All Collections
Dolphin Anty
Working with proxies
Creation/types of proxies in Dolphin {anty}
Creation/types of proxies in Dolphin {anty}
Updated over a week ago

Creating a proxy

To add a proxy, you need to go to the left side of the Dolphin Anty interface to the "Proxies" section and click on the "+"

Далее у вас откроется окно, где вы увидите возможные форматы добавления прокси, а также, поле для добавления данных прокси

Allowed formats:

After you have entered the data from the proxy, at the bottom check that all the data is defined correctly -

If all the data is correct, click "Add" and your proxy will be displayed in the general list

After that, you will need to check the connection of this proxy, you can do this by highlighting the proxy and clicking on the appropriate button

If the status of your proxy is "Working" - it means that everything is fine with the proxy.

If the status of your proxy is "Error" - you have to make sure that your proxy is working.
To understand why you get an error when you check your proxy connection read this article

Also, from above you can do the following actions with your proxy:

  • Share a proxy (you can read how to do this in this article)

  • Remove proxy

  • Check Proxy Connection

  • Add Proxy

  • Find proxies by name

How to choose a proxy you can read here.

Types of proxies

Proxies are divided into different types depending on the level of anonymity, placement, supported protocol, type of use, type of IP address, etc.

Below we will break down the differences between proxies by level of anonymity, data modification, and type of placement. As a rule, these criteria are enough to understand which proxies will be suitable for your tasks.

Levels of anonymity

Anonymous proxies replace your IP address with their own address, with the proxy server address displayed in the HTTP line. With such a proxy, the visited site will not know your real IP, and sites will see that you are using a proxy. This makes your credibility a lot less.

Anonymous proxies are not very good for parsing and working with Facebook, Google and other complicated sites. However, they can be used to visit sites that are blocked in a particular country.

Elite anonymous proxies do not reveal that you are using a proxy and do not specify your or your IP. The advantage of these proxies is that the resource you are visiting cannot see that you are using a proxy. Such proxies are suitable if you want to mimic the data of a real user, for traffic arbitrage, posting reviews, etc.

Transparent proxies are proxies that do not mask your IP address. Such proxies are used, for example, to speed up access to a site: they add sites to the cache so that when you re-open that site, it will load already saved information. Such proxies are often used by companies to save traffic.

Type of placement

Server proxies. They are also called data-center proxies. They are proxies in which you get the IP of a data center. Such proxies are inexpensive, but they have some disadvantages:

  • They are defined as proxies. Because of this, you cannot imitate the behavior of a normal user on the one hand. On the other hand, some sites may deny you access to their resources because you are hiding your identity.

  • They are not unique. Such proxies can be used by several users at once.

These proxies are good for visiting blocked sites, but are unlikely to pass inspection by anti-fraud systems.

Resident proxies are IP addresses issued by ISPs to their private users. Such proxies can be used by only one person at a time and are not identified as proxies.

Resident proxies do not raise any suspicions and are therefore used to bypass antifraud systems.

Resident proxies have two major drawbacks: they cost considerably more than server proxies and are often slower.

Mobile proxies are proxies that are issued by a mobile operator. Such proxies are dynamic, and the service provider can assign an IP address to thousands of subscribers at once.

Being aware of this peculiarity, antifraud systems do not block such IPs and look for other ways to identify a user to see if it is a real person.

Similar to resident proxies, mobile proxies cost more than server proxies because they help bypass antifraud systems, while working faster.

On data changes

  • Direct or forward proxies are proxies that the browser (user) uses.

  • Reverse proxies are proxies that servers use. Such proxies are often used by companies to protect their corporate network from external connections. If an attacker tries to connect to such a network, he is redirected to the proxy where the attack will be suppressed.

  • Rotating proxy - for example rotating proxy, such proxies change IP at each request (page refresh), that is, you can connect them to a normal browser (not antic), go to 2ip.ru and sit to refresh the page - each time will be a new IP.Such proxies are needed for very simple and very mass actions, for example, if you scroll votes in the voting and there you need only one button to click - then it's the ideal option not to buy 1000+ proxies".

Did this answer your question?