TCP/IP Device Filter
Evomi Residential Proxies offer a TCP/IP device filtering feature that allows you to select IPs based on their TCP fingerprint. This helps simulate traffic from specific device types, which is particularly useful for testing platform-specific behavior or avoiding detection.
How TCP Fingerprinting Works
The TCP fingerprint is determined by analyzing characteristics of the device’s TCP/IP stack, including:
- TCP window size
- Initial packet sequence numbers
- TCP options and their order
- Time-to-Live (TTL) values
These characteristics vary between operating systems and device types. For example, Windows devices have different default TCP configurations than Unix-based systems or Apple devices.
Using the Device Filter
Append _device-<type>
to your proxy password to filter IPs by device type. Valid options:
_device-windows
: Filters IPs with Windows TCP fingerprints_device-unix
: Filters IPs from Unix-based systems (Linux/Android)_device-apple
: Filters IPs from Apple devices (iOS/macOS)
Examples
Below are implementation examples using CURL, Python, and JavaScript:
⚠️
Note: The device parameter is an extra feature. Using it will incur additional bandwidth consumption. You can see the exact extra usage history in the dashboard and in the Generator.
ℹ️
Combine device filtering with other parameters like
fraudscore
for precise targeting. Example:testpassword_country-US_device-windows_fraudscore-0
ℹ️
For quick configuration, use our Proxy Generator to generate authenticated proxy URLs with the fraudscore parameter.