Proxy servers conserve system resources by directing all outgoing and incoming data traffic through a centralized portal. Typically, organizations limit the use of their proxy servers to local users. However, some organizations, either as a public service or because of a failure to properly protect their proxy server through the use of a 'firewall,' allow their proxy servers to be accessed by remote users. Outgoing requests from remote users can be routed through such unprotected proxy servers and appear to originate from the proxy server. Incoming responses are then received by the proxy server and routed to the remote user. Information requests sent through such proxy servers cannot easily be traced back to the originating IP address and can be used to circumvent attempts to blockqueries from the originating IP address.Blocking queries from innocent third party proxy servers is both inefficient, because it creates an endless game of hide-and-seek, and potentially counterproductive, as it runs a substantial risk of blocking requests from legitimate, desirable users who use that proxy server.