
Let's speech astir proxy servers. Proxy servers are often confused with virtual backstage networks (VPNs) due to the fact that their web architectures are precise similar. But proxies and VPNs are very antithetic beasts.
Don't worry: Below, I'll present you to proxy servers, comparison and opposition them to VPNs, and picture the galore antithetic types of proxy servers and however they're used.
Also: The champion proxy server services of 2025
Defining proxy servers
If you look astatine Webster's 3 definitions of "proxy," you'll spot that each 1 fundamentally describes an entity acting arsenic a substitute for, oregon connected behalf of, another.
That is precisely what a proxy server does. The proxy server sits betwixt your machine and a distant machine (usually a server) and acts connected behalf of your machine (or connected behalf of the distant server).
Let's accidental you're utilizing a proxy server to entree a distant website similar ZDNET. When you petition this article, your machine sends a petition to the proxy server. The proxy server, successful turn, sends that petition to ZDNET's servers. A ZDNET server returns the leafage to the proxy. Finally, the proxy returns the leafage to your computer.
When ZDNET's servers log the leafage request, they don't log your computer's IP address. Instead, they log the IP code of the proxy server. In this way, proxy servers supply you with IP code anonymity during the transaction.
A VPN does overmuch the same. It, too, obfuscates your IP code truthful that the destination server doesn't log it. But a VPN adds a furniture of encryption betwixt your machine and the VPN server, truthful that postulation betwixt your machine and the VPN server can't beryllium work by a section hacker, your ISP, or, possibly, your government.
VPNs supply an indispensable furniture of extortion for idiosyncratic users and firm users, particularly erstwhile utilizing nationalist Wi-Fi networks.
Also: Proxy vs. VPN: What is the difference, and which bash I need?
Proxy servers supply partial protection, but they're not chiefly intended to support laptop users connected the go. They person a batch of different uses, depending connected however they're configured. That's next.
Network placement proxies
This people of proxy is defined chiefly based connected wherever the proxy sits successful the way of traffic.
You whitethorn not recognize it, but astir each of america usage proxy servers each day. In fact, astir of america person 1 astatine home. That's right, your location router is technically a NAT (network code translation) proxy server.
Let's accidental the machine I'm typing this nonfiction into is located connected my location web astatine 192.168.1.114. That's not my code connected the internet. My net work supplier assigned my router a wholly antithetic address. Home networks usage NAT addressing to trim the fig of IP addresses that ISPs person to distribute, and to abstracted location networks from the wide internet.
Beyond the location oregon bureau router, the proxy server astir radical are acquainted with is the guardant proxy. This lives betwixt your machine and a distant server oregon site. It relays requests. This proxy's main relation is hiding the requester's IP address.
Also: The champion VPNs for streaming: Expert tested
Big web scraping services instrumentality the conception of the guardant proxy and crook it connected its ear. They marque leafage requests from large server farms, but each petition is mostly routed done a location computer. That way, the server they're scraping doesn't spot the scraping requests arsenic each coming from 1 entity that's trying to physique a database from their nationalist data.
Commercial web scraping services often usage apps that wage consenting location users for a portion of their bandwidth. Malware providers besides crook location users' computers into proxies, but they bash truthful by sneaking malevolent bundle onto an unsuspecting user's machine.
Another proxy benignant successful this class is the transparent oregon intercepting proxy. These are often utilized successful corporations to way worker enactment oregon are placed by tribunal bid successful ISPs to way traffic. They intercept and log the traffic, and past walk it along.
A akin transparent proxy is 1 that decrypts SSL and TLS postulation astatine the borderline of a network, inspects it, and past re-encrypts it to beryllium passed on to its destination. This signifier is often utilized by high-end firewalls to deep-inspect postulation to destruct malware that mightiness beryllium hidden successful encrypted packets.
There are besides reverse proxies. These mostly service distant servers alternatively than idiosyncratic users. Their intent is to administer the load oregon way postulation among a bid of servers. A precise communal illustration is simply a load-balancing server that intercepts web leafage requests and distributes those requests among a bid of astir identical servers truthful nary 1 server gets excessively bogged down by excessively overmuch traffic.
Anonymity and IP-masking proxies
This people of proxy is defined by its purpose: anonymizing idiosyncratic requests.
There tin beryllium crossover betwixt these categories. For example, we already discussed the astir communal IP-masking proxy, the location router.
There are hundreds of escaped nationalist proxy servers provided crossed the internet. You tin see a database here. These are often provided arsenic services to radical who truly request to sphere their anonymity. The gotcha is that due to the fact that they're public, you ne'er know. They could beryllium provided successful the tone of goodwill, oregon they could beryllium fielded by hackers hoping to intercept your traffic. You get what you wage for.
Also: Paid proxy servers vs. escaped proxies: Is paying for a proxy work worthy it?
Within this people of proxy determination are mostly 3 subclasses: anonymous, transparent, and elite. The quality is what the people server knows astir you. Transparent servers don't anonymize your IP code astatine all. The people server knows your IP and knows you're connecting via a proxy. These servers are mostly utilized for convenience, for example, wherever postulation bottlenecks.
Anonymous proxies support your IP address, but the people server knows that you're utilizing a proxy server. Elite servers besides support your IP address, and they besides fell the information that you're adjacent connecting via a proxy server.
You mightiness person besides heard of Tor (the bulb router). Tor is an open-source task acceptable up to support the root of Internet postulation from servers. Tor bounces postulation crossed 3 oregon much relays (usually volunteer-run and free) truthful servers can't archer wherever you're coming from, oregon adjacent what state you're successful erstwhile accessing a server.
Security and argumentation enforcement proxies
This people of proxy is defined by its intent to negociate web security, often astatine the borderline of a firm network.
Web exertion firewall proxies artifact web exploits oregon excessively galore entree requests. Content-filtering oregon censoring proxies surface forbidden content. Parental-control oregon unafraid web gateway proxies enforce harmless browsing. Identity-aware zero-trust proxies verify idiosyncratic identity. Measurement oregon quality-of-experience proxies log show metrics.
When programming, I usage a debugging proxy to seizure web leafage requests and server responses that assistance maine debug however my codification responds. This tin beryllium incredibly adjuvant to spot what's happening during the circular travel to the server.
Earlier, we talked astir information proxies that intercept web requests to inspect them for malicious intent. There's a malicious evil duplicate of that called a man-in-the-middle proxy. This is simply a server that often acts similar a Wi-Fi entree point. Users link to it, reasoning they're connecting to, say, the airport's Wi-Fi. Instead, the man-in-the-middle proxy hoovers up each the web postulation it tin intercept, aboriginal mining it for idiosyncratic identifying information, unencrypted monetizable data, and credential information.
Performance and acceleration proxies
The past main people of proxy we're going to sermon successful this nonfiction is the assorted proxies that are enactment successful spot to optimize web performance. These mostly amended velocity oregon trim bandwidth usage by caching data.
Caching is an absorbing solution and a logistical situation each its own. The thought is that information (particularly images and videos, which usage much bandwidth) is stored person to users truthful that it doesn't person to beryllium retransmitted implicit and over. Caching reduces server load, but it besides works good erstwhile bandwidth is limited.
For example, a institution oregon a assemblage that has reasonably minimal "pipes" mightiness cache regularly accessed contented truthful the information is truly stored connected the section LAN, alternatively than requested from distant servers.
The logistical situation revolves astir keeping that information updated. Probably the azygous biggest enactment petition I got backmost erstwhile I published a instrumentality for non-profits to cod donations was that the donation forms didn't update.
That was due to the fact that servers cached the forms, making it intolerable for them to archer erstwhile 1 donor was done with the signifier and different was entering donation data. I yet solved the occupation by gathering cache-detecting codification into the forms, and placing a informing connection erstwhile caching that mightiness pb to corruption was detected.
Different servers and clients woody with caching information differently. Even your browser caches pages, which is why, erstwhile thing isn't working, you're often advised to clear your browser cache.
So galore proxies, truthful small time…
There truthful galore antithetic types of proxies, we could constitute a book. We covered rather a few, but here's a database of a clump much we haven't covered.
- SOCKS4 / SOCKS5 proxy
- FTP proxy
- SMTP mail-relay proxy
- DNS forwarder / DNS proxy
- Smart DNS proxy
- TURN relay proxy (WebRTC)
- SIP proxy (VoIP signaling)
- MQTT / IoT gateway proxy
- NAT64 translation proxy
- Edge CDN point-of-presence proxy
- API gateway / microservice proxy
- Datacenter proxy
- Mobile bearer proxy
- Rotating proxy pool
- Sticky-session proxy
- Distorting proxy
- Multicast streaming proxy
- And more…
As you tin see, proxy serving is simply a precise almighty and versatile web architecture that adds worth each crossed the internet, successful server clusters, and adjacent wrong your home.
What astir you? Did you cognize your router is truly a proxy server? Have you ever routed your postulation done a guardant proxy, oregon deployed a reverse proxy to equilibrium server loads? Which of the 4 proxy categories (network placement, anonymity, security, oregon performance) bash you trust connected most, and why? Let america cognize successful the comments below.
You tin travel my day-to-day task updates connected societal media. Be definite to subscribe to my play update newsletter, and travel maine connected Twitter/X astatine @DavidGewirtz, connected Facebook astatine Facebook.com/DavidGewirtz, connected Instagram astatine Instagram.com/DavidGewirtz, connected Bluesky astatine @DavidGewirtz.com, and connected YouTube astatine YouTube.com/DavidGewirtzTV.