{"id":6307,"date":"2023-10-18T14:47:43","date_gmt":"2023-10-18T14:47:43","guid":{"rendered":"https:\/\/royadata.io\/blog\/?p=6307"},"modified":"2023-10-18T14:47:43","modified_gmt":"2023-10-18T14:47:43","slug":"proxy-terms-and-definitions","status":"publish","type":"post","link":"http:\/\/royadata.io\/blog\/proxy-terms-and-definitions\/","title":{"rendered":"16 Proxy Terms and Definitions \u2013 A Complete Guide"},"content":{"rendered":"<blockquote>\n<p>Getting into the wonderful world of proxies can seem like a daunting task for newcomers. A quick look online for, \u201cproxy terms and definitions\u201d will reveal multiple sources and often conflicting information.<\/p>\n<\/blockquote>\n<p><picture class=\"aligncenter size-full wp-image-844 perfmatters-lazy\" loading=\"lazy\"><source type=\"image\/webp\" data-srcset=\"https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions.jpg.webp 922w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-300x167.jpg.webp 300w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-768x426.jpg.webp 768w\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%20922%20512'%3E%3C\/svg%3E\" data-sizes=\"(max-width: 922px) 100vw, 922px\" \/><img decoding=\"async\" src=\"data:image\/svg+xml,%3Csvg%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20viewBox='0%200%20922%20512'%3E%3C\/svg%3E\" alt=\"proxy terms and definitions\" width=\"922\" height=\"512\" data-src=\"https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions.jpg\" data-srcset=\"https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions.jpg 922w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-300x167.jpg 300w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-768x426.jpg 768w\" data-sizes=\"(max-width: 922px) 100vw, 922px\" loading=\"lazy\" \/>\n<\/picture>\n<noscript><picture class=\"aligncenter size-full wp-image-844\"><source type=\"image\/webp\" srcset=\"https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions.jpg.webp 922w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-300x167.jpg.webp 300w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-768x426.jpg.webp 768w\" sizes=\"(max-width: 922px) 100vw, 922px\"\/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions.jpg\" alt=\"proxy terms and definitions\" width=\"922\" height=\"512\" srcset=\"https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions.jpg 922w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-300x167.jpg 300w, https:\/\/royadata.io\/blog\/wp-content\/uploads\/2023\/10\/proxy-terms-and-definitions-768x426.jpg 768w\" sizes=\"(max-width: 922px) 100vw, 922px\"\/>\n<\/picture>\n<\/noscript><\/p>\n<p>You\u2019ll find conflicting information on proxies online because there are conflicting interests at the heart of using proxies. Some people associate them exclusively with black hat web practices, while others legitimately use proxies for to achieve business objectives that are valuable, legal, and ethically sound.<\/p>\n<p>In a situation like this, the best thing you can do is educate yourself on the terms and definitions used in this industry. Only informed users can cut through proxy jargon to get to the heart of the matter.<\/p>\n<hr\/>\n<h2 id=\"a-complete-guide-to-proxy-terms-and-definitions\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"A_Complete_Guide_to_Proxy_Terms_and_Definitions\"><\/span>A Complete Guide to Proxy Terms and Definitions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The following proxy glossary is designed to educate people expressing initial interest in proxy technology. It contains both simple and advanced terms, defined in everyday language that you can understand without a 4-year degree in computer science:<\/p>\n<hr\/>\n<h3 id=\"1-ip-address\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"1_IP_Address\"><\/span>1. IP Address<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Your IP address is a code that uniquely identifies a network device, like a computer or a smartphone. It\u2019s often described by analogy like a physical street address, but there is an important distinction \u2013 because the code is logical (not arbitrary like a street address), it can change. Use <strong><a href=\"https:\/\/whatismyipaddress.com\/\"  rel=\"noopener noreferrer\">WhatIsMyIPAddress<\/a><\/strong> to find what yours is right now.<\/p>\n<p>Since your IP address is the principal identifier for your device on a network, your proxy\u2019s main job is to mask that IP address and replace it with a di\ufb00erent one. There are many ways to do this, so there are <a href=\"https:\/\/royadata.io\/blog\/different-types-of-proxies\/\"><strong>many di\ufb00erent types of proxies<\/strong><\/a>.<\/p>\n<hr\/>\n<h3 id=\"2-port\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"2_Port\"><\/span>2. Port<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If an IP address is like a residential mailing address, then a port is more like an individual mailbox \u2013 except every address has thousands of individual ones. Essentially, ports transmit specific types of information and are organized in such a way that data remains e\ufb03ciently categorized no matter where you\u2019re sending it.<\/p>\n<p>For instance, <a href=\"https:\/\/serversmtp.com\/port-for-smtp\/\"  rel=\"noopener noreferrer\"><strong>port 25<\/strong><\/a> is the default outgoing port for email. Your computer uses this system of ports (there are thousands) to determine what kind of data it is sending or receiving \u2013 that\u2019s how emails end up in inboxes instead of, for instance, on an HTTP web browser (which uses <a href=\"http:\/\/www.pearsonitcertification.com\/articles\/article.aspx?p=1868080\"  rel=\"noopener noreferrer\"><strong>port80<\/strong><\/a>).<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/proxy-compatibility\/\">Ports Necessary for Communications<\/a><\/li>\n<\/ul>\n<hr\/>\n<h3 id=\"3-web-scrapers\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"3_Web_Scrapers\"><\/span>3. Web Scrapers<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Web scraping is the automated process of gathering data from an online resource \u2013 usually a website or archive. Since web pages are generally made for human users, collecting large amounts of data is not always easy or feasible. <strong><a href=\"https:\/\/www.privateproxyreviews.com\/web-scraping-python-scraper-tools\/\">Web scrapers<\/a><\/strong> are tools that automate this, often using proxies.<\/p>\n<p>Scraping a website involves asking its server to work very hard providing all of the data requested. For this reason, most administrators try to limit the ability for web scrapers to automatically gather data. Proxies are one-way users get around these limits.<\/p>\n<hr\/>\n<h3 id=\"4-selenium\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"4_Selenium\"><\/span>4. Selenium<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><strong><a href=\"https:\/\/www.seleniumhq.org\/\"  rel=\"noopener noreferrer\">Selenium<\/a><\/strong> is a tool used by web scrapers to mimic the activity of a human end-user while scraping websites for data behind a proxy. It automates web browser commands so that the websites you try to access believe they are responding to a real human being.<\/p>\n<p>When used with proxies, Selenium allows users to anonymously gather data from websites in a safe, e\ufb03cient manner. Rather than accessing the website directly, you use a proxy and a web browser to make requests.<\/p>\n<p>You can read more about how to <a href=\"https:\/\/www.bestproxyreviews.com\/building-a-web-crawler-using-selenium-and-proxies\"><strong>build your own crawler with selenium<\/strong><\/a>.<\/p>\n<hr\/>\n<h3 id=\"5-transparent-proxies\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"5_Transparent_Proxies\"><\/span>5. Transparent Proxies<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The type of proxy that most users will be immediately familiar with is the transparent proxy. When you sign onto the Internet at your local co\ufb00ee shop and the coffee shop\u2019s network asks you to agree to its terms and conditions, it is putting you through a transparent proxy.<\/p>\n<p>The reason it\u2019s called a transparent proxy is that you, the user, are generally not aware it\u2019s working. It makes no attempt to hide your identity and simply processes requests to external networks. Corporate proxies that limit employees\u2019 access to forbidden websites are also transparent proxies.<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/php-detect-proxy-anonymity-level\/\">How to Detect Proxy Anonymity Level Using PHP<\/a><\/li>\n<\/ul>\n<hr\/>\n<h3 id=\"6-residential-proxies\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"6_Residential_Proxies\"><\/span>6. Residential Proxies<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/royadata.io\/blog\/residential-proxies\/\">Residential proxies<\/a> o\ufb00er a one-to-one proxy for your IP address. This is the most basic level of anonymity you can obtain using proxy technology. Essentially, instead of accessing a website directly through your network connection, you claim that a di\ufb00erent machine is the one you \u201creside\u201d on \u2013 your residential proxy.<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/residential-proxy-guide\/\">What is a Residential Proxy?<\/a><\/li>\n<\/ul>\n<p>The thing is those <strong>true residential proxies<\/strong>\u00a0are hard to come by. In reality, when purchasing a residential proxy, you are most likely purchasing a virtual proxy address in a datacenter, which can lead website administrators to associate your activity with whatever else is happening on that network.<\/p>\n<p>Related:\u00a0<a href=\"https:\/\/royadata.io\/blog\/residential-and-datacenter-proxies\/\">The Difference Between Residential and Datacenter Proxies<\/a>.<\/p>\n<hr\/>\n<h3 id=\"7-shared-proxies\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"7_Shared_Proxies\"><\/span>7. Shared Proxies<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Shared proxies are similar to residential proxies except that instead of offering a one-to-one proxy service, you share your proxy connection with a number of other users. This lets a group of individuals share the cost of maintaining the proxy server itself, but it also creates a direct relationship between them that anyone can trace.<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/shared-proxy-guide\/\">What is a Shared Proxy?<\/a><\/li>\n<\/ul>\n<p>There are <a href=\"https:\/\/royadata.io\/blog\/cheap-shared-proxies\/\"><strong>many shared proxy services<\/strong><\/a> available online for free, but these services o\ufb00er limited functionality, low speed, and little-to-no anonymity, making them useful only for a very narrow set of uses.<\/p>\n<hr\/>\n<h3 id=\"8-dedicated-proxies\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"8_Dedicated_Proxies\"><\/span>8. Dedicated Proxies<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Whereas shared proxies are open groups that any number of users can share, dedicated proxies are closed. You are the only person who can access and use your dedicated proxy.<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/private-proxy-guide\/\">What is a Private Dedicated Proxy?<\/a><\/li>\n<\/ul>\n<p>This o\ufb00ers a broad range of benefits suitable for high-impact proxy tasks and business use. It guarantees security, anonymity, and speed.<\/p>\n<p>Make sure to do your research before <a href=\"https:\/\/royadata.io\/blog\/residential-proxies\/\"><strong>buying dedicated proxies<\/strong><\/a>, as many providers will advertise their proxies as dedicated when they\u2019re actually shared. Don\u2019t allow any provider to tell you that sharing proxies is an industry-standard \u2013 that\u2019s a complete lie.<\/p>\n<hr\/>\n<h3 id=\"9-backconnect-proxies\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"9_Backconnect_Proxies\"><\/span>9. Backconnect Proxies<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/royadata.io\/blog\/how-backconnect-proxies-work\/\">Backconnect proxies<\/a> o\ufb00er users the ability to connect a single device to multiple different residential proxies. This has the practical benefit of allowing users to access websites from a variety of different IP addresses \u2013 making one user\u2019s activity look like multiple, unrelated queries.<\/p>\n<p>These proxies are not functionally different than rotating ips, although the two terms are distinct. The main drawback to using these proxies is ensuring that the individual IPs are high-quality \u2013 that is, not already blacklisted or otherwise compromised. Backconnect and rotating IPs are never dedicated to one user since multiple users will connect to the same shared pool.<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/rotating-proxies-api-with-curl\/\">How to Use Rotating Proxy API and Rotate Proxy lists with CURL for data mining<\/a><\/li>\n<\/ul>\n<hr\/>\n<h3 id=\"10-honey-pot\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"10_Honey_Pot\"><\/span>10. Honey Pot<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A honeypot is a trap, set by hackers and organizations, to lure users into sending sensitive data through their proxy services. The honey pot owner examines, analyzes, and uses data sent through the proxy system.<\/p>\n<p>A common scenario is using a free proxy to bypass a corporate firewall and log into Facebook or Instagram, only to find out a week later that someone logged in using your password and took control of your account. In this case, the free proxy was in fact a honey pot for a social media hacker.<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/paid-proxies-free-proxies\/\">Are Paid Proxies Really That Much Better Than Free Proxies?<\/a><\/li>\n<\/ul>\n<hr\/>\n<h3 id=\"11-asn\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"11_ASN\"><\/span>11. ASN<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Your <strong><a href=\"https:\/\/www.whatismyip.com\/asn\/\"  rel=\"noopener noreferrer\">autonomous system number<\/a><\/strong> (ASN) refers to particular digits that identify a group of IP addresses. You can think of autonomous systems as being one level up along the hierarchy of data identification on the Internet. Di\ufb00erent countries and ISPs have di\ufb00erent ASNs.<\/p>\n<hr\/>\n<h3 id=\"12-subnet\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"12_Subnet\"><\/span>12. Subnet<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A subnet is a smaller group of individual device identities located on a single unified network. For instance, in a corporate o\ufb03ce building, multiple devices may share the same IP address and have di\ufb00erent subnets keeping them distinct and organized.<\/p>\n<hr\/>\n<h3 id=\"13-http-socks\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"13_HTTPSOCKS\"><\/span>13. HTTP\/SOCKS<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The <a href=\"https:\/\/royadata.io\/blog\/http-proxies-vs-socks-proxies\/\"><strong>hypertext transfer protocol<\/strong><\/a>\u00a0is the standard proxy protocol for the Internet. When you type in a web address and it contains, \u201chttp:\/\/\u201d in front of it, that means both you and the server hosting the website are using this protocol to communicate.<\/p>\n<p>In terms of proxy usage, HTTP proxies o\ufb00er maximum functionality for obtaining data from websites because they are built within the same framework. SOCKS protocols are similar, but use a more basic framework that o\ufb00ers security and compatibility benefits.<\/p>\n<hr\/>\n<h3 id=\"14-vps\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"14_VPS\"><\/span>14. VPS<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>When an internet hosting service sells a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_server\">virtual private server<\/a> (<a href=\"https:\/\/phreesite.com\/vps-hosting-sites\/\">VPS<\/a>), it is allowing access to a specific component of an existing server according to its users\u2019 needs. This may or may not correspond to a specific physical device \u2013 because the server is virtual, it doesn\u2019t have to.<\/p>\n<p>This bridges the gap between selling dedicated server usage and shared server usage. Shared servers stuff multiple users into a single physical device, while dedicated servers are private, one-to-one devices. A VPS o\ufb00ers privacy without forcing users to accommodate a specific physical device.<\/p>\n<hr\/>\n<h3 id=\"15-proxy-gateway\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"15_Proxy_Gateway\"><\/span>15. Proxy Gateway<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A proxy gateway is a tool that proxy users create to identify how their activity looks to other web servers. It allows proxy users to see what a regular website would see when they access it \u2013 without the risk of compromising the proxy itself in the process.<\/p>\n<p>Using a proxy gateway, you can check if your web activity is <a href=\"https:\/\/royadata.io\/blog\/php-detect-proxy-anonymity-level\/\"><strong>truly anonymous<\/strong><\/a> before actually trying to access other websites. This is an important step when engaging in delicate tasks.<\/p>\n<hr\/>\n<h3 id=\"16-botnet\" class=\"ftwp-heading\"><span class=\"ez-toc-section\" id=\"16_BotNet\"><\/span>16. <a href=\"https:\/\/royadata.io\/blog\/botnet\/\">BotNet<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you\u2019re wondering why web administrators are so reluctant to let proxy users access their websites, botnets are the answer. A botnet is a collection of hijacked or illegitimately-obtained devices under the control of a single owner with unauthorized access. They are often used to hack websites, perform <a href=\"https:\/\/www.webopedia.com\/TERM\/D\/DDoS_attack.html\"  rel=\"noopener noreferrer\"><strong>DDOS attacks<\/strong><\/a> , and commit cybercrime. Note: these are often confused with legitimate proxy server networks.<\/p>\n<ul>\n<li>Lots of Observers suspect <a href=\"https:\/\/royadata.io\/blog\/oxylabs\/\">Oxylabs.io<\/a> offers the BotNet Residential Proxy network.<\/li>\n<\/ul>\n<p>Functionally, there is no reliable way for a web administrator to tell the di\ufb00erence between the legitimate use of proxies for data gathering and illegal botnet activity. This is why marketers, journalists, and data scientists who rely on <strong>web scraping to gather data<\/strong> have to take so many steps to hide their activity using proxies.<\/p>\n<ul>\n<li><a href=\"https:\/\/royadata.io\/blog\/how-to-scrape-linkedin-using-proxies\/\">How to Use Linkedin proxies to Scrape Data <\/a><\/li>\n<li><a href=\"https:\/\/royadata.io\/blog\/scraping-craigslist\/\">The Ultimate Guide to Scraping Craigslist Data with Software<\/a><\/li>\n<\/ul>\n<hr\/>\n<p>If you have any questions about other proxy terms that we may have missed, please feel free to <strong>ask us<\/strong>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Getting into the wonderful world of proxies can seem like a daunting task for newcomers. A quick look online for, \u201cproxy terms and definitions\u201d will reveal multiple sources and often conflicting information. You\u2019ll find conflicting information on proxies online because there are conflicting interests at the heart of using proxies. Some people associate them exclusively &#8230; <a title=\"16 Proxy Terms and Definitions \u2013 A Complete Guide\" class=\"read-more\" href=\"http:\/\/royadata.io\/blog\/proxy-terms-and-definitions\/\" aria-label=\"More on 16 Proxy Terms and Definitions \u2013 A Complete Guide\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/posts\/6307"}],"collection":[{"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/comments?post=6307"}],"version-history":[{"count":0,"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/posts\/6307\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/media\/486"}],"wp:attachment":[{"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/media?parent=6307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/categories?post=6307"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/royadata.io\/blog\/wp-json\/wp\/v2\/tags?post=6307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}