All systems operationalโ€ขIP pool status
Coronium Mobile Proxies
COMPREHENSIVE PROXY GLOSSARY

Mobile Proxy Glossary

Your complete reference guide to mobile proxy terminology, technical concepts, and industry definitions. Master the language of proxy technology with detailed explanations from Coronium's experts.

61
Terms Defined
7
Categories
95%+
Trust Score
24/7
Support

Alphabetical Index

Mobile Proxy Fundamentals

4G Mobile Proxy

Mobile Proxy Fundamentals

A premium proxy service that routes your internet traffic through real mobile devices equipped with physical SIM cards and 4G LTE connections. At Coronium, our 4G mobile proxies provide the exact same connection that millions of people use daily on their smartphones. This authenticity, combined with CGNAT technology where IP addresses are shared among multiple legitimate users, makes these proxies virtually undetectable by websites. The result is a 95%+ trust score, ensuring your automated activities blend seamlessly with regular mobile traffic.

5G Proxy

Mobile Proxy Fundamentals

Next-generation mobile proxies utilizing 5G network technology for ultra-fast speeds and lower latency compared to 4G connections. These proxies maintain all the benefits of mobile proxies - real SIM cards, carrier IPs, and CGNAT protection - while offering speeds up to 10x faster than 4G. 5G proxies are ideal for high-bandwidth applications like video streaming automation, real-time data collection, and time-sensitive web scraping tasks where milliseconds matter.

Cellular Proxy

Mobile Proxy Fundamentals

A broad term encompassing all proxy services that utilize cellular network infrastructure, including 3G, 4G, and 5G connections. Cellular proxies leverage mobile carrier networks to provide residential-quality IP addresses that originate from real mobile devices. This technology is fundamental to bypassing sophisticated bot detection systems because the traffic appears identical to legitimate mobile users browsing from their phones.

Dedicated Mobile Proxy

Mobile Proxy Fundamentals

An exclusive mobile proxy assigned to a single user, providing complete control over the device, IP rotation schedule, and usage patterns. With Coronium's dedicated mobile proxies, you get a private port that maps directly to a physical device. This ensures no sharing of resources, consistent performance, and the ability to maintain long-running sessions. Perfect for businesses requiring stable, predictable proxy infrastructure for critical operations.

LTE Proxy

Mobile Proxy Fundamentals

Long-Term Evolution (LTE) proxies operate on 4G LTE networks, providing stable, high-speed mobile connections through physical devices. These proxies offer the perfect balance of speed, reliability, and authenticity. LTE technology ensures consistent performance with lower latency than 3G while maintaining the crucial mobile carrier IP addresses that websites trust. Our LTE proxies support both IPv4 and IPv6 protocols, making them compatible with all modern web services.

Mobile IP Rotation

Mobile Proxy Fundamentals

The process of changing mobile IP addresses by temporarily disconnecting the device from the internet and reconnecting to obtain a new IP from the carrier's pool. At Coronium, this involves a 10-20 second downtime during rotation, with a system limit of one rotation per 60 seconds. You can test this yourself: check your phone's IP, enable airplane mode for 5 seconds, then check again - you'll have a new IP address from your carrier's pool.

Residential Mobile Proxy

Mobile Proxy Fundamentals

The highest quality tier of residential proxies, combining the trust factor of residential IPs with the authenticity of mobile connections. Unlike datacenter proxies, these originate from real mobile devices on carrier networks, making them indistinguishable from regular mobile users. Coronium's residential mobile proxies come straight from physical devices with SIM cards, providing the cleanest residential connection available for social media automation, e-commerce monitoring, and sensitive web scraping tasks.

Proxy Infrastructure

Connection Pooling

Proxy Infrastructure

A technique that maintains multiple simultaneous connections to optimize performance and resource usage. Connection pooling reduces the overhead of establishing new connections for each request, improving speed and efficiency for high-volume operations. Advanced proxy systems manage pools of mobile connections, automatically distributing requests across available devices. This approach maximizes throughput while maintaining the authenticity of individual mobile connections.

HTTP Proxy

Proxy Infrastructure

A proxy server that handles HTTP protocol traffic, acting as an intermediary for web browsing requests. HTTP proxies work at the application layer, making them easy to configure in browsers and applications. While they lack encryption, they're perfect for basic web scraping, accessing geo-restricted content, and general browsing where security isn't paramount. Coronium's HTTP proxies maintain the same high trust scores as our SOCKS5 offerings.

HTTPS Proxy

Proxy Infrastructure

Secure HTTP proxies that handle encrypted SSL/TLS traffic, providing privacy and security for sensitive operations. HTTPS proxies decrypt and re-encrypt traffic, allowing them to work with secure websites while maintaining the proxy benefits. Essential for e-commerce automation, banking operations, and any scenario involving personal data. Coronium's HTTPS proxies ensure your sensitive data remains protected while benefiting from mobile IP authenticity.

IP Pool

Proxy Infrastructure

A collection of available IP addresses that can be assigned to proxy users. Mobile carrier IP pools are particularly valuable because they consist of legitimate residential addresses shared among real mobile users. Coronium's IP pools span multiple carriers and geographic locations, ensuring diverse, high-quality IPs. The size and quality of an IP pool directly impacts proxy performance, with larger pools reducing the chance of IP conflicts or blacklisting.

Port Rotation

Proxy Infrastructure

A technique that changes the source port number for outgoing connections, helping avoid detection and bypass certain filtering mechanisms. Port rotation works alongside IP rotation to create more diverse connection patterns that appear more human-like. Some proxy systems automatically rotate ports, while others allow manual configuration. Combined with Coronium's mobile IP rotation, port rotation provides an additional layer of anonymity for sophisticated automation tasks.

Proxy Authentication

Proxy Infrastructure

Security mechanisms that verify user credentials before allowing proxy access. Common methods include username/password authentication, IP whitelisting, and token-based systems. Coronium provides secure authentication for all mobile proxies, ensuring only authorized users can access dedicated devices. Proper authentication prevents unauthorized usage, maintains proxy quality, and enables user-specific configurations like rotation settings and usage analytics.

Proxy Chaining

Proxy Infrastructure

The practice of routing internet traffic through multiple proxy servers in sequence, creating layered anonymity and additional security. Each proxy in the chain only knows about the previous and next hop, making it extremely difficult to trace the original source. Proxy chaining with mobile proxies provides maximum anonymity for sensitive operations, though it may increase latency. Best used for high-security scenarios requiring ultimate privacy protection.

Proxy Rotation

Proxy Infrastructure

The automated or manual process of switching between different proxy IP addresses to avoid detection and rate limiting. Coronium offers three rotation methods: button rotation through the dashboard, API reset links for programmatic control, and automatic rotation intervals. Each rotation involves a 10-20 second downtime as the device reconnects to obtain a fresh IP. This technique is essential for large-scale web scraping, maintaining anonymity, and avoiding IP-based restrictions.

Rotating Proxy

Proxy Infrastructure

A proxy service that automatically changes IP addresses at specified intervals or after each request. This rotation helps avoid rate limiting, IP bans, and detection by anti-bot systems. Coronium's rotating mobile proxies can be configured with custom intervals, ensuring fresh IPs for each session while maintaining the 60-second minimum rotation limit for optimal device health and connection stability.

Session Management

Proxy Infrastructure

The system for maintaining consistent proxy connections and managing session persistence across multiple requests. Proper session management ensures that your automated tasks maintain the same IP address throughout a session, crucial for login-based operations, shopping carts, and multi-step workflows. Coronium's dashboard provides granular control over session duration, allowing you to balance between session stability and IP rotation needs.

Session Persistence

Proxy Infrastructure

The ability to maintain consistent proxy connections and IP addresses throughout extended browsing or automation sessions. Session persistence is crucial for operations requiring login states, shopping carts, or multi-step processes. Coronium's mobile proxies offer excellent session persistence, maintaining the same mobile IP until manual rotation or scheduled intervals. This stability enables reliable automation while preserving the authentic mobile user experience websites expect.

SOCKS5 Protocol

Proxy Infrastructure

An advanced proxy protocol that supports authentication, UDP and TCP traffic, and operates at a lower level than HTTP proxies. SOCKS5 provides superior performance and flexibility, making it ideal for diverse applications from web browsing to gaming and P2P connections. Coronium's mobile proxies support SOCKS5, enabling encrypted connections, better speed, and compatibility with virtually any internet application or programming language.

SSL Proxies

Proxy Infrastructure

Proxies specifically configured to handle SSL/TLS encrypted traffic, enabling secure connections through proxy servers. SSL proxies decrypt incoming HTTPS traffic, route it through the proxy network, then re-encrypt before sending to the destination. This allows proxy functionality while maintaining security for sensitive operations like banking, e-commerce, and personal data handling. Coronium's mobile proxies fully support SSL/TLS protocols for secure browsing and automation.

Static Proxy

Proxy Infrastructure

A proxy that maintains the same IP address throughout its usage period, providing consistency for applications requiring stable connections. Unlike rotating proxies, static proxies are ideal for tasks like social media management, where frequent IP changes could trigger security alerts. Coronium offers static mobile proxies that combine IP stability with the authenticity of mobile connections, perfect for maintaining long-term account access.

Whitelist IP

Proxy Infrastructure

A security feature that restricts proxy access to specific, pre-approved IP addresses, ensuring only authorized locations can connect to your proxy service. IP whitelisting adds an extra security layer, preventing unauthorized access even if credentials are compromised. Coronium supports IP whitelisting for enhanced security, allowing businesses to restrict proxy access to office networks, specific servers, or designated user locations for maximum control and security.

Dashboard Features

Dashboard Features

A unique URL endpoint provided for each proxy that allows programmatic IP rotation through simple HTTP requests. Developers can integrate this link into their applications, scripts, or automation tools to trigger IP rotations without accessing the dashboard. The API responds with rotation status, making it essential for large-scale operations, automated workflows, and integration with third-party tools. Each proxy has its own reset link for independent control.

Button Rotation

Dashboard Features

The simplest method to rotate your proxy IP through Coronium's dashboard interface. With a single click in the Proxies tab, you initiate an IP rotation that disconnects and reconnects the mobile device to obtain a fresh IP from the carrier pool. The dashboard provides instant notification of the rotation result, making it perfect for manual operations or quick IP refreshes during testing. This feature requires no technical knowledge and works instantly.

Port Management

Dashboard Features

The system for controlling and configuring proxy ports, where each port represents a unique private device in Coronium's infrastructure. Port management allows you to assign specific ports to different projects, configure authentication, and manage access credentials. Understanding that port equals device is crucial - each port provides exclusive access to a physical mobile device, ensuring dedicated resources and predictable performance.

Proxy API

Dashboard Features

Application Programming Interface that enables programmatic control of proxy functions including rotation, configuration, and monitoring. Coronium's proxy API allows developers to integrate mobile proxy management into applications, automate IP rotation, check connection status, and retrieve usage analytics. The API supports REST endpoints for real-time proxy control, making it essential for large-scale automation, custom applications, and dynamic proxy management workflows.

Real-time Monitoring

Dashboard Features

Live tracking of proxy status, performance metrics, and connection health through Coronium's dashboard. Monitor current IP addresses, connection speeds, active sessions, and any issues as they occur. Real-time monitoring enables quick troubleshooting, performance optimization, and ensures your automated operations run smoothly. Essential for mission-critical applications where downtime or performance degradation must be detected immediately.

Rotation Interval

Dashboard Features

An automated setting that rotates your proxy IP at predetermined time intervals without manual intervention. Configure intervals from minutes to hours based on your needs, and Coronium's system handles the rotation automatically. This feature is crucial for maintaining anonymity in long-running operations, distributing requests across different IPs, and avoiding pattern detection. Remember the 60-second minimum between rotations for optimal performance.

Usage Analytics

Dashboard Features

Comprehensive metrics and statistics about your proxy usage, including bandwidth consumption, rotation frequency, success rates, and geographic distribution. Coronium's analytics help you optimize proxy performance, identify issues, and plan resource allocation. Track daily, weekly, and monthly trends to understand your usage patterns and ensure you're maximizing the value of your proxy investment.

Browser Technology

Anti-detect Browser

Browser Technology

Specialized browsers designed to mask and randomize browser fingerprints, making each browsing session appear as a unique user. These browsers modify identifying characteristics like canvas fingerprint, WebGL parameters, timezone, language, and hardware specifications. When combined with Coronium's mobile proxies, anti-detect browsers create virtually undetectable automation setups, perfect for managing multiple accounts, e-commerce operations, and circumventing sophisticated tracking systems.

Browser Fingerprinting

Browser Technology

The technique of collecting unique browser and device characteristics to identify and track users across sessions. Fingerprints include screen resolution, installed fonts, browser plugins, canvas rendering, audio context, and hundreds of other parameters. Websites use fingerprinting to detect bots, prevent fraud, and track users. Coronium's mobile proxies help diversify fingerprints by providing authentic mobile IPs that match expected mobile device characteristics.

Canvas Fingerprinting

Browser Technology

A tracking technique that uses HTML5 canvas element to generate a unique identifier based on how your device renders graphics. Even identical browsers on different devices produce slightly different canvas renderings due to hardware, drivers, and settings. Anti-detect browsers randomize canvas output to prevent tracking. Combined with mobile proxies, this creates a robust defense against fingerprint-based detection systems.

Browser Technology

The systematic handling of HTTP cookies during automated browsing sessions to maintain authentication, track sessions, and avoid detection. Proper cookie management involves storing, organizing, and selectively using cookies across different accounts or sessions. Mobile proxies enhance cookie management by providing consistent IP addresses that match cookie origins, preventing security warnings and session invalidation that can occur when cookies and IPs don't align geographically.

Digital Fingerprint

Browser Technology

A unique identifier created from the combination of device, browser, and network characteristics. Unlike cookies, digital fingerprints persist across sessions and incognito modes. Components include user agent, HTTP headers, JavaScript attributes, and network information. Managing digital fingerprints is crucial for maintaining anonymity and avoiding detection in automation tasks. Mobile proxies provide network-level fingerprint diversity essential for authentic-looking traffic.

Fingerprinting

Browser Technology

The comprehensive process of collecting unique device and browser characteristics to create a distinct identifier for tracking users. This includes canvas fingerprinting, WebGL rendering, audio context, screen resolution, installed fonts, timezone, language, hardware specs, and network characteristics. Unlike cookies, fingerprints persist across sessions and incognito mode. Successful automation requires managing fingerprints to appear as different users, which mobile proxies support by providing authentic mobile network characteristics.

Mobile User Agent

Browser Technology

Specific user agent strings that identify mobile browsers and devices to websites, enabling proper mobile content delivery and responsive design. Mobile user agents include device model, browser version, and operating system information that websites use to optimize content. When using mobile proxies, matching user agents to mobile IP addresses creates authentic mobile browsing sessions. Coronium's mobile proxies pair perfectly with mobile user agents for seamless mobile automation and content access.

Profile Isolation

Browser Technology

The practice of completely separating browser profiles to prevent cross-contamination of cookies, cache, and fingerprints between different accounts or sessions. Each isolated profile maintains its own browsing history, cookies, local storage, and fingerprint. Essential for multi-account management, profile isolation combined with Coronium's dedicated mobile proxies ensures each account appears as a completely unique user.

User Agent Spoofing

Browser Technology

The practice of changing the User-Agent string that browsers send to websites, making the connection appear to come from different browsers, devices, or operating systems. User agent spoofing is essential for web scraping and automation to avoid detection and access mobile-specific content. When combined with Coronium's mobile proxies, proper user agent configuration creates authentic mobile browsing sessions that perfectly match the expected mobile device characteristics.

WebGL Fingerprinting

Browser Technology

Advanced fingerprinting using WebGL (Web Graphics Library) to identify devices based on GPU characteristics and rendering capabilities. WebGL reveals graphics card model, supported extensions, and rendering parameters that are nearly impossible to spoof without specialized tools. Anti-detect browsers mask these parameters, while mobile proxies ensure the network fingerprint matches the expected mobile device profile.

Web Scraping & Automation

Bot Detection

Web Scraping & Automation

Advanced systems used by websites to identify and block automated traffic, bots, and scrapers. Modern bot detection analyzes hundreds of parameters including IP reputation, browser fingerprints, mouse movements, typing patterns, and request timing. These systems use machine learning to adapt and identify new bot behaviors. Coronium's mobile proxies help bypass bot detection by providing authentic mobile carrier IPs with high trust scores that appear as legitimate mobile users.

Bot Detection Bypass

Web Scraping & Automation

Techniques and tools used to circumvent anti-bot systems that websites employ to block automated access. Modern bot detection analyzes IP reputation, browser fingerprints, behavior patterns, and request rates. Coronium's mobile proxies provide the foundation for bypass strategies with legitimate carrier IPs, while proper rotation and session management help maintain human-like browsing patterns that evade detection algorithms.

Browser Automation

Web Scraping & Automation

The use of scripts or tools to control web browsers programmatically, simulating human interactions like clicking, typing, and scrolling. Popular frameworks include Selenium, Puppeteer, and Playwright. Browser automation combined with mobile proxies enables sophisticated operations like account creation, form submission, and multi-step workflows while maintaining the appearance of legitimate mobile user behavior.

CAPTCHA Solving

Web Scraping & Automation

The process of automatically or semi-automatically solving CAPTCHA challenges that websites use to verify human users. While CAPTCHAs aim to block bots, mobile proxies reduce CAPTCHA frequency by providing trusted residential IPs. When CAPTCHAs do appear, the high trust score of mobile IPs often results in simpler challenges. Some operations integrate CAPTCHA solving services with proxy rotation for fully automated workflows.

Data Extraction

Web Scraping & Automation

The process of retrieving specific information from web pages, APIs, or databases in a structured format. Successful data extraction requires avoiding detection while maintaining speed and accuracy. Mobile proxies provide the anonymity and IP diversity needed for large-scale extraction operations. Whether extracting product prices, social media metrics, or business listings, proper proxy infrastructure ensures continuous access to target data.

Headless Browsing

Web Scraping & Automation

Running web browsers without a graphical user interface, typically for automated testing and web scraping. Headless browsers like Puppeteer or Selenium consume fewer resources while maintaining full JavaScript rendering capabilities. When configured with Coronium's mobile proxies, headless browsers can scrape JavaScript-heavy sites while maintaining the appearance of genuine mobile traffic, essential for modern web scraping operations.

Web Scraping

Web Scraping & Automation

The automated extraction of data from websites using bots, scripts, or specialized software. Web scraping requires sophisticated proxy infrastructure to avoid detection and blocking. Coronium's mobile proxies excel at web scraping because they provide residential IPs that bypass anti-bot measures, rotate automatically to avoid rate limits, and maintain high trust scores with target websites. Essential for price monitoring, market research, and competitive intelligence.

Network Technology

Bandwidth Throttling

Network Technology

Intentional slowing or regulation of internet bandwidth to limit data transfer rates. ISPs and websites use throttling to manage network congestion or limit specific types of traffic. Mobile proxies can help bypass throttling by routing traffic through different carrier networks. Coronium's mobile proxies provide unthrottled connections with speeds of 10-100+ Mbps, ensuring consistent performance for data-intensive operations like video streaming or large-scale web scraping.

Carrier IPs

Network Technology

IP addresses assigned directly by mobile network carriers (AT&T, Verizon, T-Mobile, etc.) to mobile devices. These IPs carry the highest level of trust because they're associated with legitimate mobile users and protected by CGNAT. Carrier IPs are virtually impossible to distinguish from real user traffic, making them invaluable for sensitive operations. Coronium exclusively provides authentic carrier IPs from physical devices with real SIM cards.

CGNAT

Network Technology

Carrier Grade Network Address Translation is the technology that makes mobile proxies incredibly powerful. CGNAT allows mobile carriers to share a single public IP address among multiple users, meaning your proxy IP is simultaneously used by legitimate mobile users for everyday activities like shopping and social media. This shared nature makes it virtually impossible for websites to block these IPs without affecting real users, providing unparalleled protection for your automated operations.

DS-Lite

Network Technology

Dual-Stack Lite technology enables IPv4 communication over IPv6 networks, crucial for mobile carriers transitioning to IPv6. DS-Lite encapsulates IPv4 packets within IPv6, allowing access to IPv4-only websites through IPv6 infrastructure. Coronium's mobile proxies leverage DS-Lite to ensure compatibility with all websites regardless of their IP version support, maintaining seamless connectivity across the evolving internet landscape.

IPv6 Support

Network Technology

Compatibility with Internet Protocol version 6, the newest IP standard offering vastly more addresses than IPv4. Many mobile carriers have adopted IPv6, and Coronium's proxies support both protocols. IPv6 provides better routing efficiency, improved security features, and access to IPv6-only services. As more websites adopt IPv6, having proxy support ensures continued access to the entire internet.

Related:DS-LiteNAT64

MVNO

Network Technology

Mobile Virtual Network Operators are carriers that provide mobile services using another carrier's infrastructure. MVNOs offer unique IP ranges and network characteristics that can be valuable for proxy diversity. Coronium sources proxies from both major carriers and MVNOs, providing a diverse IP pool that helps avoid pattern detection and ensures broad compatibility with different website security measures.

NAT64

Network Technology

Network Address Translation mechanism that enables IPv6-only clients to communicate with IPv4 servers. NAT64 translates between protocols, essential as the internet transitions from IPv4 to IPv6. Mobile carriers increasingly use NAT64, and Coronium's proxies support this technology to ensure uninterrupted access to both IPv4 and IPv6 resources, providing future-proof proxy infrastructure.

Use Cases

Ad Verification

Use Cases

The process of confirming that digital advertisements appear correctly, in the right context, and reach the intended audience. Advertisers use proxies to verify ad placement from different geographic locations and devices. Mobile proxies are particularly valuable for verifying mobile ads, ensuring campaigns display properly on actual mobile connections. Coronium's global proxy network enables comprehensive ad verification across all markets.

Brand Protection

Use Cases

Monitoring and enforcement activities to protect intellectual property, trademarks, and brand reputation online. This includes detecting counterfeit products, unauthorized sellers, and brand impersonation. Mobile proxies enable comprehensive monitoring across marketplaces, social media, and websites without alerting bad actors. Coronium's diverse proxy network ensures thorough coverage of all platforms where brand violations might occur.

E-commerce Monitoring

Use Cases

Tracking product availability, prices, and competitor strategies across online retail platforms. E-commerce sites employ sophisticated bot detection, making mobile proxies crucial for consistent access. Whether monitoring Amazon listings, tracking Shopify stores, or analyzing marketplace trends, Coronium's proxies ensure uninterrupted data collection while maintaining the appearance of genuine mobile shoppers.

Geo-targeting

Use Cases

The practice of delivering different content, prices, or availability based on the user's geographic location. Websites use geo-targeting for compliance, pricing strategies, and localized content delivery. Mobile proxies enable geo-targeting bypass and testing by providing authentic IP addresses from different locations. Coronium's global mobile proxy network allows access to geo-restricted content and testing of location-specific functionality across multiple markets and regions.

Price Monitoring

Use Cases

Automated tracking of product prices across multiple websites to identify trends, opportunities, and competitive positioning. Retailers use price monitoring to adjust strategies dynamically, while consumers track deals. Mobile proxies enable large-scale price monitoring without triggering anti-bot measures, ensuring accurate, real-time pricing data from geo-specific locations using Coronium's diverse proxy network.

SEO Monitoring

Use Cases

Tracking search engine rankings, SERP features, and competitor performance from different locations and devices. Accurate SEO monitoring requires proxies to avoid personalization and rate limiting. Mobile proxies are essential for monitoring mobile search results, which often differ from desktop. Coronium's proxies enable accurate rank tracking, competitor analysis, and SERP feature monitoring across all major search engines.

Social Media Automation

Use Cases

The use of tools and scripts to automate social media tasks like posting, following, messaging, and engagement. Mobile proxies are essential for social media automation because platforms like Instagram, Facebook, and Twitter heavily monitor for bot activity. Coronium's mobile proxies provide the authentic mobile IPs that social platforms expect, allowing safe automation of multiple accounts without triggering security systems or bans.

Trust Score

Use Cases

A metric indicating how legitimate and trustworthy a proxy IP appears to websites and services. Trust scores consider factors like IP history, usage patterns, and whether the IP belongs to a residential or datacenter range. Coronium's mobile proxies maintain 95%+ trust scores because they use real carrier IPs shared with legitimate mobile users through CGNAT, making them virtually indistinguishable from regular mobile traffic.

Ready to Get Started with Mobile Proxies?

Put your newfound knowledge to use with Coronium's premium mobile proxy infrastructure.

Need Technical Support?

Our proxy experts are available 24/7 to help you implement these concepts in your projects.