Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
204.216.152.229 | 3128 | **** |
**** |
|
http | transparent (HIA) | 8519 ms | 100% | 4917 ms | 205 ms | 7 min |
189.36.129.185 | 8080 | **** |
**** |
|
http | transparent (HIA) | 8520 ms | 100% | 4173 ms | 217 ms | 8 min |
208.87.243.199 | 7878 | **** |
**** |
|
http | transparent (HIA) | 8523 ms | 100% | 4880 ms | 143 ms | 8 min |
110.38.226.139 | 8080 | **** |
**** |
|
http | transparent (HIA) | 8572 ms | 100% | 4494 ms | 141 ms | 48 sec |
119.93.33.130 | 8082 | **** |
**** |
|
http | transparent (HIA) | 8578 ms | 100% | 4017 ms | 268 ms | 48 sec |
200.121.48.195 | 999 | **** |
**** |
|
http | transparent (HIA) | 8586 ms | 100% | 4801 ms | 187 ms | 4 min |
186.113.232.105 | 8080 | **** |
**** |
|
http | transparent (HIA) | 8592 ms | 100% | 2283 ms | 179 ms | 5 min |
45.142.193.35 | 12132 | **** |
**** |
|
socks4 | elite (HIA) | 86 ms | 60% | 4096 ms | 11 ms | 6 min |
194.186.248.97 | 80 | **** |
**** |
|
http | transparent (HIA) | 8602 ms | 100% | 2115 ms | 130 ms | 7 min |
58.69.161.62 | 8082 | **** |
**** |
|
http | transparent (HIA) | 861 ms | 99% | 41 ms | 229 ms | 3 min |
217.160.221.48 | 3128 | **** |
**** |
|
http | transparent (HIA) | 8675 ms | 100% | 4691 ms | 8 ms | 7 min |
188.127.237.101 | 49160 | **** |
**** |
|
http | elite (HIA) | 8691 ms | 100% | 1169 ms | 47 ms | 2 min |
196.1.93.16 | 80 | **** |
**** |
|
http | elite (HIA) | 8698 ms | 100% | 4683 ms | 75 ms | 4 min |
115.76.200.20 | 30870 | **** |
**** |
|
socks4 | elite (HIA) | 87 ms | 58% | 3796 ms | 249 ms | 1 min |
49.70.172.243 | 2324 | **** |
**** |
|
http | elite (HIA) | 8719 ms | 100% | 69 ms | 238 ms | 47 sec |
171.233.50.223 | 8080 | **** |
**** |
|
http | elite (HIA) | 8721 ms | 100% | 52 ms | 338 ms | 8 min |
67.43.228.251 | 4011 | **** |
**** |
|
http | elite (HIA) | 8776 ms | 100% | 3525 ms | 93 ms | 3 min |
131.100.51.146 | 999 | **** |
**** |
|
http | transparent (HIA) | 8795 ms | 100% | 4801 ms | 193 ms | 8 min |
185.203.220.16 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 88 ms | 98% | 4002 ms | 40 ms | 2 min |
128.199.114.180 | 7497 | **** |
**** |
|
socks5 | elite (HIA) | 88 ms | 25% | 4967 ms | 177 ms | 7 min |
54.38.181.125 | 80 | **** |
**** |
|
http | anonymous (HIA) | 8808 ms | 100% | 3101 ms | 11 ms | 3 min |
177.234.217.82 | 999 | **** |
**** |
|
http | transparent (HIA) | 8897 ms | 100% | 4490 ms | 191 ms | 6 min |
80.234.85.2 | 7788 | **** |
**** |
|
socks5 | elite (HIA) | 89 ms | 51% | 4192 ms | 55 ms | 3 min |
95.128.142.76 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 89 ms | 75% | 4293 ms | 87 ms | 7 min |
202.51.124.166 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 89 ms | 98% | 4890 ms | 173 ms | 5 min |
201.77.96.0 | 999 | **** |
**** |
|
http | transparent (HIA) | 8900 ms | 100% | 4006 ms | 139 ms | 38 sec |
14.234.219.189 | 4002 | **** |
**** |
|
http | elite (HIA) | 8903 ms | 100% | 4879 ms | 203 ms | 7 min |
87.255.196.143 | 80 | **** |
**** |
|
http | elite (HIA) | 8905 ms | 100% | 38 ms | 109 ms | 7 min |
146.70.116.28 | 4857 | **** |
**** |
|
http | elite (HIA) | 8908 ms | 98% | 114 ms | 19 ms | 2 min |
14.224.165.146 | 2767 | **** |
**** |
|
http | elite (HIA) | 8977 ms | 61% | 3606 ms | 211 ms | 2 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.