Security FAQ

People ask us about ProxyMesh’s security. If you’d like to know more, have a look at the Frequently Asked Questions below. For easy reference, the first column lists popular queries; the middle column answers your immediate question, and the column on the right offers links to more details.

Or, do you have a not-so-frequently-asked question? Then please contact ProxyMesh Support and we’ll answer promptly.

Also see our blog article Checking for Account Breaches – the Quick and Simple Guide.
People ask… Quick Answer Read for further information…
What kind of account security does ProxyMesh offer?
  • HTTPS account pages
  • Two-factor (2FA) authentication option
  • Hashed passwords
  • Brute-force login protection
What kind of data security does ProxyMesh offer? Servers directly under control of the ProxyMesh system employ standard protocols to protect the security of data in transit.
What kind of proxy security does ProxyMesh offer? Using the HTTP CONNECT method, the servers can securely proxy HTTPS/SSL connections between you and an HTTPS server. All communication between your client/browser and the secure site is encrypted.
What kind of website security does ProxyMesh offer?
  • We protect the entire website with Sucuri, a website application firewall.
  • Login and account pages can only be accessed over HTTPS.
When I send a request via command line, is my IP address exposed?
  • Your identity is hidden whether you send a request by command line or browser.
  • Our own proxies remove any request headers that might compromise your privacy and anonymity.
  • But your actual data requests are not changed in the process.
Does ProxyMesh provide security for the World proxy? No. ProxyMesh does not control the outgoing proxy servers for the World proxy.
Does ProxyMesh provide security for the OpenProxy? No. ProxyMesh does not control the outgoing proxy servers for the Open proxies.
Can the servers secure proxy HTTPS/SSL connections between you and an HTTPS server? Yes, using the HTTP CONNECT method.
How long do you store my request logs? These logs are kept for no longer than 30 days, and are only accessible by authorized support staff.
Do sub-accounts have the same security features as regular accounts? Yes.
Do you store my billing information? No. It is safely secured by trusted third party services.
How does two-factor authentication (2FA) protect my account? When you enable 2FA, logging in to your account requires a secondary code from an app or mobile device.
Do you have a Privacy Policy? Yes. Please visit our website and review the Privacy Policy describing the ways we collect information from and about you, and what we do with the information.
What happens if someone else tries unsuccessfully to access my account? If someone tries to log into your account too many times in a row, failing each time, then their IP is automatically blocked for several hours.
How to keep track of our account passwords, especially with more than one user in our company? Keep in mind that easy-to-remember passwords are not recommended, since they’re also easier for hackers to figure out. A password manager like LastPass that can generate strong random passwords provides good controls.

Still need help? Contact Us Contact Us