Fusion Proxy
Reference

Proxy Glossary

A comprehensive dictionary of proxy and web scraping terminology to help you understand the technology and make informed decisions.

  • 39+ Terms
  • Searchable
  • Cross-referenced
glossary.search
Search terms...
APIApplication Programming Interface. A set of protoc...
Backconnect ProxyA proxy server that automatically rotates IP addre...
BandwidthThe amount of data that can be transferred through...

Dictionary All Terms

API

Application Programming Interface. A set of protocols and tools that allows different software applications to communicate with each other. In the context of proxies, APIs enable programmatic control over proxy selection, rotation, and management.

Backconnect Proxy

A proxy server that automatically rotates IP addresses with each request or at set intervals. Users connect to a single endpoint, and the provider handles IP rotation on the backend.

Bandwidth

The amount of data that can be transferred through a proxy connection in a given time period. Proxy services typically measure and bill based on bandwidth usage (in GB).

Bot Detection

Systems and techniques used by websites to identify and block automated traffic, including scraping bots. Common methods include CAPTCHAs, fingerprinting, and behavioral analysis.

CAPTCHA

Completely Automated Public Turing test to tell Computers and Humans Apart. A challenge-response test used to determine whether a user is human, commonly encountered during web scraping.

Concurrent Connections

The number of simultaneous connections that can be active through a proxy at the same time. Higher concurrency allows for faster data collection across multiple targets.

Datacenter Proxy

Proxies hosted in data centers rather than on residential ISP networks. They offer high speed and reliability but are easier to detect as they come from known datacenter IP ranges.

Dedicated Proxy

A proxy IP address exclusively assigned to a single user. Also known as private proxies, they offer consistent performance and are not shared with other users.

DNS

Domain Name System. The system that translates human-readable domain names into IP addresses. DNS leaks through proxies can reveal your true location.

Endpoint

A specific URL or connection point for accessing a proxy service. Endpoints typically include host address, port number, and authentication parameters.

Fingerprinting

The technique of collecting unique characteristics of a browser or device to identify and track users. Used by websites to detect bots and proxies.

Gateway

The entry point for proxy connections. A gateway server receives client requests and routes them through the appropriate proxy IPs in the pool.

Geo-Targeting

The practice of selecting proxy IPs from specific geographic locations. Essential for accessing region-locked content or collecting location-specific data.

Geolocation

The geographic location associated with an IP address. Proxy services offer geo-targeting to appear as if browsing from specific countries, cities, or regions.

HTTP Proxy

A proxy server that handles HTTP and HTTPS traffic. The most common type of proxy for web scraping and general browsing.

IP Address

Internet Protocol Address. A unique numerical identifier assigned to each device connected to a network. Proxies mask your real IP with a different address.

IP Pool

A collection of IP addresses available for use through a proxy service. Larger pools provide more variety and reduce the chance of IP bans.

IP Rotation

The practice of automatically switching between different IP addresses during web requests. Helps avoid detection and IP-based blocking.

ISP Proxy

Static residential proxies that combine the legitimacy of residential IPs with the reliability of datacenter infrastructure. Registered with Internet Service Providers.

Latency

The time delay between sending a request through a proxy and receiving a response. Lower latency means faster connections and better performance.

Mobile Proxy

Proxies using IP addresses from mobile carrier networks (3G, 4G, 5G). Highly trusted by websites due to the dynamic nature of mobile IPs.

Pay-As-You-Go (PAYG)

A billing model where users pay only for the bandwidth or resources they consume, without monthly commitments or minimum usage requirements.

Port

A numerical identifier for specific network services. Proxy servers listen on designated ports (e.g., 8080, 3128) for incoming connections.

Proxy Authentication

The process of verifying user identity before allowing proxy access. Common methods include username/password and IP whitelisting.

Rate Limiting

A technique used by websites to control the number of requests a user can make within a time period. Proxies help distribute requests to avoid rate limits.

Residential Proxy

Proxies that use IP addresses assigned by Internet Service Providers to homeowners. They appear as regular users and are harder to detect and block.

Rotating Proxy

A proxy that automatically changes the IP address with each request or at specified intervals. Ideal for large-scale scraping to avoid detection.

Scraping

Web scraping is the automated extraction of data from websites. Proxies are essential for scraping at scale to avoid IP blocks and access geo-restricted content.

Session

A period during which a user maintains the same proxy IP address. Sticky sessions allow maintaining identity across multiple requests.

Shared Proxy

A proxy IP address used by multiple users simultaneously. More affordable but may have inconsistent performance due to shared usage.

SOCKS Proxy

Socket Secure proxy protocol that handles any type of traffic, not just HTTP. SOCKS5 supports UDP and authentication.

Static Proxy

A proxy with a fixed IP address that doesn't change. Useful for tasks requiring consistent identity like account management.

Sticky Session

A session type where the same IP address is maintained for a specified duration or number of requests, allowing persistent identity.

Subnet

A logical subdivision of an IP network. Diverse subnets in a proxy pool provide better anonymity and reduce the chance of mass blocking.

Success Rate

The percentage of proxy requests that complete successfully without errors or blocks. A key metric for evaluating proxy quality.

TLS/SSL

Transport Layer Security/Secure Sockets Layer. Encryption protocols that secure data transmitted through proxies. HTTPS uses TLS.

Uptime

The percentage of time a proxy service is operational and available. Enterprise proxies typically guarantee 99.9% uptime.

User-Agent

A string that identifies the browser and operating system to web servers. Rotating user agents with proxies helps avoid detection.

Whitelist

An IP whitelist allows connections only from approved IP addresses. Used for proxy authentication without username/password.

Support Still Have Questions?

Our support team is here to help you understand proxy technology.

Enterprise Solutions

Have a Large Project?

Our proxy experts are ready to help you design a custom solution that scales with your business needs.

Custom pricing for high-volume needs
Dedicated account manager
Priority technical support
500K+Daily Requests
99.9%Uptime SLA
24/7Expert Support