Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
67.43.228.254 | 13311 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1119 ms | 89 ms | 6 min |
138.36.86.237 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 46% | 113 ms | 264 ms | 4 min |
185.75.161.118 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 115 ms | 42 ms | 5 min |
184.22.0.122 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 116 ms | 182 ms | 6 min |
84.38.189.241 | 30073 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1170 ms | 37 ms | 2 min |
110.78.146.161 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 88% | 1177 ms | 212 ms | 4 min |
1.0.0.84 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1179 ms | 7 ms | 3 min |
43.159.29.145 | 24059 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 118 ms | 158 ms | 4 min |
68.47.55.241 | 8085 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 89% | 1184 ms | 133 ms | 6 min |
83.143.24.29 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 119 ms | 192 ms | 5 min |
182.53.216.4 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1190 ms | 211 ms | 3 min |
85.172.0.30 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1197 ms | 66 ms | 5 min |
147.182.194.76 | 58189 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1202 ms | 150 ms | 2 min |
115.76.193.192 | 30373 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 47% | 1202 ms | 256 ms | 7 min |
137.59.51.113 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 97% | 1202 ms | 299 ms | 4 min |
80.234.115.149 | 7788 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 53% | 1202 ms | 59 ms | 2 min |
45.70.237.135 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1203 ms | 179 ms | 6 min |
171.243.24.7 | 24914 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 71% | 1209 ms | 242 ms | 4 min |
41.65.227.111 | 1981 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 31% | 1209 ms | 53 ms | 4 min |
46.173.175.166 | 10801 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 121 ms | 63 ms | 22 sec |
184.181.217.210 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1210 ms | 157 ms | 2 min |
119.28.74.177 | 10004 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 1210 ms | 293 ms | 6 min |
103.72.79.65 | 14855 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1213 ms | 139 ms | 5 min |
36.66.151.17 | 4673 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 46% | 1213 ms | 169 ms | 5 min |
5.75.253.73 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1213 ms | 17 ms | 4 min |
5.9.141.151 | 30000 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 122 ms | 17 ms | 8 min |
14.63.1.108 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1249 ms | 277 ms | 6 min |
161.97.181.31 | 43231 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 35% | 125 ms | 6 ms | 7 min |
45.77.244.179 | 22628 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1271 ms | 267 ms | 7 min |
117.20.56.203 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 97% | 1277 ms | 208 ms | 3 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.