Dslroot, Proxies, and the Threat of 'legal Botnets'
Key topics
The dark underbelly of residential proxy networks is being exposed, with commenters shedding light on the shady practices behind services like Hola VPN and Bright Data, which pay developers to embed their proxy SDKs into mobile apps, effectively turning users' devices into proxy nodes. Some commenters pointed out that these services have been operating for years, with Hola VPN being a prime example of a "money printer" that presents itself as free while secretly using users' residential IPs for proxying. The discussion highlights the blurred lines between legitimate and malicious activities, with some commenters drawing parallels to "legal botnets." As one commenter noted, the chances of having a proxy node on your device increase with each free app you install, making this a timely and relevant discussion.
Snapshot generated from the HN discussion
Discussion Activity
Moderate engagementFirst comment
2h
Peak period
10
0-3h
Avg / period
3.5
Based on 28 loaded comments
Key moments
- 01Story posted
Aug 26, 2025 at 10:08 AM EDT
4 months ago
Step 01 - 02First comment
Aug 26, 2025 at 11:41 AM EDT
2h after posting
Step 02 - 03Peak activity
10 comments in 0-3h
Hottest window of the conversation
Step 03 - 04Latest activity
Aug 28, 2025 at 11:28 AM EDT
4 months ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.
Some time ago I started to track this as a side project (I work in bot detection and was always surprised by how many residential proxies show up in attacks). It started just out of curiosity. Now I collect proxy IPs, which provider they belong to, and how often they are seen. I also publish stats here: https://deviceandbrowserinfo.com/proxy-api/stats/proxy-db-30...
For example, in the last 30 days I saw more than 120K IPs from Comcast and nearly 100K from AT&T.
I also maintain an open IP (ranges) blocklist, mostly effective against data center and ISP proxies. Residential IPs are harder since they are often shared with legit users: https://github.com/antoinevastel/avastel-bot-ips-lists
Even if you can’t block all of them, tracking volume and reuse gives useful signal.
but with that being said, if you are doing something shady/grey area to get ahead you best give everyone a cut of the pie, especially your blood brother
Why is that surprising? It seems like it'd be one of the major vectors.
The existence of residential proxies like these is a massive pain if you run free trials or giveaways or host user-generated content (aka a spam/scam opportunity). DSLRoot is only one service of many (see last year's takedown of 911 S5 https://www.scworld.com/news/fbi-takes-down-911-s5-botnet-li... ) and there's plenty of demand for it.
Imagine getting hit by thousands+ of different IP addresses with different user agents, etc. Banning these IPs is not a great option - lots of collateral damage because many real people share IPs, depending on ISP setup.
I work on bot detection involving device fingerprinting - imo this is one of the only ways to defend against residential proxy activity, since you can sniff out the warning flags of automation software and other shared indicators regardless of IP.
Yikes, this can become a slippery slop towards surveillance state very quickly with these type of authentication or human verification. Kinda like what the invisible pixel thing on steroid, but event more intrusive and harder to evade.
Yes, thanks for bringing this up. We've made product decisions to improve bot detection that also move away from adtech-style tracking - happy to chat about the specifics privately, bchen at stytch dot com.
Related, I have a fairly unusual setup for my personal laptop and that makes many anti-bot products Very Unhappy (same for many of my teammates). It's easy to detect users who dare to run something other than stock Chrome/Safari, but it's disappointing that many services penalize you for it. We designed Intelligent Rate Limiting so that real users on unusual setups aren't blocked: https://stytch.com/docs/fraud/guides/device-fingerprinting/d...
If I open the gates, I can see oodles of connections from China or Singapore in my server logs, all from different IP addresses but all allegedly (according to their USER_AGENT) from iphones with identical software versions.
Maybe these are infected apps on actual iphones, maybe they are scrapers purporting to be iphones, but one thing is sure: the good old internet isn't any more.
Surprised me that the laptop seemingly wasn't even password protected.
It's not like a proxy server is anything secret worth protecting.
I ran a proxy in ~1996 so students could MUD from restricted uni shells, but one weekend I went to visit my parents and there was a knock on the door and a smartly dressed man interrogated me about a plot to assassinate Clinton. (he was Special Branch sent on behalf of the Secret Service and FBI)
Unfortunately theres a lot of desperate people who will run random apps thinking it'll make them a quick buck.
On the other hand, 250$ is a suspiciously high number when you can get a dozen people to do it for 50$ in an afternoon.
ps. "top secret" clearing is a not secret club - it's a very big club and its practical purpose is you agreeing to increase legal liability by getting thrown into a different judicial tract if you screw up - eg by installing Russian hardware on your home.