree to which your real identity is hidden. Mobile proxies provide high anonymity because traffic appears as normal mobile users.
Anonymous Proxy
SecurityProxy that hides your IP but identifies itself as a proxy. Websites know you're using a proxy but not your real IP.
Antidetect Browser
Anti-DetectionSpecialized browser that spoofs fingerprints and manages multiple identities. Essential for multi-account management. Popular options: GoLogin, AdsPower, Dolphin Anty.
API
AI & AutomationApplication Programming Interface - programmatic access to services. Our API lets you manage proxies, rotate IPs, and check usage programmatically.
ASN
NetworkAutonomous System Number - identifies networks on the internet. Mobile carrier ASNs (like AT&T, Vodafone) signal legitimate mobile traffic to websites.
Backconnect Proxy
OperationsSingle endpoint that rotates through multiple IPs. Simplifies configuration - one connection string, automatic rotation behind the scenes.
Bandwidth
NetworkAmount of data that can be transferred (measured in GB). Mobile proxy pricing is often per-GB because cellular data has real costs.
Bandwidth Pricing
BusinessCharging based on data transferred (per GB). Standard for mobile proxies due to cellular data costs. Our rates: $3.5-3.7/GB.
Blacklist
SecurityDatabase of blocked IP addresses. IPs get blacklisted for spam, abuse, or bot activity. Mobile IPs rarely get blacklisted due to CGNAT.
Bot Detection
Anti-BotSystems identifying automated traffic. Cloudflare, PerimeterX, DataDome analyze behavior, fingerprints, and IP reputation. Mobile IPs bypass most detection.
Browser Automation
AI & AutomationProgrammatic browser control for testing/scraping. Puppeteer, Playwright, Selenium. AI agents increasingly use browser automation with proxies.
Browser Fingerprint
FingerprintingUnique identifier created from browser characteristics (screen size, fonts, plugins). Even with a proxy, fingerprints can track you across sites.
Canvas Fingerprint
FingerprintingTracking method using HTML5 canvas rendering differences. Each device renders slightly differently. Antidetect browsers randomize this.
CAPTCHA
Anti-BotChallenge-response test to verify human users. reCAPTCHA, hCaptcha, Turnstile. Mobile IPs see fewer CAPTCHAs due to higher trust scores.
Carrier
MobileMobile network operator (AT&T, Verizon, Vodafone, etc.). Different carriers have different IP pools and reputations. We support multiple carriers per country.
CGNAT
NetworkCarrier-Grade NAT - how mobile carriers share limited IPv4 addresses among many users. This is why mobile IPs are trusted: platforms expect multiple accounts per IP.
Cloudflare
Anti-BotLeading CDN and security provider protecting millions of sites. Their bot detection is sophisticated but mobile IPs generally pass their checks.
Concurrent Connections
OperationsNumber of simultaneous proxy connections. Higher concurrency enables faster scraping. Plan limits may restrict concurrent connections.
Datacenter Proxy
Proxy TypesProxy hosted in data centers with non-ISP IP addresses. Fast and cheap but easily detected and blocked by most platforms. Best for non-sensitive bulk operations.
Dedicated Proxy
Proxy TypesA proxy reserved exclusively for your use. With mobile proxies, this means an entire physical modem dedicated to your traffic.
Device Fingerprint
FingerprintingIdentifier combining hardware/software characteristics. Mobile proxies from real phones have authentic device fingerprints that pass validation.
DNS
NetworkDomain Name System - translates domain names to IP addresses. DNS leaks can reveal your real location even when using a proxy.
DNS Leak
NetworkWhen DNS queries bypass your proxy and reveal your real IP/location. A critical privacy vulnerability. Always test for DNS leaks.
Elite Proxy
SecurityHighest anonymity level - hides both your IP and the fact you're using a proxy. Mobile proxies are naturally elite because they're real devices.
Endpoint
NetworkThe connection point for your proxy - typically host:port format. Each endpoint represents one proxy connection you can use.
Geo-Restriction
OperationsContent blocked based on location. Streaming services, local pricing, regional features. Proxies bypass geo-restrictions.
Geotargeting
OperationsSelecting proxies from specific locations. Access region-locked content or test localized experiences. We offer 15+ countries.
Headless Browser
Anti-DetectionBrowser without GUI for automated tasks. Puppeteer, Playwright, Selenium run headless. Modern anti-bot systems can detect headless mode.
HTTP Proxy
ProtocolsProxy handling HTTP traffic on port 80. Basic protocol for web browsing. Sufficient for many scraping tasks but doesn't encrypt traffic.
HTTP/2
ProtocolsModern HTTP protocol with multiplexing and header compression. Faster than HTTP/1.1. Most websites support it, and proper proxy support is essential.
HTTP/3
ProtocolsLatest HTTP protocol built on QUIC. Uses UDP instead of TCP for faster connections. Growing adoption in 2026 - advanced proxies must support it.
HTTPS Proxy
ProtocolsProxy handling encrypted HTTPS traffic on port 443. Standard for secure web communication. Supports SSL/TLS encryption end-to-end.
IP Address
NetworkUnique numerical identifier for devices on a network. IPv4 (like 192.168.1.1) or IPv6 (like 2001:db8::1). The core identity that proxies mask.
IP Authentication
SecurityAccess control based on IP address. Add your server IP to the whitelist to use proxies without username/password.
IP Reputation
SecurityTrust score assigned to IP addresses based on history. Fresh mobile IPs have excellent reputation. Abused IPs get blacklisted.
IP Rotation
OperationsChanging IP addresses periodically. Shared proxies rotate every 5 min, private every 1 min. Essential for avoiding detection and bans.
IPv4
Network32-bit IP address format (4.3 billion addresses). Still dominant but exhausted - reason why CGNAT exists. Most proxy services use IPv4.
IPv6
Network128-bit IP address format with virtually unlimited addresses. Growing adoption but many sites still IPv4-only. Advanced proxies support both.
JA3
FingerprintingTLS fingerprinting method hashing client hello parameters. Websites use JA3 to detect automated tools. Real mobile devices have trusted JA3 signatures.
JA4
FingerprintingNext-generation TLS fingerprinting improving on JA3. More granular detection. Part of the ongoing cat-and-mouse game between bots and anti-bot systems.
Latency
NetworkTime delay for data to travel between points (measured in ms). Lower is better. Mobile proxies typically have 50-200ms latency depending on location.
MCP
AI & AutomationModel Context Protocol - standard for AI assistants to interact with external tools. Our MCP server lets Claude/Cursor manage proxies via natural language.
Mobile Proxy
Proxy TypesA proxy using real 4G/5G cellular IP addresses from mobile carriers. The gold standard for 2026 - these IPs have the highest trust scores because they come from actual phones on carrier networks.
Modem
MobileHardware device connecting to cellular networks. Mobile proxy infrastructure uses 4G/5G modems with SIM cards for authentic mobile IPs.
Multi-Accounting
Use CasesManaging multiple accounts on a platform. Requires different IPs per account. Mobile proxies + antidetect browsers = industry standard.
NAT
NetworkNetwork Address Translation - maps private IPs to public IPs. Your home router does this. CGNAT does it at carrier scale.
P0F
FingerprintingPassive OS fingerprinting tool analyzing TCP/IP stack behavior. Detects operating system without active probing. Used to verify traffic authenticity.
Playwright
AI & AutomationMicrosoft's cross-browser automation library. Supports Chrome, Firefox, Safari. Modern choice for browser automation in 2026.
Port
NetworkNumbered endpoint for network connections. HTTP uses 80, HTTPS uses 443. Proxy endpoints are accessed via specific port numbers.
Port Pricing
BusinessCharging per proxy endpoint/connection. Combined with bandwidth for full pricing. Our rates: $18-40/port/month.
Price Monitoring
Use CasesTracking competitor prices across e-commerce sites. Dynamic pricing means prices change by location/device. Proxies reveal true prices.
Private Proxy
Proxy TypesDedicated proxy exclusively for one user. Premium option for sensitive operations requiring consistent device fingerprints and maximum control.
Proxy Pool
OperationsCollection of available proxy IPs. Larger pools mean more IPs to rotate through. Mobile proxy pools contain thousands of real device IPs.
Proxy Server
Core ConceptsAn intermediary server that routes your internet traffic, masking your real IP address. In 2026, proxies are essential infrastructure for AI agents, web scraping, and privacy-conscious businesses.
Puppeteer
AI & AutomationNode.js library for Chrome automation. Popular for scraping and testing. Works seamlessly with proxy configuration.
Rate Limiting
Anti-BotRestricting request frequency from an IP. Exceeding limits triggers blocks. Rotating proxies distribute requests across IPs to avoid limits.
Residential Proxy
Proxy TypesProxy using IP addresses assigned to home internet connections. Good trust scores but increasingly detected by sophisticated anti-bot systems compared to mobile IPs.
Rotating Proxy
Proxy TypesProxy that automatically changes IP addresses at set intervals or per request. Essential for large-scale scraping and avoiding rate limits.
Scrapy
AI & AutomationPython framework for large-scale web scraping. Efficient and scalable. Proxy middleware integrates mobile proxies easily.
Selenium
AI & AutomationVeteran browser automation framework. Supports multiple languages. Still widely used despite newer alternatives.
SEO Monitoring
Use CasesTracking search rankings across locations. Google results vary by geography. Proxies check rankings from different regions.
SERP
Use CasesSearch Engine Results Page. SEO tools scrape SERPs to track rankings. AI-powered search (Perplexity, SearchGPT) adds new SERP types to monitor.
Session
OperationsPeriod maintaining the same IP address. Sticky sessions keep IPs for account operations. Session length varies by proxy type.
Shared Proxy
Proxy TypesProxy endpoint shared among multiple users. Cost-effective for scraping where you benefit from the natural traffic patterns of multiple users sharing IPs.
SIM Card
MobileSubscriber Identity Module - authenticates device to carrier network. Each mobile proxy modem has a SIM card for real carrier connectivity.
SLA
BusinessService Level Agreement - guaranteed service parameters. Defines uptime commitments, support response times, and remedies for failures.
Sneaker Botting
Use CasesUsing bots to purchase limited-release sneakers. Highly competitive - requires fastest proxies with clean IPs. Mobile proxies preferred.
SOCKS4
ProtocolsOlder SOCKS version without authentication or UDP support. Largely superseded by SOCKS5 but still supported for legacy compatibility.
SOCKS5
ProtocolsVersatile protocol supporting any traffic type (TCP/UDP). More flexible than HTTP proxies - handles everything from web browsing to gaming to torrents.
SSL/TLS
ProtocolsEncryption protocols securing internet communications. TLS 1.3 is the current standard in 2026, providing both security and performance improvements.
Static Proxy
Proxy TypesProxy with a fixed IP address that doesn't change. Ideal for account management where consistent identity is required.
Stealth Mode
Anti-DetectionTechniques to make automated browsers appear human. Includes hiding automation flags, mimicking human behavior, and proper fingerprint management.
Sticky Session
OperationsMaintaining the same IP for a set duration. Critical for logged-in operations where IP changes would trigger security alerts.
Success Rate
BusinessPercentage of requests that complete successfully. Our mobile proxies achieve 92%+ success rates on major platforms.
Throttling
Anti-BotSlowing down requests rather than blocking. Websites throttle suspected bots. Proper delays between requests avoid triggering throttles.
TLS Fingerprint
FingerprintingUnique signature from how your client negotiates TLS connections. JA3/JA4 fingerprints can identify bots. Mobile devices have distinctive TLS patterns.
Transparent Proxy
SecurityProxy that reveals both your IP and proxy usage. Used by ISPs and corporate networks. Offers no privacy benefits.
Uptime
BusinessPercentage of time service is operational. We maintain 95%+ uptime. Critical for production workloads relying on proxy availability.
User Agent
Anti-DetectionString identifying your browser/device to websites. Proper user agent rotation is critical - mismatched user agents trigger bot detection.
Username Authentication
SecurityAccess control via username:password credentials. More flexible than IP auth - works from any location.
WAF
Anti-BotWeb Application Firewall - filters malicious traffic. Cloudflare, AWS WAF, Akamai. May block proxy IPs with poor reputation.
Web Scraping
Use CasesAutomated data extraction from websites. The #1 proxy use case. Mobile proxies excel because they're rarely blocked.
WebGL Fingerprint
FingerprintingFingerprinting via 3D graphics rendering characteristics. Reveals GPU information. Another vector for tracking across sessions.
WebRTC Leak
NetworkBrowser vulnerability that can expose your real IP even through a proxy. Caused by WebRTC peer-to-peer features. Disable WebRTC for maximum anonymity.
Whitelist
SecurityList of approved IPs allowed to access a resource. Often used for API access or admin panels. Your proxy IPs may need whitelisting.
Ready to Use These Concepts?
Put your knowledge into practice with real 4G/5G mobile proxies. Starting at $36/mo for 1 port + 5GB bandwidth.
Buy ProxiesLast updated: January 2, 2026 | 93 terms