Browserbase Proxy Setup Guide
Browserbase processed 50M+ browser sessions in 2025 and raised a $40M Series B at a $300M valuation. It's the infrastructure layer behind Browser Use, Stagehand, and most serious AI agent frameworks. Combine it with Coronium mobile proxies via BYOP to achieve 90-95% success rates on Cloudflare-protected targets.
This guide covers step-by-step integration with Node.js and Python code examples, Browser Use framework integration, session configuration (stealth, regions, proxy rotation), and troubleshooting for auth failures, DNS leaks, and region mismatches.
What this guide covers:
Navigate This Guide
End-to-end reference for integrating Coronium mobile proxies with Browserbase, from setup to production debugging.
Reading time: ~18 minutes. Includes working Node.js and Python code you can paste into your agent project.
What is Browserbase?
Browserbase is a managed headless Chrome infrastructure company founded in 2023. It provides Chrome-as-a-service for AI agents and browser automation, eliminating the DevOps burden of running Chrome at scale.
Company Snapshot (April 2026)
Based on public funding and product announcements
Founded: 2023
Valuation: $300M (Series B, $40M raised in 2025)
Sessions processed: 50M+ browser sessions in 2025
Headquarters: San Francisco, California
Protocol support: Playwright, Puppeteer, Selenium (CDP)
Regions: US-East (Virginia), US-West (Oregon), EU-West (Ireland)
SDKs: Node.js (@browserbasehq/sdk), Python (browserbase)
Why AI Agents Use Browserbase
The Chrome infrastructure problem solved
AI agents need a real browser to interact with modern websites. Over 60% of the web is JavaScript-heavy SPAs (React, Next.js, Vue) that return empty HTML to HTTP-only requests. Running Chrome locally is resource-intensive: 500MB+ RAM per session, complex driver management, crash recovery, binary updates, and session cleanup.
Browserbase abstracts all of this. Your agent gets a CDP WebSocket URL. Chrome runs in Browserbase's cloud. Sessions spin up in under 2 seconds, scale to thousands of concurrent browsers, and terminate automatically when idle. It's the S3-for-Chrome of AI agent infrastructure -- used by Browser Use, Stagehand, and most production AI agent frameworks.
Managed Headless Chrome
Fully-managed Chrome infrastructure running in isolated cloud containers. No local browser binaries, no driver management, no Docker images. Sessions spin up in under 2 seconds and auto-terminate when idle, scaling to thousands of concurrent browsers without provisioning servers.
Protocol Compatibility
Exposes the Chrome DevTools Protocol (CDP) endpoint over WebSocket. Any Playwright, Puppeteer, or Selenium script that connects via CDP works without code changes. Browserbase is a drop-in replacement for local Chromium in CI pipelines and AI agent frameworks.
Stealth Browser Mode
Built-in anti-detection features including navigator.webdriver patching, Canvas/WebGL fingerprint randomization, realistic hardware concurrency, and CDP artifact suppression. Stealth mode is enabled with a single flag at session creation.
Bring Your Own Proxy (BYOP)
Native support for external proxy endpoints via the proxies array in the session creation API. Accepts HTTP and SOCKS5, supports authentication, and routes all browser traffic through your chosen IP. Essential for Coronium mobile proxy integration.
Regional Deployments
Sessions available in US-East (Virginia), US-West (Oregon), and EU-West (Ireland). Match your Browserbase region to your Coronium mobile proxy region to minimize latency and avoid DNS-based geolocation inconsistencies.
Session Recording & Replay
Every session is recorded with full DOM snapshots, network requests, and console logs. Replay failed agent runs in the Browserbase dashboard to debug interaction sequences. Invaluable when AI agents make unexpected decisions mid-task.
AI Agent Ecosystem Adoption
As of April 2026, Browserbase is the default or recommended runtime for Browser Use (50K+ GitHub stars), Stagehand (Browserbase\'s own SDK), Anthropic\'s Claude Computer Use reference implementations, OpenAI\'s Operator infrastructure patterns, LangChain\'s PlayWrightBrowserToolkit, and most Playwright-based MCP servers. If you are building AI agents that need to interact with web UIs, you are almost certainly going to run into Browserbase.
Browserbase + Coronium: Why This Combo Works
Browserbase solves the Chrome infrastructure problem. Coronium solves the IP trust problem. Together, they give AI agents the two properties anti-bot systems score on: authentic browser fingerprints and trusted network origin.
CGNAT Trust + Managed Chrome
Browserbase provides authentic Chrome TLS and HTTP/2 fingerprints at the browser layer. Coronium provides CGNAT-backed mobile IPs at the network layer. The combination delivers the two detection axes that matter most: network reputation and browser authenticity.
No Infrastructure to Manage
Browserbase handles Chrome, memory limits, session cleanup, and crash recovery. Coronium handles mobile modem farms, carrier rotation, and IP freshness. Your code only handles business logic -- no Docker, no Kubernetes, no SIM card maintenance.
Scales with Agent Load
Browserbase scales from 1 session to 1,000 concurrent sessions automatically. Coronium mobile proxies handle elastic traffic with unlimited bandwidth per device. The combined stack scales with your AI agent workload without capacity planning.
Session Recording for Agent Debugging
When AI agents fail, Browserbase's session replay shows exactly what the agent saw. Combined with Coronium's per-device connection logs, you can diagnose whether failures originated at the agent reasoning layer, browser layer, or network layer.
Higher Success on Hard Targets
LLM agents often target Google, LinkedIn, Amazon, and booking sites protected by Cloudflare, DataDome, and Akamai. Browserbase stealth mode alone scores 60-75% on these; adding Coronium mobile IPs pushes success rates to 90-95% by fixing the IP reputation signal.
Predictable Pricing at Scale
Browserbase pricing is per session-minute. Coronium pricing is per dedicated device with unlimited bandwidth. Neither has per-GB charges or surprise overage fees, making total cost predictable for agent operations running 24/7.
The Two Detection Axes Anti-Bot Systems Score
Cloudflare, DataDome, Akamai, and PerimeterX all combine these two independent signals
Axis 1: Browser Authenticity
Does this request come from a real Chrome? Signals include TLS fingerprint (JA3/JA4), HTTP/2 SETTINGS frames, Canvas/WebGL rendering output, navigator.webdriver flag, plugin list, and hardware concurrency values.
Browserbase solves this: managed Chrome with stealth patches produces authentic signals.
Axis 2: Network Trust
Does this request come from a trusted network origin? Signals include ASN (datacenter vs ISP vs carrier), IP reputation (historical behavior), geolocation consistency, and CGNAT shared-address patterns.
Coronium solves this: CGNAT-backed mobile IPs from real carriers (T-Mobile, Vodafone, Jio).
Success Rate Math
Local Chrome + Datacenter IP
30-45%
Browserbase only
60-75%
Browserbase + Residential
75-85%
Browserbase + Coronium Mobile
90-95%
* Measured on Cloudflare Turnstile and DataDome-protected targets. Success rates compound multiplicatively -- browser stealth + network trust is the winning combination.
Setup Step-by-Step: Node.js and Python
Paste-ready code to integrate Coronium mobile proxies with Browserbase via the BYOP (Bring Your Own Proxy) feature. Works with any Playwright or Puppeteer-based agent framework.
Prerequisites
From Browserbase:
- Browserbase account (free tier or paid)
- API key (from dashboard Settings)
- Project ID (from dashboard)
From Coronium:
- Mobile proxy device (from $27/month)
- Endpoint: mobile-ip-XX.coronium.io:port
- Username and password (from dashboard)
Node.js: Browserbase + Coronium Integration
Creates a Browserbase session with Coronium mobile proxy routing, connects via Playwright CDP, and navigates to a target
Key points: The proxies array with type: "external" activates BYOP mode. Browserbase routes all page traffic through your Coronium endpoint. stealth: true enables automation indicator patches. region: "us-east-1" should match your proxy country (US mobile IP + Virginia region for lowest latency).
Python: Browserbase + Coronium Integration
Equivalent Python implementation using the browserbase SDK and playwright.sync_api
Async version: Use async_playwright() and await p.chromium.connect_over_cdp(session.connect_url). Browser Use and Stagehand use async patterns by default.
.env File Template
Store all credentials in environment variables. Never hardcode API keys or proxy credentials in source code.
Session Configuration: Stealth, Regions, Rotation
Browserbase session creation accepts a rich config object. These are the options that matter most for Coronium mobile proxy integration and AI agent workflows.
stealth: trueEnables Browserbase's full stealth suite -- navigator.webdriver patched, Canvas/WebGL fingerprint randomization, CDP artifact suppression, realistic navigator.plugins values. Should be enabled for every agent run targeting protected sites.
proxies: [Coronium config]Array of proxy endpoints. Each entry contains type (external), server (your Coronium endpoint), username, and password. Browserbase routes all page traffic including WebSockets, XHR, and subresources through this proxy.
region: "us-east-1"Datacenter region for the Chrome session. Options: us-east-1 (Virginia), us-west-2 (Oregon), eu-west-1 (Ireland). Match region to your Coronium proxy country for minimum latency and consistent geolocation signals.
keepAlive: trueKeeps the session alive across multiple API calls. Useful for agent loops that need to preserve cookies, localStorage, and browser state between LLM reasoning steps. Automatically terminates after 30 minutes of inactivity.
fingerprint: { ... }Advanced fingerprint customization including locale, timezone, screen resolution, and user agent. Set these to match the expected profile of your Coronium mobile IP country -- US mobile IP + en-US locale + America/New_York timezone.
userMetadata: { ... }Tags attached to the session for dashboard filtering. Use to label sessions by agent run ID, proxy device, or target site. Enables bulk analysis of agent performance across proxy configurations.
Region Matching: Browserbase + Coronium
Match Browserbase region to Coronium proxy country for minimum latency and consistent geolocation signals
| Coronium Proxy Country | Browserbase Region | Suggested Locale | Suggested Timezone | Latency |
|---|---|---|---|---|
| United States (East Coast) | us-east-1 | en-US | America/New_York | <20ms |
| United States (West Coast) | us-west-2 | en-US | America/Los_Angeles | <20ms |
| United Kingdom | eu-west-1 | en-GB | Europe/London | <30ms |
| Germany | eu-west-1 | de-DE | Europe/Berlin | <30ms |
| France | eu-west-1 | fr-FR | Europe/Paris | <30ms |
| Spain | eu-west-1 | es-ES | Europe/Madrid | <30ms |
| Netherlands | eu-west-1 | nl-NL | Europe/Amsterdam | <30ms |
| Italy | eu-west-1 | it-IT | Europe/Rome | <30ms |
* Latency is Browserbase-to-Coronium round-trip time. Cross-region routing (e.g., EU proxy with US Browserbase region) adds 80-150ms and creates detectable timing anomalies.
Proxy Rotation Strategies
One task, one session
Create Browserbase session per agent task. Terminate after. Trigger Coronium rotation between tasks. Best for independent tasks.
Long-lived agent loop
Use keepAlive: true + Coronium sticky session (60 min). Rotate on schedule, not per-task. Best for multi-step workflows.
Concurrent agent fleet
N agents = N Coronium devices + N parallel Browserbase sessions. Round-robin device allocation. No shared state.
High-failure target
Rotate Coronium IP on every 403/429. Immediate session recreation with fresh proxy. Track per-IP success rate.
Stealth Configuration Best Practices
Always set stealth: true
Browserbase stealth patches navigator.webdriver, Canvas, WebGL, plugins. Free feature. No reason to disable.
Match fingerprint.locale to proxy country
en-US for US proxy, de-DE for German, etc. Locale-country mismatch is an instant red flag.
Match fingerprint.timezone to proxy country
America/New_York for US East, Europe/Berlin for Germany. JavaScript can read Intl timezone.
Use userMetadata for tagging
Tag sessions with agent_run_id, target_site, proxy_device for filterable analytics.
Enable dnsOverHttps when available
Prevents DNS leak where browser resolves DNS locally outside the proxy.
Integration with Browser Use and AI Agent Frameworks
Browserbase + Coronium plugs into every major AI agent framework via the CDP WebSocket endpoint. Here are the six frameworks where this integration is most common.
Browser Use
50K+ GitHub stars -- Python
LLM-driven browser automation framework from Magnus Muller and the Browser Use team. Takes a natural language task and generates browser actions step-by-step. Widely adopted for autonomous web agents. Supports GPT-4, Claude 4.6, and Gemini models for action planning.
Integration: Browser Use connects to Browserbase via the CDP WebSocket endpoint. The agent loop runs locally while browser execution happens in Browserbase. Proxy routing is inherited from the Browserbase session config.
Best for: Autonomous web agents, form-filling bots, research agents, e-commerce checkout automation
Stagehand
Browserbase-maintained -- TypeScript, Python
Browserbase's own AI browser automation SDK. Extends Playwright with three LLM-powered methods: act() for natural language actions, extract() for structured data extraction, and observe() for element discovery. Optimized for Browserbase's infrastructure.
Integration: Native Browserbase integration -- Stagehand creates sessions automatically and accepts a proxies config at initialization. Inherits all BYOP capabilities including Coronium mobile proxy routing.
Best for: Agentic workflows needing both deterministic code and LLM-driven steps, production AI products
LangChain + Playwright
90K+ GitHub stars (LangChain) -- Python, JavaScript
LangChain's built-in PlayWrightBrowserToolkit wraps Playwright in LangChain tools. Agents built with LangGraph or LangChain agents can navigate, click, extract, and screenshot through the toolkit. Runs against local Chromium or remote CDP endpoints.
Integration: Point LangChain's playwright.chromium.connect_over_cdp() at a Browserbase session URL. Session-level proxy config is applied automatically.
Best for: Multi-step agent workflows, tool-using LLM chains, agent memory integration
Playwright MCP
Anthropic MCP standard -- TypeScript, Python
Model Context Protocol servers expose Playwright as tools for Claude, GPT, and Gemini agents. The MCP browser server accepts a connection URL which can point to Browserbase. Standardized protocol for agentic browser tools across providers.
Integration: Configure the MCP server with the Browserbase connection URL. Sessions are created on-demand when the agent invokes a browser tool. Coronium proxy routes through Browserbase session config.
Best for: Claude Desktop agents, cross-provider tool definitions, standardized agent architectures
Puppeteer Extra (Stealth)
89K+ stars (Puppeteer) -- Node.js
puppeteer-extra with the stealth plugin patches automation indicators like navigator.webdriver, window.chrome, and plugin inconsistencies. Works over CDP against Browserbase, stacking Browserbase's built-in stealth with additional patches.
Integration: Use puppeteer-extra.connect({ browserWSEndpoint }) with the Browserbase WebSocket URL. Stealth plugin applies patches to pages created from the CDP connection.
Best for: Existing Puppeteer codebases, targets with aggressive anti-bot detection, legacy agent frameworks
Custom CDP Agents
Protocol-level control -- Any (CDP-capable)
Raw Chrome DevTools Protocol clients (chrome-remote-interface, playwright CDP session) connect directly to Browserbase for low-level control of page events, network interception, and runtime evaluation. Required when existing abstractions are too high-level.
Integration: Connect to the Browserbase WebSocket URL using any CDP library. All network traffic flows through the session-level proxy configured at creation.
Best for: Custom agent runtimes, research projects, specialized fingerprint manipulation, CDP-specific bugs
Browser Use + Browserbase + Coronium (Python)
LLM-driven AI agent that navigates the web through Browserbase with Coronium mobile proxy routing
How it works: Browser Use asks GPT-4 to plan actions step-by-step. Each action (click, type, scroll) executes in Browserbase's managed Chrome via CDP. All network traffic routes through the Coronium mobile proxy. The 90-95% success rate on Amazon (vs ~60% for default Browserbase) comes from the CGNAT-backed mobile IP.
Stagehand + Coronium (TypeScript)
Browserbase's own AI automation SDK with built-in Browserbase session management
Common Issues and Fixes
Eight issues you will encounter when integrating Browserbase with Coronium mobile proxies, with specific fixes and debugging approaches for each.
Proxy authentication failure (407 Proxy Authentication Required)
Why it happens: Browserbase attempted to connect through your Coronium proxy but the username/password was rejected. Common causes: typo in credentials, IP whitelist restriction (if enabled), or account quota exhausted.
Fix: Verify credentials in the Coronium dashboard. If IP whitelist is enabled, whitelist the Browserbase egress IP ranges or switch to username/password auth instead. Check account status for quota or payment issues.
DNS leak (browser resolves DNS locally, not through proxy)
Why it happens: By default, some browsers bypass the proxy for DNS resolution, leaking your server's actual DNS queries. The target site may see a mismatch between the proxy IP country and the DNS resolver country.
Fix: Enable "proxy DNS" in Browserbase session config with dnsOverHttps: true, or use SOCKS5h:// scheme instead of socks5:// to force DNS through the proxy. Coronium supports DNS over proxy on all endpoints.
Region mismatch between Browserbase and proxy country
Why it happens: Running a Browserbase US-East session through a German Coronium proxy creates a detectable latency pattern (50-100ms RTT from Virginia to Frankfurt) that differs from real mobile users in Germany.
Fix: Match Browserbase region to proxy country: US proxy + us-east-1/us-west-2 region, EU proxy + eu-west-1 region. For global agents, create parallel sessions per region rather than cross-region routing.
CDP WebSocket disconnects mid-session
Why it happens: Long-running agent loops (10+ minutes) may disconnect due to mobile IP rotation, carrier-level NAT timeout, or network flakiness. Symptoms: "WebSocket is not open" or "Target closed" errors.
Fix: Implement CDP reconnection logic with exponential backoff. Use Browserbase keepAlive: true to preserve session state. Configure Coronium rotation interval higher than your agent's task duration (e.g., 30-minute rotation for 20-minute tasks).
Agent actions fail on Cloudflare Turnstile
Why it happens: Turnstile evaluates browser behavior and IP reputation simultaneously. Browserbase stealth passes the browser check but a flagged proxy IP will still fail. Datacenter proxies and low-quality residential pools trigger Turnstile blocks.
Fix: Use Coronium mobile proxies (CGNAT-backed) for Cloudflare-protected targets. Combine with Browserbase stealth: true. Avoid cycling Cloudflare challenges -- if blocked, rotate the mobile IP rather than retrying immediately.
Inconsistent geolocation data (timezone, locale mismatch)
Why it happens: Browserbase default locale is en-US with UTC timezone. If your Coronium proxy is a German mobile IP, the target site sees a US browser with German IP -- an immediate red flag for fingerprinting systems.
Fix: Set the Browserbase fingerprint.locale and fingerprint.timezone to match the proxy country. German proxy: locale: "de-DE", timezone: "Europe/Berlin". Use Intl.DateTimeFormat().resolvedOptions() to verify in-browser.
LLM agent times out waiting for page load
Why it happens: Mobile proxies add 50-200ms latency per request compared to datacenter. Complex pages may take 5-10 seconds to fully load through a mobile proxy. Default 30-second agent timeouts may fire during legitimate loads.
Fix: Increase page.goto() timeout to 60000ms. Use page.waitForLoadState("domcontentloaded") instead of "load" for faster interaction. Set Browser Use action_timeout to 60 seconds minimum for mobile proxy runs.
Session cost higher than expected
Why it happens: Browserbase charges per session-minute. Long-running agent loops without keepAlive disabled, or sessions that hang on failed actions, accumulate cost without progress. A stuck session running for 30 minutes costs 30 session-minutes.
Fix: Implement hard timeouts at the agent loop level. Use Browserbase session API to terminate stuck sessions programmatically. Set keepAlive: false for one-shot agent runs. Monitor session duration metrics in the dashboard.
Debugging Approach: Session Replay First
When an agent fails, always check the Browserbase session replay first. The dashboard shows exactly what the agent saw: DOM state, network requests, console errors, and video replay. Combined with Coronium's per-device connection logs, you can pinpoint whether a failure originated at the agent reasoning layer (LLM chose wrong action), the browser layer (selector timeout, element missing), or the network layer (proxy auth, DNS leak, 403/429). Don't guess -- the replay tells you.
Pricing Comparison: Browserbase Alone vs Browserbase + Coronium
The cost difference between proxy stacks matters less than the success rate difference. A 60% success rate requires 1.67x more requests to get the same data -- doubling your real cost regardless of headline pricing.
Browserbase Only (Startup tier)
Strengths: Managed Chrome, built-in stealth, easy setup
Weaknesses: Default Browserbase egress IPs are datacenter origin -- flagged by Cloudflare, DataDome, Akamai. 60-75% success on hard targets.
Best for: Internal tools, non-protected sites, prototyping
Browserbase + Residential Proxy
Strengths: Improved IP reputation, real ISP origin
Weaknesses: Per-GB billing unpredictable. Shared residential pools have flagged IPs. Agent tasks that render full pages burn GB quickly.
Best for: Medium-difficulty targets, moderate traffic volume
Browserbase + Coronium Mobile (Recommended)
RECOMMENDED FOR PRODUCTIONStrengths: CGNAT trust + managed Chrome + unlimited bandwidth. Highest success on protected targets.
Weaknesses: Higher flat cost vs residential for low traffic. Dedicated device model requires capacity planning.
Best for: Production AI agents, LinkedIn, Amazon, Google, booking sites, financial data
Self-Hosted Chrome + Mobile Proxy
Strengths: Full control, no per-session fees, self-managed fingerprints
Weaknesses: Requires DevOps expertise. Chrome crashes, memory leaks, driver updates, session cleanup all on you. Scaling requires infrastructure work.
Best for: Teams with infrastructure expertise, custom fingerprint requirements, data residency compliance
Effective Monthly Cost for 100K Agent Sessions
Real cost including retries from failed requests on Cloudflare-protected targets
| Stack | Base Cost | Success Rate | Retries Needed | Effective Cost |
|---|---|---|---|---|
| Browserbase Only | $39 + $200 usage | 65% | 1.54x | $368/mo |
| Browserbase + Residential (~10GB) | $39 + $200 + $150 | 80% | 1.25x | $486/mo |
| Browserbase + Coronium (2 devices)cheapest + highest success | $39 + $200 + $54 | 93% | 1.08x | $317/mo |
* Assumes 100K sessions/month, 3-minute average session duration, targets including LinkedIn/Amazon/Google. Coronium stack is cheaper AND higher success because mobile proxies eliminate retry overhead.
Frequently Asked Questions
Technical answers to common questions about integrating Browserbase with Coronium mobile proxies, AI agent frameworks, session configuration, and production debugging.
Coronium Mobile Proxy Plans for Browserbase
Dedicated 4G/5G mobile proxies with unlimited bandwidth, starting from $27/month per device. Compatible with Browserbase BYOP, Browser Use, Stagehand, and every Playwright/Puppeteer AI agent framework.
Configure & Buy Mobile Proxies
Select from 10+ countries with real mobile carrier IPs and flexible billing options
Choose Billing Period
Select the billing cycle that works best for you
SELECT LOCATION
when you order 5+ proxy ports
Carrier & Region
Available regions:
Included Features
๐บ๐ธUSA Configuration
AT&T โข Florida โข Monthly Plan
Your price:
$129
/month
Unlimited Bandwidth
No commitment โข Cancel anytime โข Purchase guide
Perfect For
Popular Proxy Locations
Secure payment methods accepted: Credit Card, PayPal, Bitcoin, and more. 2 free modem replacements per 24h.
AI Agent Applications with Browserbase + Coronium
Production AI agent workloads where the Browserbase + Coronium stack outperforms default browser infrastructure. Each application benefits from CGNAT trust plus managed Chrome.
E-commerce AI Agents
- Amazon price monitoring agents with daily run schedules
- eBay listing analysis with LLM-driven categorization
- Cross-platform price comparison across 20+ marketplaces
- Autonomous checkout and inventory agents
Social Media AI Agents
- Instagram content analysis and engagement tracking
- LinkedIn prospecting agents and profile enrichment
- TikTok trend monitoring with autonomous analysis
- Cross-platform brand sentiment AI agents
Research & Intelligence Agents
- SEO rank tracking with LLM-driven SERP analysis
- Brand protection agents for counterfeit detection
- Competitive intelligence and market research
- Financial data extraction from gated portals
Geographic Agent Coverage
Match Browserbase region to Coronium proxy country for AI agents targeting region-locked content:
Build AI Agents That Actually Work on Protected Targets
Dedicated 4G/5G mobile proxies achieving 90-95% success rates when combined with Browserbase's managed Chrome infrastructure. CGNAT trust + authentic browser fingerprints = production-ready AI agents on LinkedIn, Amazon, Google, and Cloudflare-protected sites.
Compatible with Browserbase BYOP, Browser Use, Stagehand, Playwright, Puppeteer, LangChain, and MCP. HTTP and SOCKS5 support. Unlimited bandwidth with no per-GB billing.