Home/Marketplace/Antidetect Browser API
LIVE|browser.proxies.sx

Antidetect Browser API
Cloud Camoufox + Mobile Proxy

Cloud browser sessions with unique fingerprints and auto-allocated 4G/5G mobile proxies. Pay ~$0.005/min with USDC via x402.

Camoufox engine (Firefox 130+, engine-level anti-fingerprinting) + real mobile IP per session. CDP access, screenshots, JS execution. No API keys, no registration.

💰
~$0.005/min
USDC per minute
🌍
6 Countries
DE GB FR ES PL US
🦊
Camoufox
Firefox 130+ engine
📱
Auto Proxy
Real 4G/5G mobile IP

Create a Browser Session in 1 Command

POST to the endpoint, pay via x402, and get a CDP endpoint URL. Connect with Playwright, Puppeteer, or any CDP client.

1

Create a session (returns HTTP 402 with payment details)

curl -X POST "https://browser.proxies.sx/v1/sessions" \
  -H "Content-Type: application/json" \
  -d '{"country": "US"}'

# Response: HTTP 402 Payment Required
# {
#   "x402": {
#     "amount": "5000",
#     "currency": "USDC",
#     "recipient": "0xF8cD900794245fc36CBE65be9afc23CDF5103042",
#     "networks": ["base", "solana"],
#     "description": "Browser session ~$0.005/min"
#   }
# }
bash
2

Pay USDC and retry with payment signature

curl -X POST "https://browser.proxies.sx/v1/sessions" \
  -H "Content-Type: application/json" \
  -H "Payment-Signature: <base_or_solana_tx_hash>" \
  -d '{"country": "US"}'

# Response: HTTP 200
# {
#   "session_id": "sess_abc123",
#   "cdp_url": "wss://browser.proxies.sx/cdp/sess_abc123",
#   "proxy": {
#     "country": "US",
#     "type": "4G",
#     "ip": "172.58.xxx.xxx"
#   },
#   "fingerprint": {
#     "user_agent": "Mozilla/5.0 (Windows NT 10.0; rv:130.0) Gecko/20100101 Firefox/130.0",
#     "platform": "Win32",
#     "screen": "1920x1080"
#   }
# }
bash
3

Connect with Playwright, Puppeteer, or CDP

import { chromium } from 'playwright';

// Connect to the antidetect browser session via CDP
const browser = await chromium.connectOverCDP(
  'wss://browser.proxies.sx/cdp/sess_abc123'
);
const page = browser.contexts()[0].pages()[0];

// Navigate — requests go through the auto-allocated mobile proxy
await page.goto('https://example.com');

// Take a screenshot
await page.screenshot({ path: 'screenshot.png', fullPage: true });

// Execute JavaScript in the page context
const title = await page.evaluate(() => document.title);
console.log('Page title:', title);

// Extract data
const data = await page.evaluate(() => {
  return Array.from(document.querySelectorAll('h2'))
    .map(el => el.textContent);
});

await browser.close();
typescript

Available Countries (Auto-Allocated Mobile Proxy)

🇩🇪
DE
Germany
🇬🇧
GB
United Kingdom
🇫🇷
FR
France
🇪🇸
ES
Spain
🇵🇱
PL
Poland
🇺🇸
US
United States

Each session gets a real 4G/5G mobile IP from the requested country. The TLS fingerprint and browser fingerprint are automatically consistent with the mobile carrier.

Engine-Level Anti-Fingerprinting + Real Mobile IP

Camoufox patches Firefox at the C++ level for undetectable fingerprint spoofing. Combined with a real 4G/5G mobile proxy, your sessions are indistinguishable from real phone users.

Unique Fingerprint Per Session

Every browser session generates a unique fingerprint — Canvas, WebGL, AudioContext, navigator properties, fonts, and screen resolution are all spoofed consistently. Camoufox patches Firefox at the engine level, not via JavaScript injection.

Auto Mobile Proxy

Each browser session is automatically paired with a real 4G/5G mobile IP. No separate proxy purchase needed. Available countries: DE, GB, FR, ES, PL, US. The TLS fingerprint matches the mobile IP type for maximum stealth.

CDP Access

Full Chrome DevTools Protocol access to every session. Connect with Playwright, Puppeteer, or any CDP client. Navigate pages, execute JavaScript, intercept network requests, and manipulate the DOM programmatically.

Screenshots & JS Execution

Capture full-page screenshots in PNG or JPEG. Execute arbitrary JavaScript in the page context. Extract data, fill forms, click elements, and handle dynamic content — all via the API.

Camoufox Engine

Built on Camoufox — an open-source, Firefox 130+ based browser maintained by daijro with engine-level anti-fingerprinting patches. Canvas, WebGL, AudioContext, navigator, and timezone spoofing are applied at the C++ level, not via detectable JS overrides.

x402 USDC Payments

Pay per minute with USDC via the x402 protocol. No API keys, no registration, no monthly subscriptions. AI agents handle the HTTP 402 flow automatically. Settlement on Base (~2s) or Solana (~400ms).

Why Mobile Proxy + Antidetect Browser = Undetectable

Datacenter IP + Normal Browser
Instantly flagged. TLS fingerprint says "Chrome on Windows" but IP resolves to AWS. 0% stealth.
Mobile IP + Normal Browser
Better, but browser fingerprint is generic. Repeated visits with same Canvas hash get flagged. 60% stealth.
Mobile IP + Camoufox (This API)
Unique fingerprint per session, real mobile IP, matching TLS cipher suites. Indistinguishable from real user. 95%+ stealth.

Pricing vs. GoLogin, Multilogin, AdsPower, Browserless

Pay-per-minute with no commitment vs. monthly subscriptions. Mobile proxy included with every session.

FeaturePROXIES.SX BrowserGoLoginMultiloginAdsPowerBrowserless
Pricing Model~$0.005/min (pay-per-use)$49-$199/mo$99-$399/moFree-$50/mo$50-$500/mo
PaymentUSDC (Base, Solana)Credit cardCredit cardCredit cardCredit card
Registration RequiredNo (x402 protocol)YesYesYesYes
Mobile Proxy IncludedYes (auto-allocated)No (BYOP)No (BYOP)No (BYOP)No (BYOP)
Browser EngineCamoufox (Firefox 130+)Orbita (Chromium)Mimic/StealthfoxSunBrowser (Chromium)Chrome/Firefox
Anti-FingerprintingEngine-level (C++)JS injectionEngine patchesJS injectionNone
CDP / API AccessYes (full CDP)Limited APILimited APILimited APIYes (full CDP)
AI Agent CompatibleNative (x402 + MCP)NoNoNoVia API key
Cloud HostedYes (fully managed)Desktop appDesktop appDesktop appYes
Min Commitment$0 (pay per use)$49/mo$99/mo$0 (free tier)$50/mo

Cost Examples

1 session
10-min scraping session
$0.05
Includes mobile proxy
100 sessions
100 sessions / day (5 min avg)
$2.50 / day
$75/mo at daily usage
1,000 sessions
1,000 sessions / day (3 min avg)
$15 / day
$450/mo at scale

GoLogin at $49/mo gives you 100 profiles. Multilogin at $99/mo gives you 100 profiles. With this API, you pay only for what you use — $0.05 for a 10-minute session with a real mobile proxy included.

Integration: Playwright, Puppeteer, CDP Direct

Connect with any CDP-compatible tool. Full browser control via standard protocols.

PlaywrightRecommended

import { chromium } from 'playwright';

const browser = await chromium.connectOverCDP(
  'wss://browser.proxies.sx/cdp/sess_abc123'
);
const context = browser.contexts()[0];
const page = context.pages()[0];

// Navigate through the auto-allocated mobile proxy
await page.goto('https://target-site.com');

// Wait for dynamic content
await page.waitForSelector('.product-price');

// Extract structured data
const products = await page.evaluate(() => {
  return Array.from(document.querySelectorAll('.product-card')).map(card => ({
    name: card.querySelector('.product-name')?.textContent?.trim(),
    price: card.querySelector('.product-price')?.textContent?.trim(),
    inStock: !!card.querySelector('.in-stock'),
  }));
});

console.log(JSON.stringify(products, null, 2));
await browser.close();
typescript

Puppeteer

import puppeteer from 'puppeteer-core';

const browser = await puppeteer.connect({
  browserWSEndpoint: 'wss://browser.proxies.sx/cdp/sess_abc123',
});
const [page] = await browser.pages();

await page.goto('https://target-site.com', { waitUntil: 'networkidle2' });
const screenshot = await page.screenshot({ fullPage: true });
const title = await page.title();

console.log('Title:', title);
await browser.close();
typescript

CDP DirectWebSocket

import WebSocket from 'ws';

const ws = new WebSocket('wss://browser.proxies.sx/cdp/sess_abc123');

ws.on('open', () => {
  // Navigate via CDP command
  ws.send(JSON.stringify({
    id: 1,
    method: 'Page.navigate',
    params: { url: 'https://target-site.com' },
  }));
});

ws.on('message', (data) => {
  const msg = JSON.parse(data.toString());
  if (msg.id === 1) {
    // Page loaded — take screenshot
    ws.send(JSON.stringify({
      id: 2,
      method: 'Page.captureScreenshot',
      params: { format: 'png' },
    }));
  }
});
typescript

MCP Integration for AI Agents

The @proxies-sx/browser-mcp package gives AI agents (Claude, GPT, etc.) 9 tools for autonomous browser control.

Install & Configure

// Add to your MCP config (claude_desktop_config.json or similar)
{
  "mcpServers": {
    "proxies-browser": {
      "command": "npx",
      "args": ["@proxies-sx/browser-mcp"],
      "env": {
        "BROWSER_API_URL": "https://browser.proxies.sx"
      }
    }
  }
}
json

9 MCP Tools

create_session
Create a new browser session with specified country
navigate
Navigate to a URL in an active session
screenshot
Capture a screenshot of the current page
execute_js
Execute JavaScript in the page context
click
Click an element by CSS selector
type_text
Type text into an input element
get_content
Extract page content (HTML or text)
close_session
Close a browser session
list_sessions
List all active browser sessions

Example: AI Agent Scraping a Page

Agent:"Create a browser session in the US and scrape the top 10 products from example-store.com"
MCP:create_session({country: "US"}) → sess_abc123 (x402 payment handled automatically)
MCP:navigate({url: "https://example-store.com/products"})
MCP:execute_js({script: "document.querySelectorAll('.product')..."}) → [{name, price, url}...]
MCP:screenshot() → screenshot.png
MCP:close_session({session_id: "sess_abc123"})
Agent:"Here are the top 10 products with prices and screenshots."

Learn more: MCP Server documentation | AI Browser Automation Guide

Use Cases: Scraping, Account Management, Ad Verification

Every session gets a unique fingerprint + real mobile IP. Indistinguishable from a real phone user.

Web Scraping at Scale

Scrape sites protected by Cloudflare, DataDome, and PerimeterX. Each session has a unique fingerprint + real mobile IP, making requests indistinguishable from real users. No CAPTCHA challenges, no IP bans.

Cloudflare bypassDataDome bypassNo CAPTCHAs
Multi-Account Management

Manage multiple accounts on platforms like Instagram, TikTok, Facebook, and X/Twitter. Each account gets a unique browser fingerprint and mobile IP, preventing platform detection and linking of accounts.

Unique fingerprint/accountMobile IP per sessionNo account linking
Ad Verification

Verify ad placements from real mobile user perspectives. See exactly what ads appear for real 4G/5G users in different countries. Detect malvertising, verify geo-targeting, and audit redirect chains.

Real mobile perspective6 countriesScreenshot evidence
E-Commerce Price Monitoring

Monitor competitor prices on Amazon, Walmart, and other retailers. Mobile fingerprint + mobile IP combination bypasses even the most aggressive anti-bot systems used by e-commerce platforms.

Amazon compatibleReal user signalsStructured data output
AI Agent Browser Control

Give AI agents full browser control via MCP integration. Claude, GPT, and other LLMs can create sessions, navigate pages, fill forms, take screenshots, and extract data — all autonomously with USDC payment.

9 MCP toolsAutonomous paymentFull CDP access
Market Research & Intelligence

Access geo-restricted content and localized search results from 6 countries. See region-specific pricing, availability, and content as a real mobile user in that country would see it.

Geo-specific content6 country optionsLocalized results

How Camoufox Anti-Fingerprinting Works

Engine-Level Patches (C++)

CanvasUnique noise injected at the rendering level, not via JS override
WebGLRenderer and vendor strings spoofed at the GPU abstraction layer
AudioContextAudio processing noise applied in the audio pipeline
NavigatorPlatform, hardwareConcurrency, deviceMemory patched in C++
FontsFont enumeration controlled at the OS interface level
ScreenResolution, colorDepth, and devicePixelRatio spoofed consistently

Why Engine-Level Beats JS Injection

Most antidetect browsers (GoLogin, AdsPower) override browser APIs via JavaScript injection. Detection scripts can check for:

  • xJS prototype chain inconsistencies
  • xGetter/setter traps on navigator properties
  • xStack trace analysis revealing override code
  • xtoString() output differences from native functions

Camoufox patches Firefox at the C++ level. The JavaScript APIs return spoofed values natively — there are no overrides to detect. CreepJS, FingerprintJS, and BrowserLeaks see consistent, real-looking fingerprints.

Camoufox is open source, maintained by daijro on GitHub. Based on Firefox 130+. Read more: AI Browser Automation: Camoufox & Nodriver (2026) | Best Antidetect Browsers for Proxies (2026)

Frequently Asked Questions

Start Using the Antidetect Browser API

Cloud Camoufox sessions with real mobile proxies. No registration, no API keys, no monthly commitment.

~$0.005/min via x402 USDC. Create your first session in seconds.