Distributed IP Proxy Pool on Tencent SCF to Bypass WAF Limits
The article introduces Cloud ProxyPool, a Go‑based distributed IP proxy pool built on Tencent Cloud Functions (SCF) that bypasses WAF IP restrictions, provides step‑by‑step deployment, client configuration, CA certificate installation, proxy settings, a monitoring dashboard, and outlines supported use cases such as crawler IP rotation, IP testing, HTTPS interception, and integration with tools like Burp Suite.
Tool Overview
Cloud ProxyPool is a Go‑implemented distributed IP proxy pool that runs on Tencent Cloud Functions (SCF). It provides IP rotation to bypass WAF IP limits and can be invoked by security scanning tools.
Features
Real‑time request statistics (total, success, failure)
Health status and failure count for each function URL
Circuit‑breaker monitoring that shows nodes in cooldown
Supports HTTP, HTTPS (with interception) and SOCKS5 proxies
Integrates with Burp Suite, Proxifier and can be used for port scanning in SOCKS5 mode
Deployment
1. Deploy Cloud Functions
cd deploy
pip install -r requirements.txt
# Edit deploy.toml to add Tencent Cloud credentials
python deploy.pySuccessful deployment outputs all function URLs and writes them to ../client/config.toml.
2. Start the Client
cd ../client
./cloud-proxy.exeThe first run automatically generates a CA certificate in the certs/ directory.
3. Configure Proxy
HTTP proxy (recommended)
# Windows PowerShell
$env:http_proxy="http://127.0.0.1:10800"
$env:https_proxy="http://127.0.0.1:10800"
# Linux/macOS
export http_proxy=http://127.0.0.1:10800
export https_proxy=http://127.0.0.1:10800SOCKS5 proxy
curl -x socks5://127.0.0.1:10801 http://myip.ipip.net4. Install CA Certificate (HTTPS required)
Windows
Double‑click certs/ca-cert.pem Choose “Install Certificate”
Select “Trusted Root Certification Authorities”
Linux/macOS
# Ubuntu/Debian
sudo cp certs/ca-cert.pem /usr/local/share/ca-certificates/cloud-proxy-ca.crt
sudo update-ca-certificates
# macOS
sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain certs/ca-cert.pemWeb Monitoring Dashboard
After the client starts, open http://127.0.0.1:8081 to view real‑time request counts, node health, and cooldown status.
Supported Scenarios
Crawler IP rotation
IP interface testing
Bypassing IP restrictions
HTTPS traffic capture
Burp Suite / Proxifier integration
Port scanning in SOCKS5 mode
Repository
https://github.com/25smoking/CloudProxyPool
Black & White Path
We are the beacon of the cyber world, a stepping stone on the road to security.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
