Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
172.104.150.246 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3108 ms | 8 ms | 7 min |
170.244.64.198 | 31476 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3206 ms | 214 ms | 6 min |
112.78.161.191 | 8089 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 89% | 329 ms | 170 ms | 3 min |
178.253.200.209 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3311 ms | 29 ms | 6 min |
185.255.134.139 | 4444 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 61% | 3388 ms | 47 ms | 3 min |
115.76.198.49 | 24794 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 67% | 3393 ms | 240 ms | 2 min |
202.159.30.1 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 99% | 3413 ms | 167 ms | 8 min |
168.228.51.197 | 41037 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3491 ms | 158 ms | 6 min |
143.198.229.56 | 63794 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3501 ms | 150 ms | 2 min |
202.159.60.113 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3576 ms | 167 ms | 6 min |
43.153.171.204 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 82% | 3592 ms | 255 ms | 5 min |
170.254.175.209 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 97% | 3600 ms | 172 ms | 5 min |
112.78.170.254 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 95% | 3692 ms | 180 ms | 4 min |
86.71.12.89 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3782 ms | 28 ms | 7 min |
129.205.138.174 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 99% | 3873 ms | 161 ms | 8 min |
207.188.134.194 | 8118 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 90% | 3874 ms | 37 ms | 5 min |
195.67.3.91 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3892 ms | 61 ms | 6 min |
93.40.5.232 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 3979 ms | 40 ms | 2 min |
185.209.220.255 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 4067 ms | 17 ms | 2 min |
91.243.164.214 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 86% | 4079 ms | 119 ms | 3 min |
47.110.59.192 | 9999 | **** |
**** |
|
socks5 | elite (HIA) | 65 ms | 24% | 4081 ms | 253 ms | 6 min |
185.136.150.252 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 4123 ms | 67 ms | 4 min |
103.94.133.91 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 99% | 4166 ms | 174 ms | 7 min |
103.192.76.36 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 97% | 4179 ms | 176 ms | 7 min |
72.194.234.87 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 80% | 4190 ms | 173 ms | 6 min |
74.70.175.180 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 4198 ms | 110 ms | 2 min |
103.210.29.193 | 31433 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 4285 ms | 171 ms | 4 min |
107.173.18.71 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 100% | 4297 ms | 103 ms | 6 min |
1.10.133.77 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 65% | 4384 ms | 199 ms | 6 min |
192.95.29.34 | 54610 | **** |
**** |
|
socks4 | elite (HIA) | 65 ms | 96% | 4388 ms | 93 ms | 7 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.