List proxies owned by the caller’s organization.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
List of proxies
Proxy type to use. In terms of quality for avoiding bot-detection, from best to worst: mobile > residential > isp > datacenter.
datacenter, isp, residential, mobile, custom Readable name of the proxy.
Protocol to use for the proxy connection.
http, https Current health status of the proxy.
available, unavailable Timestamp of the last health check performed on this proxy.
Configuration specific to the selected proxy type.