Proxy Guide
What Geo-Targeting Actually Means
Geo-targeting in proxy context means routing requests through exit IPs in a specified location. It does not mean the target believes you are in that location — that requires additional signals the IP alone cannot provide.
In practice
- Country-level targeting available across all major providers ✔
- City-level targeting available where pool has local depth ✔
- ASN-level targeting routes through a specific carrier or ISP ✔
- City-level fails silently if pool has no IPs in that city ✗
- IP geolocation and the target's perception of location are not the same signal ✗
Getting a geo-targeted IP and successfully appearing to be from that location are two different problems.
Overview
Geo-targeting is an instruction to the proxy gateway: route this request through an exit IP in a specified location. The gateway selects an available pool node matching that location and forwards the request. The IP's geolocation database record — which identifies it as being in that country or city — is the mechanism. That's the complete scope of what geo-targeting does on the proxy side.
Whether the target accepts the request as originating from that location depends on more than the IP's geolocation record. Browser timezone, Accept-Language header, locale settings, and behavioral patterns are separate signals that targets with geographic access control evaluate independently. An IP resolving to Germany with an English-language Accept-Language header and a UTC+0 timezone presents inconsistent location signals — the IP checks out; everything else does not.
How to think about it
Country-level targeting routes through any available pool IP with a geolocation record in the specified country. This is the broadest targeting level and the most reliably available — every major provider maintains active pool nodes in the US, UK, Germany, and most tier-1 markets. The gateway selects whichever available IP matches the country, regardless of city or carrier.
City-level targeting narrows selection to pool nodes with geolocation records in a specific metropolitan area. Pool depth at city level varies significantly — large providers may have thousands of active IPs in New York and dozens in Des Moines. When the requested city segment is exhausted, provider behavior diverges: some fall back to country-level routing, some return an error, some queue the request until an IP becomes available. That fallback behavior is the variable that determines whether city-level targeting actually delivers what the workload requires.
ASN-level targeting routes through IPs belonging to a specific autonomous system — a specific carrier or ISP. This is used when the target's content or pricing differs by carrier, or when a specific carrier's residential classification is needed. ASN-level pool availability is typically thinner than city-level, because it requires enrolled devices or allocated IPs specifically within that carrier's network.
How it works
Geo parameters are passed in the proxy connection credentials — typically appended to the username string: `user-country-us`, `user-country-de-city-berlin`, or `user-cc-US-city-New_York`. The gateway parses these parameters and queries its pool inventory for available IPs matching the specification. The format is provider-specific; most providers publish their parameter schema in API documentation.
Pool assignment at the geo level is not guaranteed to return the same IP on sequential requests unless a session identifier is also included. Without session pinning, two consecutive requests with the same geo parameter may exit through IPs in different cities within the same country, or through different carriers within the same city. For workloads where geo-consistency across a session is required — not just geo at the request level — sticky session configuration must be combined with geo targeting.
Geolocation database discrepancies create a specific failure mode: an IP the provider records as being in city A is recorded as being in city B by the specific database the target queries. The routing delivered what was requested. The target's location verification returned a mismatch. Different geolocation databases — MaxMind, IPinfo, IP2Location — maintain independent records and update on different cycles. An IP that recently changed ISP or carrier assignment may resolve inconsistently across databases during the propagation window.
Where it breaks
City-level targeting with thin pool depth produces silent failures. The gateway may fall back to a different city within the same country without surfacing this to the client. The request succeeds — a response is returned — but from an IP in the wrong city. Workloads that require strict city-level accuracy — local price scraping, location-specific content access — receive incorrect data without any error signal. The only verification is querying the exit IP's geolocation against the specific database the target uses, not against the provider's own records.
Targets with geographic access control that go beyond IP geolocation detect location inconsistencies at the signal level. A residential IP in France combined with an English-language Accept-Language header, a US keyboard locale, and no French-language browsing history in the session presents a signal set that contradicts the IP's geolocation. Platforms with strict geo-enforcement — geo-restricted content, regional pricing enforcement — evaluate these signals in combination. The IP check passes; the signal consistency check does not.
Geolocation database lag affects freshly rotated IPs. When a provider adds new IPs from a recently acquired block, those IPs may not yet appear in all geolocation databases — or may appear with incorrect location data until the database updates. The proxy delivers the IP as geo-targeted; the target's lookup returns no location or the wrong one.
In context
Country-level targeting is reliably available at all major providers and introduces no material pool availability constraint for tier-1 markets. The effective pool is the entire country segment — typically millions of IPs on large residential networks. For most geo-targeted workloads, country-level targeting is sufficient and imposes no operational overhead.
City-level targeting reduces the effective pool to the metro segment. For major cities in tier-1 markets — London, New York, Tokyo — pool depth is typically sufficient. For secondary cities, emerging markets, or specific carrier ASNs within a city, pool depth may be thin enough that high-concurrency workloads exhaust available IPs and trigger fallback or queuing. The cost of city-level targeting is not monetary — it is reduced operational reliability when the required segment is under-resourced.
Residential geo-targeting provides wider pool depth than ISP or datacenter geo-targeting at the same granularity level, because the pool is built from enrolled consumer devices distributed across actual residential addresses. Datacenter geo-targeting routes through provider-owned infrastructure located in data centers — which are not uniformly distributed across cities. A datacenter provider may have no infrastructure in a tier-3 city that a residential provider covers through enrolled devices.
Choose your path
Geo-targeting is required when the target returns different content, pricing, or access based on IP location — and the location the workload requires is not the operator's actual location. When the target uses only IP geolocation for location determination, proxy geo-targeting is sufficient. When the target evaluates additional signals, the full signal set must be consistent — not just the IP.
- Geo-restricted content by country → country-level targeting sufficient; verify with single test request
- Location-specific pricing scraping → city-level if prices vary by city; verify pool depth in target city
- Target checks Accept-Language or timezone → match full signal set, not just IP
- Geo consistency required across a session → combine geo parameter with sticky session ID
- Geolocation database mismatch causing failures → identify which database the target queries; request IPs verified against it
Related
© 2026 Softplorer