Over 60 million real residential IPs from genuine users across 190+ countries.
Over 60 million real residential IPs from genuine users across 190+ countries.
PROXY SOLUTIONS
Over 60 million real residential IPs from genuine users across 190+ countries.
Reliable mobile data extraction, powered by real 4G/5G mobile IPs.
Guaranteed bandwidth — for reliable, large-scale data transfer.
For time-sensitive tasks, utilize residential IPs with unlimited bandwidth.
Fast and cost-efficient IPs optimized for large-scale scraping.
A powerful web data infrastructure built to power AI models, applications, and agents.
High-speed, low-latency proxies for uninterrupted video data scraping.
Extract video and metadata at scale, seamlessly integrate with cloud platforms and OSS.
6B original videos from 700M unique channels - built for LLM and multimodal model training.
Get accurate and in real-time results sourced from Google, Bing, and more.
Execute scripts in stealth browsers with full rendering and automation
No blocks, no CAPTCHAs—unlock websites seamlessly at scale.
Get instant access to ready-to-use datasets from popular domains.
PROXY PRICING
Full details on all features, parameters, and integrations, with code samples in every major language.
LEARNING HUB
ALL LOCATIONS Proxy Locations
TOOLS
RESELLER
Get up to 50%
Contact sales:partner@thordata.com
Proxies $/GB
Over 60 million real residential IPs from genuine users across 190+ countries.
Reliable mobile data extraction, powered by real 4G/5G mobile IPs.
For time-sensitive tasks, utilize residential IPs with unlimited bandwidth.
Fast and cost-efficient IPs optimized for large-scale scraping.
Guaranteed bandwidth — for reliable, large-scale data transfer.
Scrapers $/GB
Fetch real-time data from 100+ websites,No development or maintenance required.
Get real-time results from search engines. Only pay for successful responses.
Execute scripts in stealth browsers with full rendering and automation.
Bid farewell to CAPTCHAs and anti-scraping, scrape public sites effortlessly.
Dataset Marketplace Pre-collected data from 100+ domains.
Data for AI $/GB
A powerful web data infrastructure built to power AI models, applications, and agents.
High-speed, low-latency proxies for uninterrupted video data scraping.
Extract video and metadata at scale, seamlessly integrate with cloud platforms and OSS.
6B original videos from 700M unique channels - built for LLM and multimodal model training.
Pricing $0/GB
Starts from
Starts from
Starts from
Starts from
Starts from
Starts from
Starts from
Starts from
Docs $/GB
Full details on all features, parameters, and integrations, with code samples in every major language.
Resource $/GB
EN
代理 $/GB
数据采集 $/GB
AI数据 $/GB
定价 $0/GB
产品文档
资源 $/GB
简体中文$/GB
-G and -d flags for clean query parameter handling instead of manual string concatenation--connect-timeout, --retry, and proper proxy authenticationcURL (Client for URLs) is the Swiss Army knife of data engineering. While most developers know how to run a basic curl google.com, relying on default commands in a production scraping environment is a recipe for getting blocked.
Modern websites employ sophisticated defenses—like TLS fingerprinting (JA3) and behavior analysis—that can instantly detect standard cURL requests. In this advanced guide, we move beyond the basics. We will cover how to structure production-ready GET requests, how to debug connection drops, and most importantly, how to integrate Residential Proxies to stay anonymous.
All commands in this guide were tested against httpbin.org and real-world endpoints using cURL 8.4.0 on Ubuntu 22.04 LTS. Proxy rotation tests were conducted using Thordata’s residential proxy network with 100+ sequential requests to verify IP diversity.
A GET request is the standard HTTP method for retrieving data without modifying server-side resources. However, to a server’s anti-bot system, a naked cURL request looks suspicious because it lacks the “metadata” that a real browser sends.
Here is the simplest command possible (which typically gets blocked by protected sites):
curl http://httpbin.org/get
User-Agent: curl/8.4.0. This is an immediate red flag. Over 85% of protected sites block this. Always spoof this to look like a Chrome or Firefox browser using the -A or -H flag.
Don’t concatenate strings manually (e.g., ?q=item). Use -G and -d to let cURL handle URL encoding automatically.
curl -G -d "search=iphone 15" -d "sort=price_asc" http://httpbin.org/get
Scraping targets often redirect. Use -L to follow them, but set a limit to avoid loops.
curl -L --max-redirs 5 http://httpbin.org/redirect-to?url=http://httpbin.org/get
Use -v to see headers, or --trace-ascii for raw byte data.
curl -v http://example.com
curl --trace-ascii debug_dump.txt http://example.com
Standard cURL has a unique TLS handshake signature (JA3 fingerprint) that differs from browsers. Advanced systems like Cloudflare detect this in milliseconds.
When testing standard cURL (v8.4.0) against Cloudflare-protected sites, requests were blocked within 1-3 attempts even with clean residential IPs. The blocking occurred before rate limiting, indicating fingerprint-based detection. For these cases, use the Thordata Web Scraping API which impersonates browser TLS signatures.
This script demonstrates how to rotate IPs using Thordata’s gateway.
#!/bin/bash
# Configuration
PROXY="http://$THORDATA_SCRAPER_TOKEN:@gate.thordata.com:22225"
TARGET="http://httpbin.org/ip"
echo "🔄 Starting Proxy Rotation Test..."
for i in {1..3}
do
echo "Request #$i..."
# -x: Specify proxy server
curl -x "$PROXY" \
--connect-timeout 5 \
--retry 2 \
-A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) Chrome/120.0.0.0" \
"$TARGET"
echo -e "\n----------------"
done
| Tool | Pros | Cons | Best For |
|---|---|---|---|
| cURL (Bash) | Extremely Fast, minimal resource usage. | Detected by TLS fingerprinting, no JS. | API testing, static pages. |
| Selenium | Full JavaScript, mimics user. | Very Slow, high CPU usage. | Complex SPAs. |
| Scraping API | Bypasses Blocks, auto-scaling. | Per-request cost. | High-volume enterprise scraping. |
Mastering cURL is essential for quick diagnostics and API testing. However, for production scraping against protected targets, relying solely on cURL flags is often insufficient. Consider integrating specialized tooling that handles headers, fingerprint rotation, and proxy management automatically.
Frequently asked questions
How do I fix “curl: (56) Proxy CONNECT aborted”?
This error typically indicates the proxy server rejected the connection. Common causes include: invalid or expired authentication token, exceeding concurrent connection limits, or the proxy being temporarily unavailable. Check your Thordata dashboard for status.
Can cURL execute JavaScript?
No. cURL only retrieves raw HTML. If content is generated by React or Vue.js, cURL will receive an empty page. Use a headless browser or Thordata’s Universal Scraper with js_render=true.
What is the difference between -H and -A flags?
The -A flag is a shortcut specifically for setting the User-Agent. The -H flag is generic for any header (e.g., -H "Authorization: Bearer..."). Both can set User-Agent, but -A is shorter.
About the author
Kael is a Senior Technical Copywriter at Thordata. He works closely with data engineers to document best practices for bypassing anti-bot protections. He specializes in explaining complex infrastructure concepts like residential proxies and TLS fingerprinting to developer audiences.
The thordata Blog offers all its content in its original form and solely for informational intent. We do not offer any guarantees regarding the information found on the thordata Blog or any external sites that it may direct you to. It is essential that you seek legal counsel and thoroughly examine the specific terms of service of any website before engaging in any scraping endeavors, or obtain a scraping permit if required.
Looking for
Top-Tier Residential Proxies?
您在寻找顶级高质量的住宅代理吗?
What is a Headless Browser? Top 5 Popular Tools
A headless browser is a browse ...
Yulia Taylor
2026-02-07
Best Anti-Detection Browser
Xyla Huxley Last updated on 2025-01-22 10 min read […]
Unknown
2026-02-06
What is a UDP proxy?
Xyla Huxley Last updated on 2025-01-22 10 min read […]
Unknown
2026-02-06
What is Geographic Pricing?
Xyla Huxley Last updated on 2025-01-22 10 min read […]
Unknown
2026-02-05
How to Use Proxies in Python: A Practical Guide
Xyla Huxley Last updated on 2025-01-28 10 min read […]
Unknown
2026-02-05
What Is an Open Proxy? Risks of Free Open Proxies
Xyla Huxley Last updated on 2025-01-22 10 min read […]
Unknown
2026-02-04
What Is a PIP Proxy? How It Works, Types, and Configuration ?
Xyla Huxley Last updated on 2025-01-22 10 min read […]
Unknown
2026-02-04
TCP and UDP: What’s Different and How to Choose
Xyla Huxley Last updated on 2026-02-03 10 min read […]
Unknown
2026-02-04
Free Proxy Servers Available in 2026
Jenny Avery Last updated on 2026-02-06 9 min read […]
Unknown
2026-02-01