How Does Endpoint Filtering Work? Which Ports Do I Need to Use?

Once you have a dashboard account, log in and choose the Endpoints tab on the left side menu. Select the from ‘Curl test example’ and ‘Filter endpoints’ tabs.

  • ‘Curl test example’

    Once you select the parameters, you will get the shell example – endpoint and port example information that fits your needs.

  • endpoint filtering
    1. Authentication option:

    • WHITELISTED IP – If you choose this authorization method, you won’t need to use your credentials – whitelisted IP addresses do not require the user:pass authorization. Whitelist several IPs to create a list of trusted IPs. You can whitelist your IP in the Whitelisted IPs tab on the left.
    • USER:PASS – If you choose this authorization method you can insert your credentials in the username and password fields in the ”Ports” section below to get the full shell example. Authenticate with your dashboard login or subuser credentials. Use subusers to track traffic usage of different tasks or locations.

    2. Choose parameters:

    Proxy location:

    1. RANDOM – use a random IP from the whole pool.
    2. SPECIFIC LOCATION – use IPs only from a specific location. You can target IP addresses at the country or city level.

    Session type:

    1. ROTATING – assigns a new IP for each request.
    2. STICKY – assigns an IP for a longer period (default session time – 10 min). The session will be terminated:
      – after 60s of inactivity;
      – if the IP address does not respond.
      If your session is terminated, you will receive a new sticky IP with the same rules applied.

    3. Enter Your target

  • ‘Filter endpoints’

    Filter endpoints and ports that fits your needs.

  • endpoint filtering


    • ENDPOINT – this is the address you must use to connect to the selected proxy pool.
    • PORT – add the port number to your endpoint to connect to the proxy server.
    • PORT RANGE – use any port(s) in this range to connect to the endpoint.