Residential products FAQ
Find answers to common questions about integrating, configuring, and using Bright Data’s Residential proxy products, including IP types, geotargeting, and error codes.
To integrate the proxies into your code, please visit the API examples page, which can be accessed via your zone’s settings, under “access parameters”:
On this page, you can choose integration examples for most modern coding languages, just choose the integration type, your proxy zone, coding language, etc. and the page will generate a code snippet you can use right away.
Check out a few examples in the API examples page mentioned above (just choose “other software” in the “language” drop-down menu), or check our Integrations page, where we have specific guides to integrate our proxies within the most popular tools across the industry today.
Important note: If you are using Bright Data’s Web Unlocker, Residential Proxies or the SERP API you probably need to use our SSL certificate to enable end-to-end secure connections. See instructions here.
We have prepared detailed guides for the most commonly used tools. You can find links to the guides in the list below:
BrowserScan https://brightdata.com/integration/browserscan
XLogin https://brightdata.com/integration/xlogin
GeeLark https://brightdata.com/integration/geelark
Puppeteer https://brightdata.com/integration/puppeteer
Playwright https://brightdata.com/integration/playwright
Selenium https://brightdata.com/integration/selenium
AdsPower https://brightdata.com/integration/adspower
Dolphin Anty https://brightdata.com/integration/dolphin-anty
Incogniton https://brightdata.com/integration/incogniton
Marketerbrowser https://brightdata.com/integration/marketerbrowser
SMLOGIN https://brightdata.com/integration/smlogin
Hidemyacc https://brightdata.com/integration/hidemyacc
OpenBullet https://brightdata.com/integration/openbullet
Switchyomega https://brightdata.com/integration/switchyomega
PhantomBuster https://brightdata.com/integration/phantombuster
BitBrowser https://brightdata.com/integration/bitbrowser
Maskfog https://brightdata.com/integration/maskfog
Ghost Browser https://brightdata.com/integration/ghost-browser
Postman https://brightdata.com/integration/postman
NGINX https://brightdata.com/integration/nginx
StablerSOLO https://brightdata.com/integration/stablersolo
VMLogin https://brightdata.com/integration/vmlogin
GoLogin https://brightdata.com/integration/gologin
Windows https://brightdata.com/integration/windows
Scrapy https://brightdata.com/integration/scrapy
AEZAKMI https://brightdata.com/integration/aezakmi
Beautifulsoup https://brightdata.com/integration/beautifulsoup
WebHarvy https://brightdata.com/integration/webharvy
Ubuntu https://brightdata.com/integration/ubuntu
Lalicat https://brightdata.com/integration/lalicat
Multilogin https://brightdata.com/integration/multilogin
Undetectable https://brightdata.com/integration/undetectable
Apify https://brightdata.com/integration/apify
iPhone https://brightdata.com/integration/iphone
MuLogin https://brightdata.com/integration/mulogin
Changedetection https://brightdata.com/integration/changedetection
Morelogin https://brightdata.com/integration/morelogin
Proxifier https://brightdata.com/integration/proxifier
Texau https://brightdata.com/integration/texau
Android https://brightdata.com/integration/android
Kameleo https://brightdata.com/integration/kameleo
Screaming Frog https://brightdata.com/integration/screaming-frog
Foxy https://brightdata.com/integration/foxyproxy
SessionBox https://brightdata.com/integration/sessionbox
Insomniac https://brightdata.com/integration/insomniac
Helium Scraper https://brightdata.com/integration/heliumscraper
SaleFreaks https://brightdata.com/integration/salefreaks
Postern https://brightdata.com/integration/postern-proxy-integration
Antik https://brightdata.com/integration/antik
Easync https://brightdata.com/integration/easync
ParseHub https://brightdata.com/integration/parsehub
Sphere Browser https://brightdata.com/integration/sphere-browser
Octoparse https://brightdata.com/integration/octoparse
ixBrowser https://brightdata.com/integration/ixbrowser
Shadowrocket https://brightdata.com/integration/shadowrocket
Firefox https://brightdata.com/integration/firefox
Chrome https://brightdata.com/integration/chrome
MacOS https://brightdata.com/integration/macos
ClonBrowser https://brightdata.com/integration/clonbrowser
Octo Browser https://brightdata.com/integration/octobrowser
Genlogin https://brightdata.com/integration/genlogin
Web Scraper https://brightdata.com/integration/webscraper
If the tool you’re using does not appear on the list and you would like to get a guide for it, contact us!
When sending your request, add the -country
flag, after your zone’s name in the request, followed by the 2-letter ISO code for that country.
In the example below: We added -country-us
to our request, so we will send a request originating from the United States (“us”).
curl "http://target.site" --proxy brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>-country-us: <zone_password>
You can target the entire European Union region in the same manner as “Country” above by adding “eu” after “country” in your request: -country-eu
Requests sent using -country-eu, will use IPs from one of the countries below which are included automatically within “eu”:
AL, AZ, KG, BA, UZ, BI, XK, SM, DE, AT, CH, UK, GB, IE, IM, FR, ES, NL, IT, PT, BE, AD, MT, MC, MA, LU, TN, DZ, GI, LI, SE, DK, FI, NO, AX, IS, GG, JE, EU, GL, VA, FX, FO
In order to target a specific city you will need to use a Shared (pay-per-IP) or Dedicated proxy network.
When configuring your proxy zone, after selecting your preferred country, you can add a city, to further specify your geotargeting
Once you click on ‘Add city’ you will be displayed the available cities to target, for the selected country. In order to check the number of available IPs for a specific geolocation.
Once configured, you’ll be able to send requests from the selected city, using the following syntax
curl "http://target.site" --proxy brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>-country-<country>-city-<city>: <zone_password>
When selecting a two-word city it’ll be written as one word.
For example, when targeting Buenos Aires the syntax of the request will be:
-country-ar-city-buenosaires
To view more geotargeting examples, you may want to review our proxy integration examples page.
Bright Data offers proxies in every country in the world, except in the following countries:
- Iran
- Iraq
- Syria
- Lebanon
- Palestine
- North Korea
- Cuba
- Sudan
- Crimea region of Russia
If you need proxies from there countries, unfortunately Bright Data will not be able to help you.
The event log will show you (at most) the last 200 requests you made with any zone in your account.
In your Bright Data control panel’s proxies page: https://brightdata.com/cp/zones
Go to the “Event Log” tab:
The presented data is:
- Date: Time and date of the request
- Zone: What Zone was used for the request
- Source IP: What IP the request was made from
- URL: The target site of the request
- Result: Success or Fail of the request
- This can be done by adding the session flag to the proxy username:
brd.superproxy.io:33335 br-customer-<customer_id>-zone-<zone_name>-session-rand39484
Generate the random number on thread startup, and change it when you want to change the Proxy Peer assigned for the thread’s connection.
- Session ID can be any random string/counter: requests with the same session string will use the same Proxy Peer (as long as possible); requests with different session strings will be assigned different Proxy Peers.
- To force an IP change, just modify the session ID
- If an assigned Proxy Peer(exit node IP) becomes unavailable, the Super Proxy will return an error “502 - No peers available” for the first request and then on the second request the super proxy will assign a new peer even if you do not change the session ID.
- The Session IP is kept persistent for up to 1 minute of idle time. After a minute with no requests, the IP is released back to the pool.
To keep this Session/IP for longer, send a tiny keep-alive request every 30 seconds, to prevent this session from becoming idle for over a minute.
This request may be anything small, such as /favicon.ico, or even a request that returns 404 (as long as the web server does not disconnect the socket due to this request). - If you have multiple Clients and would like to ignore your Clients source IP (which is used together with your session ID to create a session), then you want to use a global session then add
glob_
as a prefix to your session:
brd-customer-<customer_id>-zone-<zone_name>-session-glob_rand39484
Full request example:
brd-customer-CXXXXX-zone-ZONE_X-session-glob_rand39484
Generate the random number on thread startup, and change it when you want to change the Proxy Peer assigned for the thread’s connection.
Bright Data allows targeting the following Operating Systems:
When using Bright Data’s Residential Proxy network, you may find the need to use a specific IP allocated to your zone.
- Send a test request with a ‘—verbose’ or ‘-v’ option added (this will turn on verbose logging)
curl "https://lumtest.com/myip.json" --verbose --proxy brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>:<zone_password>
- Locate the x-brd-ip response header and copy its value
-
Add the -ip- flag to your request, after your zone’s name and use the hashed IP value copied in the previous step
-
Send a test request, and review the response
curl "https://lumtest.com/myip.json" --proxy brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>-ip-<hashed-ip>:<zone_password>
We recommend using https://lumtest.com/myip.json as the target domain for testing, and to review your IP credentials.
This feature can be enabled by adding the ASN parameter to your Zone configuration, under Geolocation Targeting.
Once the configuration is saved, the ASN flag can be added to the Zone’s credentials
and be integrated when using the Residential proxies. For example:
curl --proxy brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>-asn-<asn-number>:<zone_password> "<target_site>"
Note: Values for ASN number can be found here.
Dedicated Residential IPs can be selected in the form of gIPs. They can be allocated under the zone’s configuration page by selecting a “Dedicated” IP type and choosing a number of gips. Also targeting a specific domain is required.
Once the configuration is saved, selecting “Show allocated Dedicated residential IPs” will provide
a list of hash values that represent group IPs.
These values can be used to target a specific gip. For example:
curl --proxy brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>-gip-<gip_hash_value>:<zone_password> "<target_site>"
Long-Session Peers enables you to maintain a stable IP address for an extended period, ensuring seamless and consistent scraping operations. Unlike regular Residential IPs, where the IP can rotate at any moment if the peer unexpectedly disconnects, Long-Session Peers provide continuous sessions.
Enabling Long-Session Peers
Simply, go to an existing Residential zone or open a new one and toggle on the ‘Long-session peers’ feature. Now your future requests will only be routed through known long-lasting peers.
Note: This feature does add an extra cost for the zone when enabled
Where are These Peers From?
Our Residential peers’ pool consists of real users around the world who opt-in to use our product. As part of the opt-in, we utilize the IPs of these real users during their “down” periods as part of our ethical residential network. By enabling Long-Session Peers, you ensure that you will be routed through peers who are known to stay active for extended periods of time, and can maintain a single IP address for a much longer period of time in comparison to regular Residential peers.
Benefits of Long-Session Peers
Consistent scraping operations: This stability minimizes disruptions caused by IP changes and maximizes the efficiency of your scraping tasks. You can rely on a consistent IP address for an extended period, allowing for long-duration scraping operations. This feature is particularly useful for projects that require continuous data extraction or monitoring.
When outside of China
Targeting Chinese Residential IP peers is enough:
curl --proxy brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>-country-cn:<zone_password> "<target_site>"
When inside ChinaIn addition to Targeting Chinese Residentials IP peers, targeting our Chinese super-proxy is also required.
- When using API commands, the proxy DNS server isservercountry-cn.brd.superproxy.io
curl --proxy servercountry-cn.brd.superproxy.io:33335 --proxy-user brd-customer-<customer_id>-zone-<zone_name>-country-cn:<zone_password> "<target_site>"
- When using the Proxy Manager:
- Select relevant Port settings by simply clicking on the port
- Select Targeting and set China as the country
- Select IP control: set Super Proxy location to “China”.
- Select relevant Port settings by simply clicking on the port
- You can choose to use a specific carrier from this list:
a1, aircel, airtel, att, celcom, chinamobile, claro, comcast, cox, digi,
dt, docomo, dtac, etisalat, idea, kyivstar, meo, megafon, mtn, mtnza, mts,
optus, orange, qwest, reliance_jio, robi, sprint, telefonica, telstra,
tmobile, tigo, tim, verizon, vimpelcom, vodacomza, vodafone, vivo, zain,
vivabo, telenormyanmar, kcelljsc, swisscom, singtel, asiacell, windit,
cellc, ooredoo, drei, umobile, cableone, proximus,tele2, mobitel, o2,
bouygues, free, sfr, digicel
- For Example
Geolocation databases (GeoDB) are used by internet websites to query information about the IP address used by the users. Bright Data monitors and maintains correct records of the 4 main GeoDBs used today: Maxmind, ip2location, db-ip and Google.
There are many other smaller GeoDBs, most of which are using outdated records or flawed testing methods, and so the information they present is not accurate or is presented to lure their viewers to buy VPN or proxy products from them. Therefore, we highly recommend using the GeoDBs mentioned above when testing your IPs.
In order to see our information about the proxy IP that you are using, browse one of the following:
For single-step scraping:
SERP API is the ideal product for targeting SERPs as it has a guaranteed success rate (pay only for success) with active unlocking, automatically chooses the best proxies, customizes headers, fingerprinting, solves CAPTCHAs, and more.
For multi-step scraping (playwright/puppeteer/selenium):
Scraping Browser is the ideal product as it is our fully cloud-hosted browser designed to help you easily focus on your multi-step data collection while we take care of the full proxy and unblocking infrastructure for you, including CAPTCHA solving.
Residential Proxy - No, SERP API is the ideal product for targeting SERPs as it has a guaranteed success rate (pay only for success) with active unlocking, automatically chooses the best proxies, customizes headers, fingerprinting, solves CAPTCHAs, and more. Targeting Google SERPs from the Residential network will result in Super-proxy bypass, which will casue the request to be sent from our servers instead of the peer.
Datacenter & ISP Proxies - No. When attempting to specifically target Google through either of these proxy networks, your request will be denied and you will receive the following error message in the response headers:
HTTP/1.1 403 Search engine host is not allowed
X-Luminati-Error: Forbidden: This target URL isn't supported on proxy networks, use the SERP API product for targeting this URL. You may contact your account manager or open a support ticket for assistance
When targeting search engines through the Residential or Mobile networks, the request will not go through the Residential or Mobile peer but instead will be sent directly through one of our super proxies. The reason for this behavior is to support the integration of the Residential and Mobile networks with a browser, which might need to load search engine resource endpoints from the target website.
In case you target a search engine domain using Residential or Mobile networks, the request will be passed directly through the super proxy, and the following response header will serve as an indication:
x-luminati-ip: superproxy bypass
Was this page helpful?