Skip to content
Tech News
← Back to articles

Residential proxies evaded IP reputation checks in 78% of 4B sessions

read original get Residential Proxy Service → more articles
Why This Matters

The widespread use of residential proxies to mask malicious activity poses a significant challenge for IP reputation systems, making it harder for cybersecurity defenses to distinguish between legitimate users and attackers. This evolving tactic underscores the need for more sophisticated detection methods to protect digital infrastructure and users. As attackers frequently rotate and short-lived use residential IPs, traditional reputation-based defenses become less effective, highlighting the importance of adaptive security strategies in the tech industry.

Key Takeaways

Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

This occurs because residential proxies are too short-lived, uninvolved, or systematically rotated, preventing defense systems from cataloging them in time.

Cybersecurity intelligence platform GreyNoise determined this after examining a massive dataset of 4 billion malicious sessions targeting the edge over a three-month period.

Roughly 39% of those sessions appear to originate from home networks, most certainly part of residential proxies, but 78% of them are invisible to reputation feeds.

“The data reveals a pattern that challenges a core assumption of network defense: that you can tell attackers from legitimate users by where the traffic comes from,” explains GreyNoise.

According to the company, most residential IPs are used once or twice, and then vanish, with attackers rotating them with others, keeping the pace at a level that reputation systems will not flag them.

About 89.7% of residential IPs are active in malicious operations for under a month, with only 8.7% lasting 2 months, and 1.6% persisting for 3 months.

Those that are kept alive for longer seem to carry a specialization according to the researchers, being SSH-focused and using Linux TCP stacks.

Type of activity per source type

Source: GreyNoise

... continue reading