Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
72.167.150.151 | 26210 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1381 ms | 209 ms | 7 min |
185.171.54.36 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 95% | 1388 ms | 104 ms | 2 min |
166.62.121.127 | 45248 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1389 ms | 147 ms | 2 min |
103.214.112.68 | 32323 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 96% | 1389 ms | 296 ms | 6 min |
173.0.9.70 | 5653 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 139 ms | 6 ms | 24 sec |
168.100.11.52 | 27925 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 64% | 1392 ms | 62 ms | 21 sec |
75.119.202.247 | 52186 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 74% | 1395 ms | 144 ms | 1 min |
154.159.243.94 | 4673 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 43% | 1395 ms | 178 ms | 2 min |
186.228.235.54 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 92% | 1395 ms | 199 ms | 5 min |
118.193.58.55 | 16291 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1395 ms | 5 ms | 3 min |
223.215.171.51 | 2829 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 34% | 1396 ms | 265 ms | 2 min |
175.106.14.157 | 8899 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 1399 ms | 179 ms | 3 min |
156.253.176.138 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1399 ms | 20 ms | 4 min |
103.142.110.202 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 34% | 1399 ms | 250 ms | 5 min |
94.232.244.19 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1401 ms | 16 ms | 3 min |
210.117.88.137 | 8081 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 61% | 1402 ms | 234 ms | 7 min |
122.248.38.4 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1405 ms | 197 ms | 7 min |
116.40.190.175 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1415 ms | 292 ms | 5 min |
190.144.167.178 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1417 ms | 161 ms | 3 min |
115.72.160.36 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 73% | 1418 ms | 279 ms | 3 min |
45.231.30.254 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 52% | 1420 ms | 232 ms | 5 min |
162.191.102.2 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 97% | 1421 ms | 168 ms | 5 min |
116.99.224.60 | 30166 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 59% | 1422 ms | 265 ms | 2 min |
121.101.186.201 | 43296 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 93% | 1423 ms | 205 ms | 5 min |
93.188.161.84 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1426 ms | 114 ms | 6 min |
176.126.136.74 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 95% | 1430 ms | 44 ms | 5 min |
110.42.246.153 | 2080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 62% | 1437 ms | 230 ms | 2 min |
147.139.199.251 | 61524 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 144 ms | 168 ms | 3 min |
31.6.26.113 | 3128 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 92% | 146 ms | 7 ms | 1 min |
153.121.90.184 | 3389 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1465 ms | 242 ms | 3 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.