Skip to content

Can you explain the difference of these proxies? (Dedicated/Shared/Backconnect)

I was wondering what are the differences between these type of proxies. Please help.


  • DeeeeeeeeDeeeeeeee the Americas
    edited August 2019

    The backconnect seem to work like this:

    You connect through one gateway/IP, but what actually connects to the target URL is a range of available IPs. So, you're always using a random, different proxy address. But on GSA-SER, you only enter ONE IP that is the "gateway" or door to them all...

    This is good for search engines, when you are looking for targets. There are pay services like StormProxies that have this. It works really well. Their rotating back-connected proxies are their own.

    Also, Sven wrote a program called GSA Proxy Scanner, which does the same thing, collecting proxies publicly available, and using that list that you access via ONE port on your machine. (Now, actually, it's able to use multiple ports, as of this Summer!!!)

    Dedicated proxies are private.  To the best of my knowledge, they are yours and your alone to use. The proxy you see on your side is the one that is outgoing and actual address connecting to systems. usually, you can use these for posting and verification.

    Shared proxies are like dedicated,but you (and a few other people) all share each of the private proxies you pay for. This is OK, depending on the service and people you're sharing with.

    As long as they're responsible, sharing seems OK. You don't want to share with someone misusing proxies, because they'll get "messed up" and end up on block lists, etc.

    So, you need a rotating proxy AND some sort of private to both search for targets and post.  If you buy lists, you may not need back-connected rotating.

    Also, private proxies can be IP-locked. That means only YOU can use them, ever.

    Shared can also be IP-locked, but the provider only lets each of the users sharing use the proxies, and no one else.

    There is also a way to lock some private and shared proxies,  via a PW and Username, instead. (Not all proxy providers offer this) Technically, people can use your proxies if they hack your email and steal the PWs and Usernames, but you can use them from a variety of VPN systems.

    Hope this helped. :)
  • Thank you! Well explained.
    Thanked by 1Deeeeeeee
Sign In or Register to comment.