Bypass Solution

Our solution automates the generation of all the required px-correlated headers

How the Solution Works

To bypass PerimeterX protection:

  1. Provide our API with the device and app details.

  2. Parse the returned headers and use them for requests to the protected application.

For app-specific requests, examples, more informations or plan pricing, please contact us on Discord.

Required Details

Since PerimeterX is mobile-based, our API requires a JSON input with the package_name of the Android app (e.g., com.enflick.android.TextNow for TextNow). Additional optional device information can be supplied for more accurate header generation.

Based on this information, the API will return all necessary headers for the specified app.

In order to access any of our endpoint you'll need a valid API Key, either join our discord for a trial or puchase a plan

Generate token and headers

post

This endpoint generates the PerimeterX authorization headers for mobile applications. It requires the package name of the Android mobile application, and optionally the continent and manufacturer.

Authorizations
Body
package_namestringRequired

The package name of the Android mobile application (e.g., com.enflick.android.TextNow)

continentstringOptional

Optional Android version (e.g., america)

manufacturerstringOptional

Optional device brand (e.g., samsung)

Responses
200
OK, headers generated
application/json
post
POST /generate HTTP/1.1
Host: px-mobile.takionapi.tech
x-api-key: YOUR_API_KEY
Content-Type: application/json
Accept: */*
Content-Length: 93

{
  "package_name": "com.enflick.android.TextNow",
  "continent": "america",
  "manufacturer": "samsung"
}
{
  "X-PX-ORIGINAL-TOKEN": "3:e37936...djA==:1000:+SV...zyqHsxXU=",
  "X-PX-AUTHORIZATION": "3",
  "User-Agent": "TextNow 24.31.1.0 (SM-C710F; Android OS 8.1; fr-CA)"
}

Last updated

Was this helpful?