Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
186.67.94.10 | 999 | **** |
**** |
|
http | transparent (HIA) | 6505 ms | 100% | 5110 ms | 210 ms | 4 min |
171.238.66.124 | 1025 | **** |
**** |
|
http | elite (HIA) | 6583 ms | 100% | 4887 ms | 351 ms | 4 min |
202.159.35.65 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 66 ms | 99% | 3604 ms | 168 ms | 7 min |
66.29.138.168 | 52904 | **** |
**** |
|
socks4 | elite (HIA) | 66 ms | 100% | 3889 ms | 155 ms | 3 min |
167.86.67.134 | 23235 | **** |
**** |
|
socks4 | elite (HIA) | 66 ms | 100% | 4287 ms | 65 ms | 5 min |
103.105.126.18 | 83 | **** |
**** |
|
socks4 | elite (HIA) | 66 ms | 99% | 4414 ms | 145 ms | 6 min |
38.50.130.93 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 66 ms | 98% | 4682 ms | 245 ms | 3 min |
170.81.141.49 | 61437 | **** |
**** |
|
socks4 | elite (HIA) | 66 ms | 100% | 4991 ms | 168 ms | 6 min |
138.201.159.200 | 8118 | **** |
**** |
|
http | elite (HIA) | 6683 ms | 100% | 4899 ms | 59 ms | 4 min |
45.167.126.37 | 999 | **** |
**** |
|
http | transparent (HIA) | 6690 ms | 98% | 3412 ms | 162 ms | 4 min |
51.68.21.244 | 5000 | **** |
**** |
|
socks5 | elite (HIA) | 67 ms | 52% | 1992 ms | 17 ms | 5 min |
8.39.228.209 | 39593 | **** |
**** |
|
socks4 | elite (HIA) | 67 ms | 100% | 4192 ms | 176 ms | 6 min |
72.167.221.36 | 54059 | **** |
**** |
|
socks4 | elite (HIA) | 67 ms | 100% | 4209 ms | 156 ms | 6 min |
45.12.150.82 | 8080 | **** |
**** |
|
http | elite (HIA) | 6705 ms | 82% | 4819 ms | 28 ms | 1 min |
201.147.124.254 | 8111 | **** |
**** |
|
http | anonymous (HIA) | 6778 ms | 100% | 4764 ms | 202 ms | 1 min |
195.69.135.19 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 68 ms | 100% | 3571 ms | 41 ms | 6 min |
68.183.24.193 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 68 ms | 98% | 3773 ms | 99 ms | 5 min |
43.157.23.83 | 11210 | **** |
**** |
|
socks4 | elite (HIA) | 68 ms | 100% | 3805 ms | 7 ms | 3 min |
203.24.108.231 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 68 ms | 100% | 4081 ms | 11 ms | 5 min |
51.77.65.164 | 31979 | **** |
**** |
|
socks4 | elite (HIA) | 68 ms | 100% | 4502 ms | 16 ms | 3 min |
45.65.229.19 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 68 ms | 97% | 4525 ms | 217 ms | 3 min |
177.73.248.26 | 4311 | **** |
**** |
|
socks4 | elite (HIA) | 68 ms | 81% | 4868 ms | 212 ms | 3 min |
134.90.244.107 | 8080 | **** |
**** |
|
http | transparent (HIA) | 6814 ms | 100% | 4982 ms | 48 ms | 9 min |
78.46.225.37 | 19051 | **** |
**** |
|
socks4 | elite (HIA) | 69 ms | 100% | 2999 ms | 15 ms | 3 min |
218.1.142.61 | 57114 | **** |
**** |
|
socks5 | elite (HIA) | 69 ms | 29% | 3011 ms | 245 ms | 5 min |
194.163.176.66 | 63468 | **** |
**** |
|
socks4 | elite (HIA) | 69 ms | 100% | 3083 ms | 61 ms | 3 min |
5.75.249.77 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 69 ms | 98% | 3792 ms | 16 ms | 3 min |
222.129.37.92 | 57114 | **** |
**** |
|
socks4 | elite (HIA) | 69 ms | 87% | 3912 ms | 197 ms | 5 min |
43.156.19.112 | 20357 | **** |
**** |
|
socks4 | elite (HIA) | 69 ms | 100% | 4071 ms | 241 ms | 3 min |
159.192.226.135 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 69 ms | 86% | 4184 ms | 219 ms | 2 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.