Basic request

curl -x http://avp_live_abc:secret@api.atlasvpn.live:7777 https://ifconfig.me

Country-pinned

curl -x http://avp_live_abc-country-fr:secret@api.atlasvpn.live:7777 https://ifconfig.me
# → a French residential IP specifically

Sticky session (same exit for 10 min)

curl -x http://avp_live_abc-country-us-session-run42:secret@api.atlasvpn.live:7777 https://target.com

With verbose debugging

curl -v -x http://avp_live_abc:secret@api.atlasvpn.live:7777 https://ifconfig.me
The verbose output shows the CONNECT handshake explicitly — useful for diagnosing 407 / 402 / 429 responses.

Via environment variable (session-wide)

export HTTPS_PROXY="http://avp_live_abc:secret@api.atlasvpn.live:7777"
export HTTP_PROXY="$HTTPS_PROXY"
curl https://ifconfig.me       # picks up the env var
curl https://example.com       # same session, same exit
unset HTTPS_PROXY HTTP_PROXY    # back to direct

Rotating IPs per-request (no sticky)

Omit the -session- qualifier; every request picks a fresh node in the specified country.
for i in {1..5}; do
  curl -s -x http://avp_live_abc-country-fr:secret@api.atlasvpn.live:7777 https://ifconfig.me
  echo
done
# 5 different FR residential IPs (subject to pool depth)

Headers + body + proxy

curl -x http://avp_live_abc:secret@api.atlasvpn.live:7777 \
     -H "User-Agent: Mozilla/5.0 ..." \
     -H "Accept-Language: fr-FR,fr;q=0.9" \
     -X POST \
     -d '{"query": "foo"}' \
     https://api.target.com/search