Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
202.53.172.75 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 53% | 1278 ms | 196 ms | 7 min |
47.242.15.120 | 15673 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 97% | 1278 ms | 300 ms | 3 min |
43.157.52.37 | 443 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 39% | 1281 ms | 4 ms | 6 min |
103.94.133.90 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1282 ms | 172 ms | 5 min |
27.72.148.253 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 1282 ms | 257 ms | 4 min |
186.251.255.113 | 31337 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1287 ms | 207 ms | 4 min |
72.167.221.157 | 64742 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1288 ms | 141 ms | 4 min |
162.240.147.141 | 46449 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1293 ms | 133 ms | 4 min |
88.99.138.21 | 5606 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 99% | 1293 ms | 9 ms | 3 min |
154.12.253.232 | 40616 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1294 ms | 102 ms | 7 min |
103.70.159.156 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1294 ms | 140 ms | 4 min |
200.85.137.1 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1294 ms | 281 ms | 6 min |
190.90.100.233 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 88% | 1297 ms | 178 ms | 5 min |
200.24.154.147 | 999 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1300 ms | 188 ms | 3 min |
88.20.124.158 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 93% | 1300 ms | 40 ms | 6 min |
160.226.237.187 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1303 ms | 183 ms | 8 min |
103.220.42.180 | 58456 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1305 ms | 146 ms | 3 min |
185.25.119.15 | 13959 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 88% | 1305 ms | 35 ms | 7 min |
91.190.187.72 | 55264 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 63% | 1306 ms | 103 ms | 6 min |
31.210.52.133 | 29242 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 48% | 1306 ms | 40 ms | 5 min |
207.180.207.12 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 47% | 131 ms | 9 ms | 6 min |
113.160.203.118 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1311 ms | 211 ms | 5 min |
170.106.117.131 | 9448 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1312 ms | 146 ms | 3 min |
103.86.1.22 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1317 ms | 165 ms | 5 min |
195.74.72.111 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 93% | 133 ms | 37 ms | 3 min |
38.57.3.39 | 42997 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 134 ms | 134 ms | 5 min |
202.159.35.97 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1367 ms | 164 ms | 6 min |
168.205.217.41 | 4145 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 83% | 137 ms | 228 ms | 4 min |
43.134.230.127 | 443 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 77% | 1379 ms | 237 ms | 4 min |
61.7.183.32 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 92% | 1380 ms | 206 ms | 3 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.