Problem with Proxy detected

Dear

How can I disable proxy on mikrotik? I have problem to access on some pages because i have block from WAF .
When I check proxy status by for example on whatismyip.com/proxy-check or ip-check.net/detect-proxy.php so I see there Proxy detected.
Web proxy I have disable on mikrotik.

Can you help me someone fix my problem please?

MikroTik do not have any form of httpS proxy

if
https:/whatismyip.com/proxy-check
say you have proxy,
or you have some virus or similar
or your ISP filter your connection,

nothing to do with MikroTik

Our buisness ISP says on their side is everything ok. They say problem must be on your side.
Virus or similar you think on MikroTik? How can I analyze it?

Not on MikroTik, on your device

This is not possible. This is problem from every devices behind our router. Also from smartphone on wifi behind this router.

it’s impossible than MikroTik works as httpS proxy!!!
Understand this?
I could pay you if you find out how to do it without “hack” the devices connected and without generate security errors…
Do not trust your ISP if all your devices are clean

Problem can be on my Bridge. I have there ARP - proxy-arp because I have there VPN clients and eoip tunel.

proxy arp have any to do with browser proxy…
probably the vpn use proxy

My 5cent on this …

  • use of a proxy is a decision of the browser. Browser can select one through settings, or can get the information from DHCP or via the PAC file (proxy.pac, wspad.dat)
    (https://www.techwalla.com/articles/how-do-i-find-my-proxy-server-address).
    PAC files are used by your IT department to indicate what URL to access via proxy and for which URL’s (even on the page level) to skip proxy.

  • there is also the transparant proxy. This is when some intermediate router/firewall detects HTTP requests and redirects them to a proxy server (local or a dedicated device)

-HTTPS needs a firewall that will maintain 2 HTTPS sessions, one between the site and the firewall, and another via the firewall and the client. (HSTS will not allow this deviating certificaat from the firewall on the URL, and eliminate this “man-in-the-middle” decoding). HTTPS handling (and screening) is therefore troublesome. MT cannot do this AFAIK.

RouterOS has a webproxy (disabled by default) , and it is also easy to write firewall mangle rules to redirect all port 80 traffic to that webproxy or to any other proxy server somewhere else. Web-proxy servers can be chained (one proxy sends it to the next proxy).

Your PC can also have a local proxy (eg to debug the HTTP traffic, even to improve the Microsoft registration process). The one I use is Fiddler. (https://www.telerik.com/fiddler)

Some website pages (scripts) do no work through a web-proxy!

If your active web-proxy is the Mikrotik, you should be able to see that. (I use this proxy without caching for a much improved HTTP management session for TP-Link through an SSTP tunnel over satellite)
Klembord-2.jpg

Im getting this answer

Can you read inside the image?,
last line?
is self-explanatory…

for me, the most important thing is to find out if there is a problem. On my side or on the side of the ISP when they claim that the problem is not on their side

What I see on your screen is that the IP mentioned (is it yours?) is in the list of the “bad guys”, like there are many blacklists for spamming or open mail servers, that list can be checked before you accept the mail.

  1. If it is your IP address, then you will have to get your address removed from that IP2Location PUB proxy black list. (For an open mail server I know you can initiate the “open mail server” test yourselves, and if you pass the test (not open anymore) your address is removed from the list. I don’t know if such a check can be done here (https://www.ip2location.com/database/ip2proxy) )

  2. If it is not the address you get from the ISP, check if you are using VPN, Proxy or Tor, or some other anonymizer technique in your network. The IP address shown will be that used by the VPN, Proxy or TOR service!

  3. If it is not the address you get from the ISP, then this can also be a shared address with other ISP clients (ISP doing CGNAT) and some of those other clients are using a system this Proxy-detection-bot is looking for. (Happens quite often with other blacklists, eg where your website is shared with others. Other blacklist just block a whole subnet or DNS subnet instead of just one address).

In case 1 and 2 you have to take action either against the IP2Proxy blacklist, or removing the offending service
In case 3 you might be the victim of other clients doing things that are detected by this checking bot. I’m afraid only the ISP can move you away from the offending clients.