Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
31.146.161.106 | 80 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 89% | 1981 ms | 69 ms | 6 min |
103.87.169.186 | 5664 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 20% | 1982 ms | 174 ms | 3 min |
110.76.129.30 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1982 ms | 200 ms | 7 min |
103.8.115.27 | 48644 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 24% | 1983 ms | 135 ms | 6 min |
103.84.178.193 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1983 ms | 173 ms | 2 min |
167.249.171.110 | 39458 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1987 ms | 203 ms | 8 min |
163.172.131.178 | 16379 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 94% | 1990 ms | 10 ms | 4 min |
165.225.216.80 | 10605 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 91% | 1990 ms | 125 ms | 4 min |
163.172.147.9 | 16379 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 23% | 1991 ms | 7 ms | 4 min |
173.212.250.65 | 14346 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 21% | 1991 ms | 8 ms | 3 min |
178.44.160.163 | 7788 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 62% | 1993 ms | 72 ms | 5 min |
1.0.0.66 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1994 ms | 11 ms | 4 min |
144.91.66.30 | 51110 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1995 ms | 8 ms | 3 min |
115.242.204.122 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 84% | 1998 ms | 202 ms | 6 min |
51.81.186.179 | 55282 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1999 ms | 162 ms | 2 min |
43.128.62.125 | 23642 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 99% | 1999 ms | 306 ms | 3 min |
62.210.201.140 | 17937 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 2000 ms | 10 ms | 3 min |
187.94.99.197 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 2002 ms | 225 ms | 60 sec |
202.162.214.250 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 2003 ms | 193 ms | 1 min |
110.77.232.172 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 84% | 2003 ms | 203 ms | 2 min |
171.226.88.108 | 30206 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 28% | 2004 ms | 274 ms | 5 min |
171.226.88.49 | 5310 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 46% | 2008 ms | 248 ms | 7 min |
115.29.148.215 | 45554 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 2009 ms | 190 ms | 4 min |
162.253.68.97 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 2010 ms | 245 ms | 21 sec |
189.50.138.10 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 2021 ms | 228 ms | 6 min |
1.15.172.214 | 7890 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 74% | 203 ms | 259 ms | 23 sec |
144.202.103.222 | 56068 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 2033 ms | 142 ms | 3 min |
195.66.156.196 | 1080 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 205 ms | 22 ms | 3 min |
200.125.40.38 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 205 ms | 225 ms | 4 min |
200.140.83.108 | 6588 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 99% | 206 ms | 257 ms | 5 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.