Residential Proxies and the Fine Line Between Use and Abuse
This talk explores the dual-use nature of residential proxy networks, detailing how they are leveraged for both legitimate business operations and malicious activities. It examines the sourcing of residential IP addresses through opt-in bandwidth-sharing applications and SDK-based monetization, as well as illicit methods like botnets and malware. The presentation highlights the challenges these proxies pose for defenders, as they enable attackers to bypass traditional IP-based security controls and obfuscate malicious traffic.
Why Your IP-Based Rate Limiting Is Failing Against Residential Proxy Networks
TLDR: Residential proxy networks allow attackers to rotate through thousands of legitimate home IP addresses, effectively bypassing traditional IP-based rate limiting and reputation filters. These networks are often sourced through deceptive SDKs embedded in free mobile apps, turning unsuspecting users into unwitting exit nodes for malicious traffic. Defenders must shift from simple IP-based blocking to behavioral analysis and device fingerprinting to mitigate this threat.
Security professionals have spent decades relying on IP reputation and rate limiting as the first line of defense against automated attacks. We block known data center ranges, we throttle requests from suspicious subnets, and we assume that a high volume of traffic from a single source is the hallmark of a bot. That model is dead. The rise of residential proxy networks has turned every home internet connection into a potential weapon, and the industry is struggling to keep up.
The Mechanics of Residential Proxy Abuse
Residential proxies route traffic through IP addresses assigned by ISPs to real residential households. Unlike data center proxies, which are easily identified and blocked by OWASP-recommended security controls, residential IPs carry the inherent trust of a legitimate user. When an attacker uses a service like Soax or Bright Data, they are not just masking their origin; they are masquerading as a normal user browsing from a home network.
The technical advantage here is significant. An attacker performing credential stuffing or ad fraud can rotate their IP address with every single request. If a target site implements a block after five failed login attempts, the attacker simply switches to the next residential IP in their pool. Because these IPs are associated with residential ISPs, they rarely trigger the automated blacklists that catch traffic from AWS, Azure, or GCP.
How the Networks Are Sourced
The most alarming aspect of these networks is how they are built. Many reputable-looking proxy providers obtain their massive IP pools through SDK-based monetization. Developers of free mobile applications integrate these SDKs, which then run in the background of a user's device. When the device is idle and connected to Wi-Fi, it becomes an exit node for the proxy network.
The user often provides "consent" via a buried clause in the app's terms of service, but they rarely understand the implications. They are essentially renting out their home bandwidth to whoever pays the proxy provider. This creates a massive, distributed infrastructure that is nearly impossible to map or dismantle. On the darker side of the spectrum, malware and botnets like the 911 S5 Proxy botnet achieve the same result by infecting devices without any user consent at all, turning them into nodes for criminal traffic.
Real-World Impact for Pentesters
During a penetration test, you will encounter these networks when you attempt to test for brute-force vulnerabilities or API rate limiting. If you find that your automated tools are being blocked, it is likely because your traffic is originating from a known data center range. By switching to a residential proxy service, you can often bypass these controls entirely.
However, the real danger is when you are on the defensive side of an engagement. If you are auditing a client's security, you must ask how they handle traffic that appears to come from a legitimate user but exhibits bot-like behavior. If their only defense is an IP-based WAF rule, they are vulnerable.
Consider an attack flow where an adversary uses T1090 (Proxy) to distribute their requests across thousands of residential IPs. A typical request might look like this:
# Example of rotating through a proxy service via curl
curl -x http://user:password@residential-proxy-provider.com:8080 http://target-site.com/login
Because the IP changes with every request, the server-side logs will show thousands of unique, legitimate-looking residential IPs. Traditional log analysis will fail to correlate these requests as a single attack.
Moving Beyond IP-Based Defenses
Defenders must stop treating the IP address as a reliable identifier. It is a piece of metadata, nothing more. To effectively counter residential proxy abuse, you need to implement multi-layered detection that focuses on the client itself.
- Device Fingerprinting: Use advanced browser fingerprinting to identify the client device, regardless of the IP address. If the same fingerprint appears across hundreds of different IPs, you are likely dealing with a bot.
- Behavioral Analysis: Look for patterns that deviate from human behavior. Even if the IP is residential, a bot will often navigate a site with a speed and precision that a human cannot match.
- Proxy Intelligence: Integrate services that can identify if an IP belongs to a known residential proxy network. While this is a cat-and-mouse game, it provides an extra layer of visibility that simple IP blocking lacks.
Residential proxies are not inherently malicious, but they have fundamentally changed the economics of cyberattacks. They have lowered the barrier to entry for sophisticated automation and made it significantly harder for defenders to distinguish between a customer and a threat. As you continue your work, assume that the IP address you are looking at is a lie. Focus on the behavior, the device, and the intent behind the request. That is where the real security work happens.
Vulnerability Classes
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Inshittification: The Economics of Digital Platforms




