Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
77.241.20.215 | 55915 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 186 ms | 65 ms | 3 min |
95.182.78.3 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1870 ms | 56 ms | 4 min |
117.186.174.90 | 18080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1872 ms | 245 ms | 3 min |
171.250.222.97 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 83% | 1877 ms | 256 ms | 2 min |
125.119.190.66 | 3333 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 19% | 1879 ms | 248 ms | 2 min |
162.243.140.82 | 38975 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1880 ms | 151 ms | 7 min |
61.28.230.231 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1882 ms | 259 ms | 2 min |
91.228.216.36 | 10639 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1882 ms | 35 ms | 3 min |
116.118.98.21 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 1885 ms | 259 ms | 5 min |
109.86.228.165 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 93% | 1887 ms | 75 ms | 3 min |
197.248.249.147 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 44% | 1888 ms | 159 ms | 3 min |
45.112.125.58 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1895 ms | 265 ms | 3 min |
188.165.222.158 | 8020 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 1899 ms | 19 ms | 3 min |
117.91.145.96 | 38801 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 53% | 1900 ms | 236 ms | 5 sec |
62.85.224.217 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 77% | 1901 ms | 35 ms | 7 min |
89.208.107.167 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1906 ms | 5 ms | 2 min |
194.42.195.74 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1908 ms | 42 ms | 3 min |
47.243.50.83 | 8082 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 191 ms | 311 ms | 5 min |
203.23.104.30 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1910 ms | 7 ms | 5 min |
114.116.246.230 | 1080 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 41% | 1913 ms | 164 ms | 3 min |
174.64.199.79 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 76% | 1915 ms | 157 ms | 5 min |
1.1.1.177 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1918 ms | 4 ms | 5 min |
151.84.98.89 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1918 ms | 64 ms | 7 min |
115.243.142.185 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 86% | 1924 ms | 183 ms | 6 min |
222.127.255.21 | 9999 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1925 ms | 213 ms | 5 min |
177.125.165.170 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 71% | 1926 ms | 218 ms | 3 min |
202.75.55.175 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1931 ms | 163 ms | 6 min |
202.159.35.161 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 194 ms | 177 ms | 5 min |
203.174.26.137 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 196 ms | 109 ms | 6 min |
185.158.115.191 | 48989 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 82% | 1975 ms | 46 ms | 4 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.