Let’s discuss proxy servers. Proxy servers are sometimes confused with digital non-public networks (VPNs) as a result of their community architectures are very related. However proxies and VPNs are very completely different beasts.
Don’t be concerned: Beneath, I am going to introduce you to proxy servers, evaluate and distinction them to VPNs, and describe the various several types of proxy servers and the way they’re used.
Additionally: The perfect proxy server companies of 2025
Defining proxy servers
Should you take a look at Webster’s three definitions of “proxy,” you will see that every one essentially describes an entity appearing as an alternative choice to, or on behalf of, one other.
That’s precisely what a proxy server does. The proxy server sits between your laptop and a distant laptop (normally a server) and acts on behalf of your laptop (or on behalf of the distant server).
For example you are utilizing a proxy server to entry a distant web site like ZDNET. If you request this text, your laptop sends a request to the proxy server. The proxy server, in flip, sends that request to ZDNET’s servers. A ZDNET server returns the web page to the proxy. Lastly, the proxy returns the web page to your laptop.
When ZDNET’s servers log the web page request, they do not log your laptop’s IP handle. As a substitute, they log the IP handle of the proxy server. On this method, proxy servers offer you IP handle anonymity in the course of the transaction.
A VPN does a lot the identical. It, too, obfuscates your IP handle in order that the vacation spot server would not log it. However a VPN provides a layer of encryption between your laptop and the VPN server, in order that site visitors between your laptop and the VPN server cannot be learn by a neighborhood hacker, your ISP, or, presumably, your authorities.
VPNs present a necessary layer of safety for particular person customers and company customers, particularly when utilizing public Wi-Fi networks.
Additionally: Proxy vs. VPN: What’s the distinction, and which do I would like?
Proxy servers present partial safety, however they don’t seem to be primarily supposed to guard laptop computer customers on the go. They’ve a whole lot of different makes use of, relying on how they’re configured. That is subsequent.
Community placement proxies
This class of proxy is outlined based totally on the place the proxy sits within the path of site visitors.
Chances are you’ll not notice it, however nearly all of us use proxy servers each day. In truth, most of us have one at house. That is proper, your property router is technically a NAT (community handle translation) proxy server.
For example the pc I am typing this text into is situated on my house community at 192.168.1.114. That is not my handle on the web. My web service supplier assigned my router a totally completely different handle. Residence networks use NAT addressing to cut back the variety of IP addresses that ISPs must distribute, and to separate house networks from the general web.
Past the house or workplace router, the proxy server most individuals are aware of is the ahead proxy. This lives between your laptop and a distant server or web site. It relays requests. This proxy’s foremost function is hiding the requester’s IP handle.
Additionally: The perfect VPNs for streaming: Knowledgeable examined
Large net scraping companies take the idea of the ahead proxy and switch it on its ear. They make web page requests from huge server farms, however every request is usually routed by means of a house laptop. That method, the server they’re scraping would not see the scraping requests as all coming from one entity that is making an attempt to construct a database from their public information.
Business net scraping companies usually use apps that pay prepared house customers for a slice of their bandwidth. Malware suppliers additionally flip house customers’ computer systems into proxies, however they achieve this by sneaking malevolent software program onto an unsuspecting consumer’s machine.
One other proxy sort on this class is the clear or intercepting proxy. These are sometimes utilized in firms to trace worker exercise or are positioned by courtroom order in ISPs to trace site visitors. They intercept and log the site visitors, after which cross it alongside.
An identical clear proxy is one which decrypts SSL and TLS site visitors on the fringe of a community, inspects it, after which re-encrypts it to be handed alongside to its vacation spot. This observe is commonly utilized by high-end firewalls to deep-inspect site visitors to remove malware that may be hidden in encrypted packets.
There are additionally reverse proxies. These usually serve distant servers quite than particular person customers. Their goal is to distribute the load or route site visitors amongst a collection of servers. A quite common instance is a load-balancing server that intercepts net web page requests and distributes these requests amongst a collection of practically equivalent servers so nobody server will get too slowed down by an excessive amount of site visitors.
Anonymity and IP-masking proxies
This class of proxy is outlined by its goal: anonymizing consumer requests.
There may be crossover between these classes. For instance, we already mentioned the commonest IP-masking proxy, the house router.
There are tons of of free public proxy servers supplied throughout the web. You possibly can see a listing right here. These are sometimes supplied as companies to individuals who actually need to protect their anonymity. The gotcha is that as a result of they’re public, you by no means know. They may very well be supplied within the spirit of goodwill, or they may very well be fielded by hackers hoping to intercept your site visitors. You get what you pay for.
Additionally: Paid proxy servers vs. free proxies: Is paying for a proxy service price it?
Inside this class of proxy there are usually three subclasses: nameless, clear, and elite. The distinction is what the goal server is aware of about you. Clear servers do not anonymize your IP handle in any respect. The goal server is aware of your IP and is aware of you are connecting through a proxy. These servers are principally used for comfort, for instance, the place site visitors bottlenecks.
Nameless proxies shield your IP handle, however the goal server is aware of that you simply’re utilizing a proxy server. Elite servers additionally shield your IP handle, and so they additionally cover the truth that you are even connecting through a proxy server.
You might need additionally heard of Tor (the onion router). Tor is an open-source undertaking set as much as shield the origin of Web site visitors from servers. Tor bounces site visitors throughout three or extra relays (normally volunteer-run and free) so servers cannot inform the place you are coming from, and even what nation you are in when accessing a server.
Safety and coverage enforcement proxies
This class of proxy is outlined by its intent to handle community safety, usually on the fringe of a company community.
Internet utility firewall proxies block net exploits or too many entry requests. Content material-filtering or censoring proxies display forbidden content material. Parental-control or safe net gateway proxies implement secure shopping. Identification-aware zero-trust proxies confirm consumer id. Measurement or quality-of-experience proxies log efficiency metrics.
When programming, I exploit a debugging proxy to seize net web page requests and server responses that assist me debug how my code responds. This may be extremely useful to see what’s occurring in the course of the spherical journey to the server.
Earlier, we talked about safety proxies that intercept community requests to examine them for malicious intent. There is a malicious evil twin of that referred to as a man-in-the-middle proxy. It is a server that usually acts like a Wi-Fi entry level. Customers connect with it, considering they’re connecting to, say, the airport’s Wi-Fi. As a substitute, the man-in-the-middle proxy hoovers up all the net site visitors it could actually intercept, later mining it for private figuring out data, unencrypted monetizable information, and credential data.
Additionally: Easy methods to activate Non-public DNS Mode on Android – and why it is a should for safety
Efficiency and acceleration proxies
The final foremost class of proxy we will focus on on this article is the varied proxies which are put in place to optimize community efficiency. These usually enhance pace or scale back bandwidth utilization by caching information.
Caching is an attention-grabbing resolution and a logistical problem all its personal. The concept is that information (significantly photos and movies, which use extra bandwidth) is saved nearer to customers in order that it would not must be retransmitted again and again. Caching reduces server load, but it surely additionally works nicely when bandwidth is restricted.
For instance, an organization or a school that has pretty minimal “pipes” would possibly cache usually accessed content material so the information is basically saved on the native LAN, quite than requested from distant servers.
The logistical problem revolves round conserving that information up to date. Most likely the only greatest assist request I acquired again once I printed a software for non-profits to gather donations was that the donation varieties did not replace.
That was as a result of servers cached the varieties, making it unattainable for them to inform when one donor was performed with the shape and one other was coming into donation information. I ultimately solved the issue by constructing cache-detecting code into the varieties, and putting a warning message when caching which may result in corruption was detected.
Totally different servers and shoppers take care of caching information in a different way. Even your browser caches pages, which is why, when one thing is not working, you are usually suggested to clear your browser cache.
So many proxies, so little time…
There so many several types of proxies, we may write a guide. We coated fairly a number of, however this is a listing of a bunch extra we’ve not coated.
- SOCKS4 / SOCKS5 proxy
- FTP proxy
- SMTP mail-relay proxy
- DNS forwarder / DNS proxy
- Good DNS proxy
- TURN relay proxy (WebRTC)
- SIP proxy (VoIP signaling)
- MQTT / IoT gateway proxy
- NAT64 translation proxy
- Edge CDN point-of-presence proxy
- API gateway / microservice proxy
- Datacenter proxy
- Cell service proxy
- Rotating proxy pool
- Sticky-session proxy
- Distorting proxy
- Multicast streaming proxy
- And extra…
As you possibly can see, proxy serving is a really highly effective and versatile community structure that provides worth all throughout the web, in server clusters, and even inside your property.
What about you? Do you know your router is mostly a proxy server? Have you ever ever routed your site visitors by means of a ahead proxy, or deployed a reverse proxy to stability server masses? Which of the 4 proxy classes (community placement, anonymity, safety, or efficiency) do you depend on most, and why? Tell us within the feedback beneath.
You possibly can observe my day-to-day undertaking updates on social media. Remember to subscribe to my weekly replace publication, and observe me on Twitter/X at @DavidGewirtz, on Fb at Fb.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, on Bluesky at @DavidGewirtz.com, and on YouTube at YouTube.com/DavidGewirtzTV.
