FAQs

A proxy acts as an intermediary between your device and the internet, hiding your real IP address and providing anonymity while you browse.

We offer Residential, Data Center, Rotating, and Mobile Proxies, each tailored for specific tasks like web scraping, gaming, or secure browsing.

Depending on your usage, lighter tasks may only need a Monthly or 3-Month package, while intensive users may benefit from our 6-Mont…ctions with minimal latency, thanks to our servers across 50+ countries.

Yes, our proxies come with unlimited bandwidth, allowing you to perform your tasks without restrictions.

API mode configuration is an automated method that automatically rotates IP every 5 minutes. This method is suitable for users who need to change IP frequently, such as those who need to deal with crawler programs with anti-crawler mechanisms or users who need to protect privacy.

Another way to configure is to configure with a username and password, select a sticky IP, and customize the rotation time range from 1-720 minutes. This method is more suitable for users who have requirements for IP stability, such as users who need to access certain websites stably for a long time or who need to stay online.

This is a configuration method for unlimited packages. When you purchase an unlimited package configuration, you need to open the whitelist list and select the Unlimited Proxy type to add your local IP address to the whitelist. This way, when you use the unlimited package, VINPOS will allow you to use unlimited proxy services and only IP addresses listed in the whitelist can access the service.

In order to use our proxy service, you need to ensure that your network environment is an overseas network environment.

If you’re using HTTP, the DNS will be the same IP you’re using. If you selected socks5, it will be local DNS.

When you use the HTTP protocol, DNS resolution will use the DNS server corresponding to the IP you are using. This means that when you send an HTTP request, the operating system will use the DNS servers in your configured network settings to resolve the hostname to obtain the IP address of the target server. Therefore, the IP address and DNS server you are using will be the same.

However, things are different when you choose to use a SOCKS5 proxy. The SOCKS5 proxy will establish a proxy server locally, and your network requests will be forwarded through the proxy. In this case, DNS resolution will be handled by the local DNS server, not by the DNS server in your configured network settings.

Our proxy service blocks illegal, adult, gambling, and banking and financial websites.

We are committed to ensuring the legality and safety of proxy services to protect the interests of users and the network. Therefore, we take steps to restrict access and block illegal content, adult content, gambling sites, and sensitive banking and finance-related sites. By implementing these blocking measures, we are able to help users filter out unwanted or inappropriate content and provide a safer and more reliable proxy service.

There are many tools on the website to check IP addresses. For example, ipinfo.io.you can follow these steps:

1.Open your web browser (such as Chrome, Firefox, etc.).

2. Enter “ipinfo.io” in the address bar, and press Enter to enter the official website of ipinfo.

3. On the home page of ipinfo, you will see a search box. By default, the search box displays your current IP address and related information.

4. If you want to view the information of other IP addresses, you can enter the IP address in the search box, and then press the Enter key.

5. ipinfo will display relevant information about the queried IP address for you, including the IP address itself, geographical location, operator, ASN (Autonomous System Number) and other available information.

Our proxy supports HTTP/HTTPS/SOCKS5 three protocols, and for the transport layer protocol, we support TCP.

1.HTTP (Hypertext Transfer Protocol): used to communicate between web browsers and web servers, and supports obtaining and sending web pages, resources, and data.

2.HTTPS (HTTP Security): It is the HTTP protocol protected by TLS/SSL encryption, which is used to securely transmit sensitive data, such as user login information and payment details.

3.TCP (Transmission Control Protocol): Provides reliable, connection-oriented data transmission for establishing reliable data transmission channels between applications in the network.

4.SOCKS5 uses Secure Shell (SSH) tunneling to transmit data. This method provides secure remote transmission across the network.

Yes, you can use our proxy on your mobile.

To use the Residential proxy, it is recommended that you configure the proxy with username and password authentication. You can copy the information generated by the official website to the mobile proxy software for configuration and use, and fill in the following necessary information according to the information provided by your proxy service provider:

Proxy Server Address: Enter the address (usually an IP address) of the rotating residential proxy server.

Proxy Server Port: Enter the port number of the rotating residential proxy server.

Username and Password: Enter the username and password you generated on the User List page of the official website.

Please note: When using the S5 package on the mobile phone, you need to ensure that the mobile phone and the computer bound to the IP are in the same network environment.

IP address area identification usually determines the geographic location of an address by means of an IP address database. If this database is incorrect or out of date, it may result in misidentification.

Different browsers and websites use different IP identification databases. We use the latest databases, which are updated faster, and some databases may experience delays. We’ll keep updating ours.

Select a package, complete the checkout, and receive your proxies instantly via email. We support multiple payment methods.

We accept credit cards, PayPal, and cryptocurrencies. For more details, visit our payment section.

Yes, our support team is available around the clock to assist you with any questions or issues.

By adding specific domain names to a block list, you can prevent users from accessing those websites or domains, thereby limiting access to specific content.

By setting up blocked domains, you can effectively limit access to specific websites. When a user tries to access a blocked domain name, the network system will intercept the request and display a corresponding blocking page or error message, informing the user that the website is prohibited from accessing.

Yes, you can pin a specific IP segment in the blacklist to block access to that IP segment. The following are instructions for expanding the IP range you mentioned:

1.If you want to fix the entire 192.168.x.x IP segment in the blacklist, you can add 192.168/16 to the blacklist. This will block all IP addresses starting with 192.168 from accessing your account. This setting can block all IP addresses from 192.168.0.0 to 192.168.255.255.

2.If you only want to fix the IP segment 192.168.0.x in the blacklist, you can add 192.168.0/24 to the blacklist. This will block all IP addresses starting with 192.168.0 from accessing your account. This setting can block all IP addresses from 192.168.0.0 to 192.168.0.255.

3.If you want to fix a specific IP address 192.168.0.1 in the blacklist, you can add 192.168.0.1/32 to the blacklist. This will only block the specific IP address 192.168.0.1 from accessing your account.

You can control access to specific IP addresses or IP address ranges by adding corresponding IP address segments to the blacklist.

Yes, you can fix the IP segment yourself if needed. The following is an example of the IP segment you mentioned:

1.If you want to fix the entire 192.168.x.x IP segment, you can add 192.168/16 to the whitelist. This will allow all IP addresses starting with 192.168 to access your account. This setting covers all IP addresses from 192.168.0.0 to 192.168.255.255.

2.If you only want to fix the IP segment of 192.168.0.x, you can add 192.168.0/24 to the whitelist. This will allow all IP addresses starting with 192.168.0 to access your account. This setting covers all IP addresses from 192.168.0.0 to 192.168.0.255.

3.If you want to fix only the specific IP address 192.168.0.1, you can add 192.168.0.1/32 to the whitelist. This will only allow the specific IP address 192.168.0.1 to access your account.

By adding the corresponding IP address segment to the whitelist, you can control access to specific IP addresses or IP address ranges.

You can generate proxies from certain region, which doesn’t show in the drop down box, by editing the country code in the proxy username.

For example, with a username of gfeawer-zone-resi-region-in,you can change it into:

gfeawer-zone-resi-region-br

gfeawer-zone-resi-region-vn

gfeawer-zone-resi-region-us

to use the proxies in Brazil, Vietnam and USA.

When using random ip, the random ip will change automatically, you can’t control or know its duration. This mode is suitable for situations where frequent IP address changes are required to increase anonymity and prevent tracking.

When using Sticky IP, Sticky IP Mode allows you to set the duration of the IP address, usually in the range of 1-30 minutes.

Residential Proxies are valid for 30 days from the date of purchase.

During this time period, you can take full advantage of proxy services to provide more choices and privacy protection for your network activities. Once the validity period expires, your rotating residential proxy will expire. This means that you will no longer be able to use the proxy to access the Internet until you purchase a new proxy service or renew your existing service.

Using the API method, the IP rotates every 5 minutes,

The rotation of the configuration method using username and password can be customized by you: choose random ip, you can not control or know its duration; choose sticky ip, you can customize the rotation time of ip from 1-30 minutes.

Proxy is valid for 30 days from the date of purchase. During the validity period of 30 days, you can use proxy services according to your needs.

In order to make it easier for you to understand and track data usage, we provide a traffic history feature. You can view data usage through traffic history, including used data and remaining available data.

Traffic history records can help you grasp the usage of proxy services, understand your traffic consumption, and make timely adjustments and management.