Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
| IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 209.97.175.231 | 45337 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 93% | 108 ms | 260 ms | 8 d |
| 67.205.158.205 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 108 ms | 80 ms | 8 d |
| 50.96.204.221 | 18351 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1080 ms | 133 ms | 3 min |
| 79.132.200.122 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 53% | 1082 ms | 115 ms | 8 d |
| 195.225.49.138 | 55774 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1090 ms | 50 ms | 8 d |
| 87.106.47.118 | 7497 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 23% | 1092 ms | 12 ms | 8 d |
| 187.18.3.122 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1092 ms | 200 ms | 8 d |
| 45.229.205.246 | 55555 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1093 ms | 226 ms | 8 d |
| 185.132.1.221 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 89% | 1093 ms | 44 ms | 8 d |
| 115.76.206.176 | 54746 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 73% | 1095 ms | 207 ms | 10 min |
| 104.20.225.218 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1096 ms | 11 ms | 4 min |
| 23.222.59.246 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 1096 ms | 14 ms | 8 d |
| 103.76.188.97 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1097 ms | 182 ms | 8 d |
| 114.134.90.110 | 10800 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 42% | 1097 ms | 200 ms | 8 d |
| 156.146.59.25 | 9002 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1097 ms | 97 ms | 8 d |
| 119.180.143.190 | 8060 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 54% | 1098 ms | 198 ms | 7 min |
| 37.236.60.35 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1099 ms | 83 ms | 6 min |
| 129.226.90.16 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 79% | 110 ms | 266 ms | 8 d |
| 36.83.78.197 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 68% | 1100 ms | 210 ms | 12 min |
| 186.224.225.26 | 42648 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1100 ms | 228 ms | 8 d |
| 95.161.188.246 | 61537 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1100 ms | 63 ms | 8 d |
| 118.174.52.122 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 51% | 1101 ms | 212 ms | 8 min |
| 103.60.187.129 | 52195 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1102 ms | 161 ms | 8 d |
| 94.154.57.5 | 9999 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1102 ms | 27 ms | 8 d |
| 143.198.49.49 | 14061 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 94% | 1104 ms | 143 ms | 2 min |
| 167.71.238.48 | 35448 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 84% | 1104 ms | 177 ms | 8 d |
| 8.220.180.164 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 84% | 1104 ms | 198 ms | 8 d |
| 94.154.221.91 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1104 ms | 35 ms | 8 d |
| 171.252.131.55 | 25062 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1105 ms | 192 ms | 8 min |
| 61.178.99.43 | 7302 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 31% | 1105 ms | 271 ms | 41 sec |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.