Port Scanning Protection: Block Network Probing
How websites use JavaScript to probe local network ports and detect services, and how to block port scanning at the browser level.
Browse other topics
This article lives in the editorial library. For step-by-step setup, reference material, and ongoing updates, jump into the docs section.
Category overview
This archive groups 8 articles on Network. Use it to move from editorial reads into practical BotBrowser guidance, then continue in Network.
Common tags in this topic
Articles
8
Latest update
Mar 25, 2026
Docs section
Network
Three strong reads to understand this topic before diving into the full archive.
Configure independent proxy and geographic identity per BrowserContext. Run multiple regions in a single browser instance with automatic timezone, locale, and language alignment.
Complete guide to UDP over SOCKS5 proxy tunneling. Learn how QUIC and WebRTC STUN traffic can leak your real IP, and how BotBrowser tunnels UDP through SOCKS5 automatically.
Additional guides from this topic archive.
How websites use JavaScript to probe local network ports and detect services, and how to block port scanning at the browser level.
How to set custom HTTP headers at the browser engine level for consistent request identity across all network requests.
How to configure runtime proxy switching and per-context proxy settings for managing multiple network identities simultaneously.
How DNS leaks expose your browsing activity and real location, and how to route DNS resolution through your proxy for complete privacy.
How WebRTC exposes your real IP address through ICE candidates, and how to prevent WebRTC leaks while keeping functionality intact.
Complete guide to configuring SOCKS5, HTTP, and HTTPS proxies with embedded credentials, geolocation matching, and selective routing.
The guides cover the model first, then move into cross-platform validation, isolated contexts, and scale-ready browser deployment.