How to bypass websites that detect VPN?

any recommended residential ips?

So does that mean I can access a survey site that is available for another country?
Please reply

How about a static/residential IP like others have suggested?

I’m not sure you understand it. The same way one connects to Mullvad or Proton or any of the commercial VPNs, and the IPs are shifted to the ones of the selected server on those VPNs, the same happens if you host a VPS on a remote server somewhere and run a VPN there: your IPs get shifted to the IPs of that server you are running, wherever that may be.

The VPS is not hosted in your house, it’s hosted on a private, remote server.

Either they are using stale or poor VPN detection data or they have some kind of unusual implementation of VPN detection.

For example, consider Reddit’s VPN detection.

Reddit will block your access if you visit Reddit using a VPN on an incognito tab. But if you log out of Reddit and visit it in your regular session, Reddit will grant you access even with a VPN. That is because your cookies tell Reddit that this could be a legitimate user, which trumps the VPN IP address. In the incognito session, Reddit does not have access to those cookies.

But VPN detection is mainly based on IP addresses, and cookies do not help much.

NordVPN’s Meshnet?

You have to experiment with it a bit. Our data is publicly available at IPinfo.io so you can see if we can detect you. NordVPN’s meshnet does not have a repository, so I cannot see what their underlying tech is. Because we do behavior-based detection as our primary method, even if you use a self-hosted service, there is a chance we can detect you.

Sorry for the late response. Here’s some more advice. Up to you to try it.

The website likely has excellent VPN detection software (DPI, eventual IP recognition, etc.). It is what it is.

Try using different servers, all of them if necessary. When switching servers, make sure to clear your website data. If you are on a Windows computer, also clear your temporary files folder. Disconnect from the internet (use airplane mode on mobile and computer) after connecting to a new server, and flush DNS via CMD. You can use TCPView from Sysinternals if you are on Windows to resolve connections. If you are not on mobile, try enabling bridge mode or Shadowsocks. Additionally, use WireGuard only. Another possibility is setting up a VPN at the network level.

Yeah but I’m spoofing it to a blocked IP. Is there no IP spoof that isn’t a VPN?

Edit: is it really spoofing if the traffic is actually coming from the real server country? I’m talking about completely lying that I’m from Brazil or whatever, when there’s no server or anything there.

Oh I understand it. the point is to have a crowd. If you are the only one using it, it’s functionally no different than using your own IP. It can still be used to track what you are doing. VPN’s provide benefit to you because multiple people are using those servers, so companies can’t associate that IP address with you only and use it to definitively track you.

Yes, it would hide the internet traffic from your ISP (and shift that to your VPS provider) and hide your location from the website you are visiting, but your activity would still be tracked the same as if you used your router’s IP.

VPS provider’s IP ranges can also be blocked just like VPN providers, though.

Sure,good point there, but the second paragraph is my main objective. Thanks.

Yes, but mainstream VPNs are known. A self made VPN is not.

It’s not a perfect solution, it costs time and money, requires skills, and has limitations. Mullvad on the other hand is flexible and convenient.

Are those 5-10 IPs in a row? As I understand it, sites that want your data block a whole range of known VPN addresses.

My IP changes every time I reset my router. To my knowledge, it’s brand new to me, though it comes from a pool in my area.

I only mentioned this because recently a najor Japanese content provider began to block more and more VPNs and IPs belonging to AWS and Vultr, who provide VPS in Japan.

I’m not an expert, but can they identify that a request coming from AWS is a VPN and not something else? No idea how this works.

Yes there are techniques for IDing the characteristic of the VPN connection, but how well it works depends on the VPN protocol and implementation. Blocking known IP ranges could just be easier if your customers are all say from commercial ISPs.