How to Set Up Coronium Proxy in Incogniton
Running multiple browser profiles without triggering platform detection requires two independent layers of isolation: a dedicated IP address and a sandboxed browser environment. Coronium provides the former through carrier-grade 4G and 5G mobile proxies; Incogniton provides the latter through its anti-detect browser. This guide walks you through connecting the two so that every profile operates under its own unique mobile IP context.
Carrier-Grade IPs
Real mobile network IPs that platforms trust
Profile Isolation
Separate browser identity per profile
Flexible Rotation
Manual, scheduled, or API-triggered IP changes
Create and Sign In to Your Incogniton Account
Before you can attach a proxy to a profile, you need a working Incogniton installation.
- Go to the Incogniton website and download the desktop application for your operating system (Windows or macOS).
- Run the installer and follow the on-screen prompts to complete installation.
- Open the app and click Register to create a new account, or Sign In if you already have one.
- Verify your email if required, then log in to reach the main dashboard.
Tip: Incogniton offers a free plan with a limited number of profiles โ sufficient for testing the proxy integration before committing to a paid tier.
Set Up Your Coronium Account
You need an active Coronium proxy subscription before you can retrieve credentials.
- Log in to the Coronium dashboard at dashboard.coronium.io.
- Click Add Proxies from the sidebar or the main overview panel.
- Select your preferred location โ country, carrier, and region โ to pin your mobile IP to a specific network.
- Choose your plan based on the number of proxies and data volume you need.
- Complete payment via Stripe (credit/debit card) or cryptocurrency. Your proxies activate immediately after confirmation.
Retrieve Your Proxy Credentials
Once your proxy is active, gather the connection details you'll paste into Incogniton.
- In the Coronium dashboard, open your active proxy and locate the credentials panel.
- Note down the following four values:
- Hostname / IP โ the proxy server address
- Port โ typically different for HTTP and SOCKS5
- Protocol โ HTTP or SOCKS5 (both supported by Incogniton)
- Username & Password โ your authentication credentials
# Example credential format
Host: gate.coronium.io
Port: 12345
Protocol: HTTP
Username: user_abc123
Password: โขโขโขโขโขโขโขโขโขโขโขโข
IP Rotation Options
- Manual: Rotate your IP on demand via the dashboard button
- Scheduled: Set an automatic rotation interval (e.g., every 30 minutes)
- API-triggered: Call the Coronium rotation endpoint from your own scripts
Integrate Proxy with Incogniton
With credentials in hand, you can now bind a Coronium proxy to an Incogniton browser profile.
- In Incogniton, navigate to Profile Management from the left sidebar.
- Click New Profile to create a fresh profile, or select an existing profile and click Edit.
- Scroll down to the Proxy section within the profile settings.
- Set the Proxy Type to
HTTPorSOCKS5to match the protocol from your Coronium dashboard. - Fill in the Host, Port, Username, and Password fields with the credentials you retrieved in Step 3.
- Click Check Proxy โ Incogniton will verify the connection and display the resolved IP and country flag if successful.
- Click Create Profile (or Update Profile if editing) to save.
One Proxy Per Profile
Assign a dedicated Coronium proxy to each Incogniton profile. Sharing a single proxy IP across multiple profiles defeats the purpose of profile isolation and reintroduces the IP-linkage risk you're trying to eliminate.
Launch and Verify
The final step is confirming that traffic from your Incogniton profile is actually routing through your Coronium proxy.
- Back in the Incogniton profile list, click Start next to your configured profile.
- The Incogniton browser window will open. Navigate to an IP-checking service such as whatismyip.com, iplocation.net, or browserleaks.com.
- Confirm that the displayed IP address matches the proxy IP shown in your Coronium dashboard. The geolocation should reflect the carrier and region you selected.
Verification Checklist
- IP address matches the Coronium dashboard value
- Country and carrier match your selected location
- No WebRTC or DNS leaks detected on browserleaks.com
Conclusion
Pairing a dedicated Coronium mobile proxy with an isolated Incogniton browser profile gives you two complementary layers of separation: a carrier-backed IP context that looks like a real mobile device, and a sandboxed browser environment with its own unique fingerprint. Together they eliminate the most common signals that platforms use to link accounts โ shared IPs and shared browser fingerprints.
Once the integration is verified, you can replicate the process across as many profiles as your Coronium plan supports, each with its own dedicated proxy, giving every account a clean and independent mobile network identity.
Disclaimer
Our 4G mobile proxies are intended for legal and legitimate use only. This page is solely for informational and marketing purposes. It is the user's responsibility to ensure compliance with the terms of service of the platforms they are using our proxies on. We do not condone or support the use of our proxies for illegal or unauthorized activities. By using our proxies, you agree to use them in accordance with all applicable laws and regulations. We will not be held liable for any misuse of our proxies. Please read our Terms of Service before using our services.