Cloud Computing 4 min read

Distributed IP Proxy Pool on Tencent SCF to Bypass WAF Limits

The article introduces Cloud ProxyPool, a Go‑based distributed IP proxy pool built on Tencent Cloud Functions (SCF) that bypasses WAF IP restrictions, provides step‑by‑step deployment, client configuration, CA certificate installation, proxy settings, a monitoring dashboard, and outlines supported use cases such as crawler IP rotation, IP testing, HTTPS interception, and integration with tools like Burp Suite.

Black & White Path
Black & White Path
Black & White Path
Distributed IP Proxy Pool on Tencent SCF to Bypass WAF Limits

Tool Overview

Cloud ProxyPool is a Go‑implemented distributed IP proxy pool that runs on Tencent Cloud Functions (SCF). It provides IP rotation to bypass WAF IP limits and can be invoked by security scanning tools.

Features

Real‑time request statistics (total, success, failure)

Health status and failure count for each function URL

Circuit‑breaker monitoring that shows nodes in cooldown

Supports HTTP, HTTPS (with interception) and SOCKS5 proxies

Integrates with Burp Suite, Proxifier and can be used for port scanning in SOCKS5 mode

Deployment

1. Deploy Cloud Functions

cd deploy
pip install -r requirements.txt
# Edit deploy.toml to add Tencent Cloud credentials
python deploy.py

Successful deployment outputs all function URLs and writes them to ../client/config.toml.

2. Start the Client

cd ../client
./cloud-proxy.exe

The first run automatically generates a CA certificate in the certs/ directory.

3. Configure Proxy

HTTP proxy (recommended)

# Windows PowerShell
$env:http_proxy="http://127.0.0.1:10800"
$env:https_proxy="http://127.0.0.1:10800"
# Linux/macOS
export http_proxy=http://127.0.0.1:10800
export https_proxy=http://127.0.0.1:10800

SOCKS5 proxy

curl -x socks5://127.0.0.1:10801 http://myip.ipip.net

4. Install CA Certificate (HTTPS required)

Windows

Double‑click certs/ca-cert.pem Choose “Install Certificate”

Select “Trusted Root Certification Authorities”

Linux/macOS

# Ubuntu/Debian
sudo cp certs/ca-cert.pem /usr/local/share/ca-certificates/cloud-proxy-ca.crt
sudo update-ca-certificates
# macOS
sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain certs/ca-cert.pem

Web Monitoring Dashboard

After the client starts, open http://127.0.0.1:8081 to view real‑time request counts, node health, and cooldown status.

Supported Scenarios

Crawler IP rotation

IP interface testing

Bypassing IP restrictions

HTTPS traffic capture

Burp Suite / Proxifier integration

Port scanning in SOCKS5 mode

Repository

https://github.com/25smoking/CloudProxyPool

GoTencent CloudSCFsecurity scanningWAF BypassIP Proxy
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.