Using a VPN that makes it look like it is not a VPN

Hello together,

first, I apologize myself that I did not use the search function in this subreddit, but I used Google and I could not find a proper solution or at least, I only saw every VPN provider who just wants to sell its software.

I’m looking for a specific solution:

I want to change a region of an account and they want clean attendances by me. They stated, it must not be a VPN. Since I do not know a lot about VPNs and some software can track that I am actually using a VPN, I’m looking for a provider who can perfectly fake my location without any traces that I am using a VPN. Does this kind of software exist? Or is it impossible to create? I used ControlD a year ago and it was doing fine but only on a webbrowser (or I was too lazy to set it up probably).

Please apologize my ignorance but I know that on reddit are some experts on any field of technology and I really need your help. Furthermore, I would educate myself a bit more regarding VPNs.

All the best,

Chris

Does this kind of software exist?

It’s not the software that gives it away. The IP addresses of VPN providers are well known. Also VPN traffic has a unique signature that is identifiable even if they don’t know what is in the tunnel. And of course your client can give clues.

You need a private VPN in that location that you want to look like you’re in.

Not a commercial one, that has well known IP address.

You received a good number of great responses, but I will chime in from IPinfo’s side as we provide VPN detection as a service. The short answer is, it is difficult.

I am not sure which website you are using and what VPN detection provider they use, but in our case, we have very wide coverage when it comes to VPN usage. Essentially, what we do is flag VPN IP addresses. That’s it. IP addresses are information that identifies the devices making requests through the internet. It is not possible to change them.

What a VPN service does is relay your internet traffic through a VPN server, which can be based in a data center somewhere. From our side, we know the IP addresses of these VPN servers and we know the IP addresses of data center servers. So, when the website sees traffic coming, they can look up the IP address from our database and figure out whether or not it is a VPN or not.

Now, from the data side, no matter what commercial VPN you are using, it is nearly impossible for us to not recognize that VPN IP address. And if you rent your own server in a data center or a hosting provider, we will flag the IP addresses as ‘hosting’, which is another form of an anonymous IP address. To bypass a good VPN detection service, you have to make your internet traffic as real as possible which will involve using a non-commercial residential IP address. Even in those cases, there is a non-zero chance of being recognized as a proxy IP address.

You can use stealth proxies like vless + GRPC + tls, which would look like normal https traffic and be very hard to identify as a VPN. Just buy a server, run the script and your server will be ready. If you need video tutorial, let me know.

You need to buy something called a dedicated IP. It’s basically an IP that you use exclusively, without sharing it with other customers of the VPN service. I used to use these IPs for Netflix and other streaming sites.

You could just try using a virtual machine online based out of the region you want and then connect to the account.

Buy a cloud server (VPS) on a reliable hoster.

Run your VPN server here. Make sure your VPN server in it’s routing process doesn’t touch the TTL/HL of packets (TTL incrementing by 1).

The IPs assigned to the VPS will be dedicated to your instance and not shared with other people. The TTL/HL trick doesn’t adjust packet headers as they route through your VPN, thus making it look like all packets from aren’t being routed.

There is a project , trojan protocol , in iran and china use it to bypass restriction , it’s hard to detect it by ISPs .

Just try a not too popular vpn and probably their ips won’t be blacklisted

If go don’t want the end system to report VPN, then don’t pet the end system know about it. Buy/create a VPN appliance:

Get a cheap router, configure it to make the VPN connection on wan port, but give addresses like normal. Then your computer does not know.

Residential proxies.

This isn’t really possible as all IPs belonging to VPN providers are fairly well known, they work at anonymizing traffic to an extent because no one knows who is using the IP at any given time. The only way to accomplish this is to set up a private VPN, which kinda defeats the point of anonymizing traffic.

Late to the party, but you don’t need a vpn, you need residential SOCKS5 proxies for that. They’re on the pricey side, but some providers have discounts. You’re just gonna have to look up providers yourself, because I haven’t used it in ages.

Please note that socks proxies don’t encrypt the connection, so even if they’re very good for obfuscating your IP address, you still need to connect to them through a VPN, otherwise all your activities will be in cleartext

Thank you for your time and your quick response. So do I understrand correctly, it is not possible to genuinely fake it?

You can detect VPN using the ip2location.io API.

How do you buy a private VPN

Thank you for further explanation of the situation. Well, I just need this kind of service for 30 days and it is important, that there are no doubts that I’m a genuine IP address. I do understand the difficulty of this maneuver, hence I am asking on this subreddit to gather some information from people who do know something about this topic.

But I see what you mean and I am about to give up on this matter, since it is either complex or maybe not worth the time. Even if I would try it, there is no guarantee that this provides a disguise as a true residential.

Please link me to a video tutorial. I need to know how to do this!

Thank you for your reply. Do you have a provider who you would recommend? It must be consistent.