Cloakfish Features

  • 15,000-25,000 different IPs per month


    We can offer about 25,000 working different IPs every month, leaving all competition far behind!
  • Auto-replace of dead proxies


    When a proxy stops working the Cloakfish servers will automatically remove them from the proxy list of identities. If you were using such a proxy you can directly choose a new one free of charge.
  • Professional TRUE anonymity


    Cloakfish uses the power of the Tor network through an intelligent controlling client and advanced backend servers, resulting in high performance AND highest anonymity! There is NO way to trace you back, no other proxy provider can offer this without lying you into the face.
  • Military strength encryption


    Your connection is tunneled through 1-4 proxies and encrypted by military strength encryption standards. True privacy possible!
  • City level pinpointing


    A feature introduced in Version 1.04.01: City and region details about each IP. (list of available cities)
  • Automatic IP Rotation and activation


    A powerful feature that will change your IP even faster, make your connection faster and can automatically change your IP based on a Timer, button click or a simple API call.
  • Clipboard support


    Cloakfish offers clipboard export, to quickly export your configured proxies for your documentation.
  • Proxy list filtering options


    Customize the offered Proxy IP list by filtering out unwanted proxies. You can filter by latency, performance, stability and obvious proxy-hostnames.
  • Many different top level domains and countries


    Choose IPs from all over the world, appear as an internet surfer from USA, China or any other country from the large list of available IPs. (list of available countries)
  • Easy usage and installation


    Designed and developed by experts but created for the users.
  • High availability


    One or more of your proxies became unavailable? The Cloakfish servers will detect this and prompt you to choose new proxies.
  • GeoIP integration


    The proxylist contains the GeoIP country code, this makes it possible to choose a proxy by the real country.
  • Balance of performance and anonymity


    The user can select the level of anonymity and performance. Right now three levels can be chosen, future versions will include even more choices.
  • Multiple proxies at the same time


    Cloakfish supports up to 128 active proxy processes and on-the-fly IP change of online proxies.
  • Auto-rotation API


    An easy to use API to change the current auto-rotation IP by opening a TCP connection on 127.0.0.1:29999 (telnet, browser, or from your tool/script)
  • Expert support


    Benefit from the support of security experts, we help you to reach your goals and bring Cloakfish to efficient use.
online proxies

Facts

Cloakfish provides a constantly updated list of hundreds of proxy IPs at your direct control, thousands per month.
Currently Cloakfish is the only service or utility of its sort.
Cloakfish releases the latent power of anonymity networks providing you an easy to use tool for a low fee.
By tunneling your connection through more than one non-logging proxies you real identity is hidden.
proxy connection process

The power of anonymity networks


Anonymity networks were brought into disrepute because of their low performance but still thousands of servers
are up and running to serve anonymity requests.
Because of the high anonymity design of such networks their design does not allow intelligent routines to make
connections faster and decrease latency. Opening a random webpage through a usual anonymity network can actually take minutes!
Cloakfish takes the good sides: anonymity (proxy), privacy (data encryption) and availability (thousands of servers)
and removes the bad sides: high latency, undefined/random IPs, unknown bandwidth
Our powerful servers monitors and analyzes these networks and keeps an updated and sorted database.
So one advantage of Cloakfish is that we have got a preselection of good proxy routers.
The next advantage is that the user can choose his favorite proxies based on their latency, bandwidth, ip and domain.
And finally Cloakfish uses special developed logic to increase the performance way beyond the usualy possible speed.
Cloakfish is actively developed, future versions will keep increasing the performance!

Socks, not HTTP Proxy !


Cloakfish offers a SOCKS proxy instead of the more common HTTP-Proxies.
SOCKS is a well known standard and can be used for all sorts of TCP traffic (most protocols like email, ftp, ssh, www, ...)
The so called "open proxy" or "elite proxy" mostly uses a simple proxy protocol that only supports browsers (http) but nothing else.
Future versions of Cloakfish will allow to directly start any application, for now you need to configure the application to use the socks proxy.
See the Howto section to learn how to configure your application for SOCKS.

The evil of open proxies


Cloakfish may cost a fee but it is a secure and safe way to be anonymous for various purposes. Do NOT use or buy "open proxies" or "Elite proxies"!
So called "Open Proxies" can be found by scanning for them or by buying prescanned lists from various sources.
The major problem of an open proxy is that it is public accessible. No one offers such a service without anything in return.
There are three different sorts of open proxies:
  • Bad configuration
    These are proxies set up by companies or organisations for a limited audience or to reach the intranet from the outside and their configuration includes an error that allows access without password.
    Using these proxies cost those companies money and bandwidth, it can result in a legal battle for compensation.
    Worse: Such proxies might allow access into a private intranet, by using the proxy you are at real risk that the owner sues you for the security breach.
    Sadly many state laws (as most states within the EU and US) define that using an unprotected router/proxy without permission is a crime!
  • Evil owners
    Setting up an open proxy is frequently used to receive passwords, emails and other information from the users.
    Worse: Such evil proxies sometimes modify the traffic to sneak trojans or other malware or advertisements into your browser or application.
    Evil proxies run on hacked servers causing massive damage for the real owners including the risk of legal problems for you.
  • Honeypots
    Honeypots are related to evil proxies but their owners often aim for different goals.
    A honeypot proxy is an open proxy that is monitoring the users. Frequently used to catch the latest child-porn URLs or spammers.
    Depending on your activities you might not be at risk but most people do not like the idea to be monitored like that.
It is impossible to tell what sort of proxy an IP is.
One sign of a "bad configuration" is when the (http)proxy is not anonymous (if it sends the client IP as proxy variable).
A sign for an "evil owner" is when the proxy runs on a domain that obviously is no proxy. As example NS. MAILBOX. and similar.
There is no "free" open proxy you can use without a high chance of getting monitored and putting yourself at risk.
The EU Cybercrime Convention from 2001, as well as the U.S. Computer Fraud & Abuse Act both define that entering a proxy or computer without permission is a crime!

Availability


Cloakfish guarantees a very high availability, there are always hundreds of proxies available for your use!
The only limiting factor is a downtime of the Cloakfish servernetwork but our servers are located in a professional datacenter.
If proxies become unavailable our servers will detect the change (or get notified by the tool from the user-side) and within a few minutes
your license will allow you to select new proxies!

Cloakfish anonymity modes


Cloakfish currently offers two different anonymity modes, the next major release will support 2 additional modes.
  • Proxycurrently unsupported
    This is a high performance option, your connection is still encrypted but you are not tunneled through several proxies.
    The proxy does not know that you are the origin of the connection request.
  • Anonymous
    This is the default setting. Your proxy connection is tunneled through two proxies, none of both know that you are the origin of the connection!
    The first proxy is only used to masquerade your identity from the last proxy. The first proxy is chosen randomly from thousands available proxies.
  • highly anonymous
    This will add one more proxy into your connection. Your connection goes through three proxies.
    The first two proxies are randomly chosen from thousands of proxies. This setup results in lower performance than the default one.
  • Paranoid
    Your connection is forwarded through four different proxies,the three first are chosen randomly.
    This setup usualy results in low performance.

DNS anonymity


Any connection on the Internet is targeted at an IP address. Even if a hostname or domain is entered the Internet protocol (IP-protocol) is based on the address.
The Domain Name System is used to translate names into ip addresses. Even if a proxy is activated the OS (Windows) still uses the DNS to find ip addresses.
This translation is based on nameservers, usualy automatically configured by the router or modem and owned by the Internet provider. Example: "cloakfish.com" is a domain
There are several possible downsides:
  • The nameservers can log translation requests, resulting in a list of hosts and urls you have visited.
    The good part: nameservers can only log hosts and domains, not the path of the website or the data that was sent or received.
  • Nameservers are frequently used to censor specific websites, in this case a nameserver does not respond to some domain requests
  • A hijacked nameserver is used to sneak trojans, advertisements into a connection or to intercept websites (online banking or similar)
There are two possible solutions to this problem:
  • Private DNS servers owned by a source of your trust, but these will still reveal the visited domains and hosts to the Internet provider.
    This can be conquered by connecting to these nameservers through encrypted tunnels (SSH port-forward as example) to make intercepting DNS requests harder.
  • Tunneling DNS requests through a remote proxy.
    Firefox as example supports remote DNS resolution through SOCKS-V proxies.