
What do you fear the most when you use a proxy IP? It's not the slow speed of the Internet, nor is the IP blocked, but you thought you were hiding it tightly, but the real IP has been seen through! Today, we will teach you three earth methods, without the use of professional tools can be pulled out of those "fake high stash" proxy, incidentally, we ipipgo how to help you hide the identity of the network even the mother can not be recognized.
Tip #1: Strip the head of the request to see through the agent's underpants
This trick is like checking the courier number, the target server will always receive the request with a bunch of "small notes". Focus on three places:
① REMOTE_ADDR: It must show the proxy IP, if it pops up your home broadband's IP address, change the proxy!
② X-Forwarded-For: Any IP information in this field (even if it's not yours) means the proxy is running naked!
③ Via fieldThe Golgotha agent shouldn't have been there at all, just like you shouldn't leave footprints in a cloak of invisibility.
For example, if you use ipipgo's high stash node to access httpbin.org/headers, the results are exactly the same as if you were a normal user surfing the web, and the fields that could reveal your identity have been filtered out. If you see any of these fields in your test, don't hesitate to ask, the proxy is definitely an imposter!
Tip #2: Plug the three leaks, don't let information leak into a sieve
Some proxies look fine, but actually leak information from strange places like a leaky spoon. Focus on checking these three vulnerabilities:
| water leak | Detection Methods | qualified performance |
|---|---|---|
| DNS leak | Visit ipleak.net to see the DNS server addresses | Must show the operator of the agent's location |
| WebRTC vulnerability | Type about:config in your browser to turn off media.peerconnection | Detection of the site can not find the real IP |
| Protocol Fingerprinting | Packet capture with Wireshark to see handshake intervals | To have random fluctuations operated by real people |
ipipgo's proxy comes withDNS tunnelingThe problem of DNS leakage has been solved only after we changed our residential IP address. Previously, there is an old man doing data collection, changed three proxies are planted in the DNS leakage, replaced with our residential IP before completely solved the problem.
Tip #3: Act like a person, don't be a robot
Even if you pass the first two hurdles, websites can still catch people by their behavioral traits. A guide to teach you the three tricks of pretending to be a person:
① Visit at a Buddhist paceDon't click like you're grabbing a red packet. You have to space it out.
② Operation path should be arbitrary: Don't always click on the menu in a fixed order, browse a few more unrelated pages
③ Device fingerprints should be confusing: change browsers every time you visit, UA don't use the same one all the time!
An e-commerce friend with a common proxy total trigger CAPTCHA, changed to ipipgo dynamic residential IP, with random click interval function, continuous operation for three days have not been recognized. Why? Because our IP from the real home network, Internet behavior and real people exactly the same!
Frequently Asked Questions First Aid Kit
Q: Why is it still blocked even after the test?
A: eighty percent of the IP was used by the former bad, ipipgo's 90 million + residential IP pool automatically updated every hour, the probability of being blocked than the lottery winners are also low!
Q: How do I detect it on my cell phone?
A: Android open developer mode to see the network details, iOS with ipipgo's mobile detection tool scanning code on it, remember to turn off the positioning authority
Q: It clearly shows a high stash, but the site wants to verify it?
A: Try switching the protocol type, ipipgo supports HTTP/HTTPS/SOCKS5 protocols, there is always one that can be fooled!
In the end, choosing a high stash of agents is similar to looking for a partner, it's useless to just look at the ads, you have to verify them in real life. Our ipipgo's residential IP covers more than 240 countries and regions, and every time after the test can also generateAnonymous medical reportsThe company's online identity will be hidden in a safe and secure place!

