Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
42.62.2.68 | 80 | **** |
**** |
|
http | elite (HIA) | 7382 ms | 100% | 4300 ms | 213 ms | 3 min |
93.127.215.97 | 80 | **** |
**** |
|
http | elite (HIA) | 7392 ms | 100% | 1892 ms | 91 ms | 7 min |
95.139.129.9 | 80 | **** |
**** |
|
socks5 | elite (HIA) | 74 ms | 50% | 4312 ms | 52 ms | 5 min |
94.158.218.99 | 3128 | **** |
**** |
|
http | transparent (HIA) | 7481 ms | 100% | 4880 ms | 36 ms | 5 min |
185.105.102.189 | 80 | **** |
**** |
|
http | elite (HIA) | 7490 ms | 99% | 1187 ms | 88 ms | 2 min |
37.232.13.2 | 8080 | **** |
**** |
|
http | transparent (HIA) | 7497 ms | 100% | 4998 ms | 70 ms | 2 sec |
5.8.240.92 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 75 ms | 100% | 4098 ms | 71 ms | 6 min |
8.222.235.39 | 3128 | **** |
**** |
|
http | transparent (HIA) | 7504 ms | 82% | 3220 ms | 246 ms | 2 sec |
119.156.195.173 | 3128 | **** |
**** |
|
http | elite (HIA) | 7585 ms | 100% | 3884 ms | 131 ms | 5 min |
45.171.64.19 | 999 | **** |
**** |
|
http | transparent (HIA) | 7595 ms | 100% | 2698 ms | 140 ms | 6 min |
37.59.213.49 | 43770 | **** |
**** |
|
socks4 | elite (HIA) | 76 ms | 92% | 4093 ms | 10 ms | 6 min |
61.7.138.170 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 76 ms | 83% | 4692 ms | 200 ms | 3 min |
218.1.142.116 | 57114 | **** |
**** |
|
socks5 | elite (HIA) | 76 ms | 29% | 4993 ms | 218 ms | 3 min |
156.200.116.73 | 1981 | **** |
**** |
|
http | transparent (HIA) | 7600 ms | 86% | 4465 ms | 60 ms | 7 min |
38.156.73.36 | 8085 | **** |
**** |
|
http | transparent (HIA) | 7600 ms | 100% | 4485 ms | 57 ms | 6 min |
38.54.71.67 | 80 | **** |
**** |
|
http | elite (HIA) | 7691 ms | 36% | 4833 ms | 168 ms | 3 min |
222.95.242.184 | 4134 | **** |
**** |
|
socks5 | elite (HIA) | 77 ms | 55% | 1289 ms | 227 ms | 7 sec |
84.244.69.29 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 77 ms | 100% | 3715 ms | 20 ms | 20 sec |
159.89.163.18 | 23196 | **** |
**** |
|
socks4 | elite (HIA) | 77 ms | 76% | 4098 ms | 148 ms | 4 min |
212.69.128.72 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 77 ms | 90% | 4976 ms | 25 ms | 4 min |
162.214.165.203 | 80 | **** |
**** |
|
http | elite (HIA) | 7703 ms | 100% | 4572 ms | 135 ms | 9 min |
103.125.16.101 | 8080 | **** |
**** |
|
http | anonymous (HIA) | 7703 ms | 99% | 5263 ms | 170 ms | 2 min |
175.42.33.136 | 8119 | **** |
**** |
|
http | elite (HIA) | 7710 ms | 100% | 4316 ms | 205 ms | 7 min |
222.127.103.129 | 8080 | **** |
**** |
|
http | transparent (HIA) | 7725 ms | 100% | 4804 ms | 211 ms | 6 min |
103.216.48.124 | 8080 | **** |
**** |
|
http | transparent (HIA) | 777 ms | 100% | 4484 ms | 187 ms | 3 min |
34.135.166.24 | 80 | **** |
**** |
|
http | elite (HIA) | 7788 ms | 100% | 57 ms | 126 ms | 3 min |
147.182.180.242 | 80 | **** |
**** |
|
http | elite (HIA) | 7805 ms | 100% | 4480 ms | 89 ms | 9 min |
138.59.227.248 | 999 | **** |
**** |
|
http | transparent (HIA) | 7809 ms | 98% | 4593 ms | 197 ms | 6 min |
2.180.31.98 | 8035 | **** |
**** |
|
http | transparent (HIA) | 7829 ms | 100% | 4800 ms | 89 ms | 3 min |
38.52.208.43 | 999 | **** |
**** |
|
http | transparent (HIA) | 7884 ms | 100% | 4830 ms | 143 ms | 2 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.