Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
| IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 43.157.48.250 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 28% | 1014 ms | 7 ms | 8 d |
| 111.125.88.186 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 76% | 1015 ms | 270 ms | 8 d |
| 27.79.244.56 | 16000 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 63% | 1016 ms | 284 ms | 8 min |
| 185.67.100.105 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1017 ms | 81 ms | 48 sec |
| 213.238.168.106 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1018 ms | 46 ms | 8 d |
| 51.81.23.66 | 28912 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1019 ms | 98 ms | 8 d |
| 100.42.112.23 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1020 ms | 13 ms | 8 d |
| 103.122.84.27 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 77% | 1020 ms | 192 ms | 8 d |
| 80.28.111.248 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 59% | 1021 ms | 34 ms | 6 min |
| 128.199.221.91 | 21605 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 57% | 1027 ms | 164 ms | 3 min |
| 203.150.132.42 | 14153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 103 ms | 192 ms | 8 d |
| 107.180.91.248 | 27462 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1031 ms | 142 ms | 8 min |
| 213.135.234.101 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1033 ms | 15 ms | 8 d |
| 44.206.234.75 | 12462 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 9% | 104 ms | 91 ms | 2 min |
| 185.6.104.150 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 105 ms | 35 ms | 8 d |
| 47.96.252.112 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 106 ms | 239 ms | 8 d |
| 37.16.6.125 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1064 ms | 7 ms | 8 d |
| 46.227.37.21 | 1088 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1069 ms | 32 ms | 8 d |
| 223.25.98.82 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 94% | 107 ms | 211 ms | 3 min |
| 93.190.143.139 | 11110 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1071 ms | 19 ms | 8 d |
| 129.151.72.85 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1072 ms | 24 ms | 8 d |
| 143.198.69.18 | 12345 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 99% | 1073 ms | 145 ms | 8 d |
| 103.199.97.33 | 39825 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 1073 ms | 169 ms | 8 d |
| 89.58.44.48 | 47287 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1073 ms | 7 ms | 8 d |
| 190.12.95.170 | 37209 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1075 ms | 177 ms | 7 min |
| 124.70.205.56 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 97% | 1079 ms | 231 ms | 4 min |
| 43.157.52.37 | 443 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 42% | 1079 ms | 7 ms | 3 min |
| 178.212.65.61 | 3629 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 97% | 1079 ms | 80 ms | 8 d |
| 38.127.179.125 | 46656 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 1079 ms | 85 ms | 8 d |
| 36.94.81.111 | 33333 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 97% | 108 ms | 186 ms | 8 d |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.