Information

Our proxies function with IP address binding:


1. To use our service, you need to register an account and verify it using an existing email address. Very important! it is not allowed to use temporary, non-existing, as well as email addresses located in spam databases during registration. Please use the correct email address to register. For your convenience, when making the first purchase, the account will be registered automatically.


2. IP binding to a real IP is mandatory for using our service. You can find out how to do this by scrolling through the page below. IP binding is possible only to one IP, you can change it as many times as necessary for you. Proxies will work in the IP mask range of 21 bits.


3. It is forbidden to use proxies simultaneously from more than 3 devices (servers, VDS, VPS, PCs, laptops, etc.).


4. It is prohibited to use proxies for hacker attacks, carding, brute-force, hacking websites, distributing malicious software, stealing information, as well as other actions prohibited by the laws of the state where our proxies will be used.


5. Resale, delivery for an hour or a day, or transfer of our proxies to other people is strictly prohibited. (even attempts to resell, surrender or transfer will be suppressed).


6. We provide a guaranteed refund within 24 hours after purchase if the proxy does not work for you. The refund is made using the same method that you used for payment. To return, you need to contact the Support Service.


7. After 24 hours from the date of payment, you can cancel the order with a refund of unused funds to the internal account balance. Cancellation of the order is possible once every three days in your personal account without contacting the Support Service.


8. With numerous, unreasonable requests for a refund, further purchases on our website may be prohibited for you.


9. Our Support team is happy to help you every day from 7.00 to 24.00 (GMT +3). You will receive a response within 30 minutes, but no later than 8 hours after sending the request.


10. Only the client is responsible for any actions with the proxy.


11. For non-compliance with this information, your account will be blocked without warning and refund.


12. When buying a proxy, you agree with this information (it can be supplemented and changed).


Currently there are 2 types of authorization:

1. By external IP. 2. By name and mask.


Using a username and password, you get the opportunity to work with only one web provider at a time within the subnet mask. Using several servers at once, you need to buy a personal account for each (similar or different tariff). When logging in with a username and password, you should connect to the subnet mask.

Determine the bitmask range using This service

In the "IP address" column, you need to specify the binding IP, in the Mask Bits column, select 21.


If you log in with a username and password, the servers will function in the CIDR Address Range. The remaining fields do not need to be filled in. Then you need to go to the account management section to bind to the IP. The provider's mask will be revealed independently. If your external address or provider has changed for one reason or another, it will not be difficult to change the binding. You can do this when it is convenient for you – just go to the control panel, and after only 3-6 minutes. the changes will become valid.


Proxy – what is it?

A proxy server is an intermediary link between a user's computer and a system of Internet servers. What does it give? Makes your stay on the Internet anonymous, provides a high connection speed with the right resource, allows you to bypass locks and filters.


Transparent proxy

This is a regular proxy server that leaves all your personal data on the network unchanged. A transparent proxy server allows you to speed up access to frequently visited pages by placing them in the cache, as well as reduce the loading time for the user. Many companies use a transparent proxy server for filtering purposes. For clarity, a transparent proxy server can be represented as follows: HTTP headers will take the values specified below. REMOTE_ADDR = Proxy IP address HTTP_VIA = Proxy IP address HTTP_X_FORWARDED_FOR = your real IP address Note that _X_ in the name of the variable, it indicates that its use is optional. There may not be such a variable in the header. However, passing HTTP_X_FORWARDED_FOR is considered a rule of good form in the network. This variable is supported by such leaders in the field of proxying as Squid, Apache mod_proxy , Cisco Cash Engine и другими.


Anonymous proxy

An anonymous proxy server has the same advantages as a transparent proxy in terms of caching, but at the same time provides more privacy: your IP address is replaced by the proxy IP address or some random address. The anonymous proxy does not send the HTTP_X_FORWARDED_FOR variable to the host, so your IP address cannot be registered. The anonymous proxy server displays the following information: REMOTE_ADDR = Proxy IP address HTTP_VIA = Proxy IP address HTTP_X_FORWARDED_FOR = Proxy IP address or random address The most interesting case seems to be the substitution of the value of the HTTP_X_FORWARDED_FOR variable for an address that is unused on the Internet, although it has meaning. For example: 127.0.0.1 – internal loop 192.168. X. X – local subnet, etc. In such cases, the field is formally filled in, but it does not carry useful information to determine the real user. Using an anonymous proxy, it is important to make sure that HTTP_X_FORWARDED_FOR is correctly substituted. An interesting feature of this variable is that it can accumulate the address values of all proxies through which the packet was transmitted. In this case, all addresses will be stored in a comma-separated variable.


Elite Proxy

Elite proxy server can be called "super-anonymous", as it provides maximum security. An elite proxy server cannot be detected: from the outside, your Internet usage will look as if the proxy is not being used at all. Elite proxy servers do not send variables HTTP_X_FORWARDED_FOR, HTTP_VIA and HTTP_PROXY_CONNECTION. The host is not even informed of the fact of using a proxy server, and even more so your IP address. The only thing that includes an elite proxy server is the REMOTE_ADDR header with the proxy IP address, exposing the proxy server as a client. Websites, however, may suspect the use of a proxy server if the client sends packets with cookies saved from the last visit without using the most anonymous proxy server. In this case, you need to clear the cookies and, possibly, the cache. The elite proxy server transmits the following information: REMOTE_ADDR = Proxy IP address HTTP_VIA = space HTTP_X_FORWARDED_FOR = space


Anonymity myth or reality?

Proxy is actively used for anonymous work on the Internet. However, the goals that the proxy server helps to achieve may differ significantly, so applications are divided into several types according to the level of anonymity: Transparent – they are used exclusively for caching information and are not anonymous, giving themselves and the IP address of the computer owner in the process. Anonymous – they reveal themselves without giving out the client's IP address. Distorting – the IP address transmitted by such "proxies" during operation is artificially generated or fictitious. The web server takes the distorted IP at face value, and cannot use real, securely protected data. Elite – carefully hide not only the client's IP address, but also their own presence in the process of work. The web server perceives the operation of such an application as an appeal of a real user's computer, while in fact an elite "proxy" acts in this role. This classification is conditional and introductory in nature. In fact, there are many more varieties of HTTP servers, they all adapt to the specific individual characteristics of the client and the tasks that he sets.


HTTP proxy

HTTP is a "proxy" that allows you to work on the Internet over the HTTP protocol and in some cases over HTTPS/FTP protocols. With the help of such a server, it is convenient to cache information coming from the World Wide Web. However, the main features and features of this product require more detailed consideration.


SOCKS-proxy

Despite the fact that the protocol of this format was developed a long time ago, it has not only not lost relevance these days, but has also gained even more popularity due to its versatility. This proxy "cooperates" with almost any protocols. For example, the 4th version with TCP, the 5th with TCP and UDP. This application will not cause any conflicts when working with FTP, HTTP, NNTP, POP3, SMTP and many other types of protocols.

All tariff plans


feature

Choose your proxy package


Quality, Speed, Stability

We have been on the market since 2012




Comparison proxy table
Server proxies ProxyElite.Biz HTTP HTTPS SOCKS4 SOCKS5
Anonymity Partially Partially Complete Complete
The speed of the proxy Before 100 Mb/s Before 100 Mb/s Before 100 Mb/s Before 100 Mb/s
Ports proxies 8080/8085 8080/8085 1080/1085 1080/1085
Work without authorization Yes Yes Yes Yes
Unlimited traffic Yes Yes Yes Yes
Work with the HTTPS-sites No Yes Yes Yes
Stream restriction No No No No
Class subnets (C) In the buffer 250 250 250 250