Blue Shell Group

Nobody is safe.

Creating a Private Database of Proxies – Part 2: Scraping IP Addresses

In this section of our tutorial on creating a database of proxies, we’ll be walking through how we’re going to write our program.

What do I need to do this?

For this part of the tutorial, we’ll assume that you’ve read the tutorial introduction, and you know what we’re trying to do, and why. This section will not require you to have any programming knowledge; we’re only going to walk through the steps we’re going to take to get the IP addresses for the proxy server. You should have a VERY basic knowledge of HTML and CSS, or at least know what they are. If you don’t hopefully you will by the end of this section. Everything else that you’ll need for later sections will be explained then. Read the full article >>


Creating a Private Database of Proxies – Part 1: An Introduction

In this tutorial, we are going to show you how to create your own private database of proxy servers, how to keep that database updated with working, fast proxies, and how to use another piece of software like ProxyChains in conjunction with your database. At the end of this tutorial, you will have built a system that allows you to use any application behind as many proxies as you choose, that you know will all work. In the next few sections, we’ll explain what a proxy is, and why you should use more that one. Feel free to skip it if you already know.

What is a proxy, really?

In it’s simplest form, a proxy is a server that sits between two other servers, and connects them without allowing them to see each other. Let’s say Alice and Bob are enemies, and Alice wants to access Bob’s website without him knowing. By using a proxy, all of Alice’s requests to Bob’s site appear to Bob to be coming from another source: the proxy. But maybe instead of not wanting Bob to see its her, maybe Alice doesn’t want her parents seeing that she goes on Bob’s site. Again, she can use a proxy. If Alice’s parents look at her web traffic, they’ll see the traffic that is actually going to Bob, going to another IP address: the proxy. In this way, proxies serve as an intermediary between two parties on the internet. Read the full article >>

%d bloggers like this: