Proxy Server
Also known as: Proxy, HTTP proxy, SOCKS proxy
An intermediary server that forwards traffic between a client and a destination, masking the client's original IP address from the destination.
Last updated:
What is a proxy server?
A proxy server sits between a client (a browser, app, or script) and a destination server, receiving the client's request, forwarding it, and relaying the response back. From the destination's perspective, the request appears to come from the proxy's IP address, not the client's. Proxies are used to mask the client's original IP, cache content, enforce access policies, filter traffic, or bypass geographic restrictions.
Types of proxy
The proxy ecosystem has diverged into several categories that behave quite differently:
- HTTP/HTTPS proxies — understand HTTP semantics and can inspect, modify, or cache requests. Common in corporate networks.
- SOCKS proxies (SOCKS4, SOCKS5) — protocol-agnostic TCP (and optional UDP) forwarders. Work for any TCP-based protocol, not just HTTP.
- Transparent proxies — intercept traffic without client-side configuration, used by ISPs and public Wi-Fi networks
- Reverse proxies (nginx, HAProxy, Cloudflare) — sit in front of servers rather than clients, for load balancing and TLS termination
- Residential proxies — use IPs from real consumer ISPs, making detection much harder than datacenter proxies
- Datacenter proxies — use IPs from hosting providers; cheaper but easier to detect and block
Proxy vs. VPN vs. Tor
All three mask the client's IP, but they differ in scope and trust model:
- A proxy usually routes one application's traffic (often just a browser) and typically offers no encryption between client and proxy.
- A VPN encrypts and routes all of the device's traffic through one tunnel.
- Tor routes traffic through three volunteer-operated relays with layered encryption, providing much stronger anonymity at the cost of latency.
Proxy IPs are also widely flagged in GeoIP and threat-intelligence feeds, because they're the cheapest option for scraping and abuse. Our IP lookup flags known proxy, VPN, and Tor exit IPs on every result.