Open proxy

Proxy server accessible to any Internet user
title: "Open proxy" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["internet-security", "proxy-servers"] description: "Proxy server accessible to any Internet user" topic_path: "general/internet-security" source: "https://en.wikipedia.org/wiki/Open_proxy" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0
::summary Proxy server accessible to any Internet user ::
::figure[src="https://upload.wikimedia.org/wikipedia/commons/2/27/Open_proxy_h2g2bob.svg" caption="An open proxy forwarding requests from and to anywhere on the Internet" alt="Diagram of proxy server connected to the Internet"] ::
An open proxy is a type of proxy server that is accessible by any Internet user.
Generally, a proxy server only allows users within a network group (i.e., a closed proxy) to store and forward Internet services such as DNS or web pages to reduce and control the bandwidth used by the group. With an open proxy, however, any user on the Internet can use this forwarding service.
Advantages
An anonymous open proxy is useful to those looking for online anonymity and privacy, as it can help users hide their IP address from web servers since the server requests appear to originate from the proxy server. It makes it harder to reveal their identity and thereby helps preserve their perceived security while browsing the web or using other internet services. Real anonymity and extensive internet security might not be achieved by this measure alone as website operators can use client-side scripts to determine the browser's real IP address and the open proxy may be keeping logs of all connections. Open proxies also do not stop tracking cookies and fingerprinters from identifying users.
Most public VPNs work through open proxies.
Disadvantages
It is possible for a computer to run as an open proxy server without the computer's owner knowing it. This can result from misconfiguration of proxy software running on the computer, or from infection with malware (viruses, trojans or worms) designed for this purpose. If it is caused by malware, the infected computer is known as a zombie computer.
Testing for access from an open proxy
Because open proxies are often implicated in abuse, a number of methods have been developed to detect them and to refuse service to them. IRC networks with strict usage policies automatically test client systems for known types of open proxies. Likewise, a mail server may be configured to automatically test mail senders for open proxies, using software such as proxycheck.
Groups of IRC and electronic mail operators run DNSBLs publishing lists of the IP addresses of known open proxies, such as AHBL, CBL, NJABL (till 2013), and SORBS (in operation since 2002). The AHBL discontinued public access in 2015.
References
es:Proxy#Proxy Abierto pt:Proxy#Proxy abreto
References
- (27 September 2021). "VPN Myths Debunked: What VPNs Can and Cannot Do".
- "Accidental spamming, zombies and spoofing". [[Australian Communications and Media Authority]].
- (2011-08-21). "Blitzed Open Proxy Monitor". Blitzed.org.
- "proxycheck: Open Proxy checker". Corpit.ru.
- "Official Abusive Hosts Blocking List Website".
::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::