How the Service Works

This article describes the operation of the proxy to manage your requests securely and efficiently. For more details, please click on the links in the article.

We have our own python-based proxy server that forwards your requests through a set of rotating squid proxies. Your requests are not changed in the process, except to remove the following request headers in order to protect your privacy and anonymity, so that your requests cannot be traced back:

  • Authorization
  • From
  • Proxy-Authorization
  • Proxy-Connection
  • Via
  • X-Forwarded-For

There is no software to download or install. All you need to do is configure your existing client to use our proxy server.


At this time we do not support the SOCKS protocol. We only support the HTTP protocol.

But although the proxy server itself uses the HTTP protocol, it can securely proxy HTTPS/SSL connections between you and a HTTPS server using the CONNECT method. All communication between your client/browser and the secure site is encrypted; the proxy server is only moving the data back and forth.

Please note that since the proxy server cannot inspect HTTPS requests, all proxy authorization headers or custom ProxyMesh headers must be sent with the initial CONNECT method. IP based authentication is recommended.

End-to-end HTTPS support may be added in the future.

Nonpersistent Connection

Although HTTP can use both persistent and nonpersistent connections, the proxy service is not designed for persistent connections. That is, a proxy connection normally closes after transmission of just one request and one response. A proxy service will detect and disable a keep-alive header included in a request.

Connections to proxies with a protocol such as XMPP (Extensible Messaging and Presence Protocol) or for video streaming may be unreliable, and likely to result in disconnects.


Because we use the existing HTTP protocol, any HTTP client can access our proxy servers without going through a VPN.

Connecting to a VPN before signing up with ProxyMesh, or before logging in to a ProxyMesh account, can result in an error message warning of "risky behavior." The signup or login may fail, but the issue can be corrected by disconnecting from the VPN.

Configuring Your Program to Use Your Proxy

Check out our HTTP client examples to see how to set the Proxy-Authorization header in various HTTP clients. If your client isn't covered and you'd like to see an example, please send us an email.

You can also use IP address authentication, which allows you to add multiple IP addresses to your account. Once you've subscribed to our service, you'll receive the specific address and port of our proxy server, and can add IP addresses or configure the Proxy-Authorization header.

Configuring Your Web Browser to Use Your Proxy

See How to How to Change Web Browser Proxy Settings for links to proxy configuration instructions for specific browsers. The easiest way to use a browser, once you’ve signed up with ProxyMesh, is to add your IP address from the dashboard, and then tell your browser to use our proxy auto-configuration URL, which you can find in your dashboard.

Scraping Google, Craigslist, or LinkedIn

If you need to scrape Google, Craigslist, or LinkedIn, or do any SEO-related web scraping, please look elsewhere, such as Trusted Proxies.

Residential IP & City-Specific Proxies

Our service offering does not include access to residential IP proxies. A good place to get them is Luminati

Also, we don't have IP proxies for specific cities, but we do provide country or state IPs to cover most instances. For city-specific proxies, try WonderProxy.

Streaming Video or Playing Online Games

Streaming video or playing online games is not what ProxyMesh was designed for, and it would probably use a lot more bandwidth than you'd expect. Here are some better options:

Still need help? Contact Us Contact Us