ANTIDETECT BROWSER API
Cloud Camoufox with unique fingerprints and auto-allocated mobile proxy per session.
~$0.005 /min
6 countries
Camoufox engine
Auto proxy per session
LIVE
WHAT IT IS
A cloud-hosted antidetect browser that creates isolated browser sessions with unique fingerprints and auto-allocated mobile proxies. Each session gets its own canvas fingerprint, WebGL hash, font list, screen resolution, timezone, and language — making it impossible to link sessions together.
Built on Camoufox (hardened Firefox fork). Every session automatically includes a mobile proxy from one of 6 countries (US, GB, DE, FR, ES, PL), so your browser traffic routes through a real 4G/5G IP.
Control the browser via HTTP API commands: navigate, click, type, screenshot, extract content. Perfect for web scraping, form automation, testing, and any task that needs a real browser with a clean fingerprint.
| Feature | Details |
| Engine | Camoufox (hardened Firefox fork) |
| Fingerprint | Unique per session — canvas, WebGL, fonts, screen, timezone, language |
| Proxy | Auto-allocated 4G mobile proxy (included in price) |
| Countries | US, GB, DE, FR, ES, PL |
| Control | HTTP API — navigate, click, type, screenshot, extract content |
| Identity Bundles | Save and restore complete browser identity: cookies, localStorage, fingerprint, proxy binding |
| Proxy Pinning | Same device IMEI allocated per profile — consistent IP range across sessions |
| Profile Storage | Encrypted at rest with HMAC integrity. Profiles persist until deleted. Auto-cleanup after 30 days of inactivity. |
| Isolation | Docker container per session — full OS-level isolation |
| Concurrency | Multiple sessions in parallel, each with unique identity |
PRICING
| Component | Cost | Notes |
| Browser session | ~$0.005/min | Includes compute + fingerprint generation |
| Mobile proxy | Included | Auto-allocated from 6 countries (no extra charge) |
| Profile storage | Included | Save and restore browser profiles |
A typical 30-second scraping session costs ~$0.0025. At 10,000 sessions/day, that's ~$25/day.
ENDPOINT
| Method | URL | Description |
| POST | https://browser.proxies.sx/v1/sessions | Create session (accepts profile_id for Identity Bundle) |
| POST | https://browser.proxies.sx/v1/sessions/:id/command | Send command to browser |
| POST | https://browser.proxies.sx/v1/sessions/:id/profile | Save Identity Bundle (cookies + localStorage + fingerprint + proxy) |
| POST | https://browser.proxies.sx/v1/sessions/:id/profile/load | Load Identity Bundle into session |
| GET | https://browser.proxies.sx/v1/profiles | List saved profiles |
| DELETE | https://browser.proxies.sx/v1/profiles/:id | Delete profile |
| POST | https://browser.proxies.sx/v1/sessions/:id/extend | Extend session duration |
| GET | https://browser.proxies.sx/v1/sessions/:id/status | Session status with expiry warnings |
| DELETE | https://browser.proxies.sx/v1/sessions/:id | Close session |
HOW TO USE
Step 1: Create a Session
curl -X POST "https://browser.proxies.sx/v1/sessions" \
-H "Content-Type: application/json" \
-d '{"country": "US"}'
Returns 402 with payment instructions. Pay USDC, then retry with Payment-Signature header.
Step 2: Send Browser Commands
# Navigate to a page
curl -X POST "https://browser.proxies.sx/v1/sessions/$SESSION_ID/command" \
-H "X-Session-Token: $TOKEN" \
-H "Content-Type: application/json" \
-d '{"action": "navigate", "url": "https://www.google.com"}'
# Type into a field (human-like speed)
curl -X POST "https://browser.proxies.sx/v1/sessions/$SESSION_ID/command" \
-H "X-Session-Token: $TOKEN" \
-H "Content-Type: application/json" \
-d '{"action": "type_slow", "selector": "input[name=q]", "text": "mobile proxies"}'
# Click a button
curl -X POST "https://browser.proxies.sx/v1/sessions/$SESSION_ID/command" \
-H "X-Session-Token: $TOKEN" \
-H "Content-Type: application/json" \
-d '{"action": "click", "selector": "button[type=submit]"}'
# Get page content
curl -X POST "https://browser.proxies.sx/v1/sessions/$SESSION_ID/command" \
-H "X-Session-Token: $TOKEN" \
-H "Content-Type: application/json" \
-d '{"action": "content"}'
# Take screenshot
curl -X POST "https://browser.proxies.sx/v1/sessions/$SESSION_ID/command" \
-H "X-Session-Token: $TOKEN" \
-H "Content-Type: application/json" \
-d '{"action": "screenshot"}'
Available Commands
| Action | Description | Parameters |
navigate | Go to URL | url |
click | Click element | selector |
type | Type text instantly | selector, text |
type_slow | Type with human-like delays | selector, text |
select | Select dropdown option | selector, value |
wait | Wait for element | selector, timeout |
content | Get page HTML | — |
screenshot | Capture page image | — |
Step 3: Close Session
curl -X DELETE "https://browser.proxies.sx/v1/sessions/$SESSION_ID" \
-H "X-Session-Token: $TOKEN"
IDENTITY BUNDLES — Long-Term Account Persistence
Identity Bundles let you save and restore a complete browser identity across sessions. One account = one fixed bundle (cookies + fingerprint + proxy device). This is the key to maintaining logged-in accounts for weeks or months without triggering security checkpoints.
What Gets Saved
| Data | Purpose |
| Cookies | Auth tokens, session IDs — keeps you logged in |
| localStorage | App state, preferences, tokens many sites store here |
| Fingerprint | OS, screen, locale, timezone — same "device" every time |
| Proxy Binding | Country + device IMEI — same IP range, same carrier |
Workflow: Manage an Account for Months
# Day 1: Create session, log into Twitter, save profile
curl -X POST browser.proxies.sx/v1/sessions \
-H "Payment-Signature: $TX" -d '{"country":"US"}'
# ... login, do actions ...
curl -X POST browser.proxies.sx/v1/sessions/$ID/profile \
-H "Authorization: Bearer $TOKEN" \
-d '{"name":"twitter-main"}'
# → Returns prof_abc123
# Day 30: Create session WITH profile (auto-restores everything)
curl -X POST browser.proxies.sx/v1/sessions \
-H "Payment-Signature: $TX" \
-d '{"profile_id":"prof_abc123"}'
# → Same fingerprint, same proxy device, cookies injected
# → Navigate to twitter.com → still logged in
# Save updated profile before closing
curl -X POST browser.proxies.sx/v1/sessions/$ID/profile \
-H "Authorization: Bearer $TOKEN" \
-d '{"name":"twitter-main"}'
Anti-Lock Playbook
| Rule | Why |
| One account = one profile_id | Never mix identities. Each account gets its own bundle. |
| Keep country consistent | Don't login from US today, France tomorrow. Triggers challenges. |
| Same device IMEI (automatic) | Proxy Pinning tries to allocate the same physical modem each time. |
| 2-5 sessions/week | Consistent cadence. Not too much, not too little. |
| Vary session length | 10-40 minutes. Don't be perfectly uniform. |
| Enable 2FA on accounts | Platforms trust 2FA-enabled accounts more. |
| Save profile before closing | Cookies refresh. Always save the latest state. |
WHY ANTIDETECT
Modern websites fingerprint your browser to detect automation. They check:
| Fingerprint Vector | Regular Browser | Camoufox Session |
| Canvas hash | Same across sessions | Unique per session |
| WebGL renderer | Reveals real GPU | Spoofed per session |
| Font list | Reveals OS | Randomized subset |
| Screen resolution | Same always | Varied per session |
| Timezone | Your real timezone | Matches proxy country |
| Language | Your real language | Matches proxy country |
| IP address | Your real IP | Real 4G mobile IP |
| Navigator properties | Reveals automation | Clean, no automation flags |
With Camoufox + mobile proxy, each session looks like a unique real user on a real mobile network. Sites like Google, Instagram, LinkedIn, and Amazon see a legitimate visitor — not a bot.
USE CASES
| Use Case | Why Browser + Proxy | Example |
| Web scraping | JS-heavy sites need real browser rendering | Scrape SPAs, React apps, dynamic content |
| Account operations | Unique fingerprint per account | Multi-account management without linking |
| Form automation | Human-like typing + clean fingerprint | Registrations, submissions, signups |
| Ad verification | See ads as real mobile users see them | Verify ad placements, detect fraud |
| Testing | Test from different geos with real IPs | QA, localization testing, geo-specific content |
| Screenshot services | Capture pages as they appear to real users | Visual monitoring, compliance checks |
MCP SERVER
For AI agents, a dedicated MCP server provides 9 browser control tools:
npx @proxies-sx/browser-mcp
| Tool | Description |
create_session | Create browser session with proxy |
navigate | Go to URL |
click | Click element |
type_text | Type into field |
get_content | Get page HTML/text |
screenshot | Capture page |
wait_for | Wait for element |
close_session | End session |
list_sessions | List active sessions |
npm package
PAYMENT WALLETS
| Network | Settlement | Recipient Wallet | USDC Contract |
| Base | ~2 seconds | 0xF8cD900794245fc36CBE65be9afc23CDF5103042 | 0x833589fcd6edb6e08f4c7c32d4f71b54bda02913 |
| Solana | ~400ms | 6eUdVwsPArTxwVqEARYGCh4S2qwW2zCs7jSEDRpxydnv | EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v |
LINKS