Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
103.56.206.65 | 4996 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 44% | 1475 ms | 189 ms | 7 min |
138.201.248.43 | 31043 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 96% | 1476 ms | 12 ms | 8 min |
178.44.194.144 | 7788 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 53% | 1476 ms | 72 ms | 5 min |
37.221.67.62 | 5555 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 89% | 1478 ms | 39 ms | 5 min |
180.210.222.221 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 38% | 1482 ms | 284 ms | 2 min |
94.130.73.18 | 1352 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 15% | 1484 ms | 8 ms | 50 sec |
31.42.184.144 | 57752 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1485 ms | 39 ms | 3 min |
45.235.151.50 | 3629 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1488 ms | 221 ms | 2 min |
202.154.187.17 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 149 ms | 176 ms | 4 min |
38.127.179.16 | 55994 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 1494 ms | 84 ms | 5 min |
190.92.159.203 | 34564 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 94% | 1494 ms | 95 ms | 6 min |
38.83.108.89 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1495 ms | 119 ms | 7 min |
139.59.99.83 | 80 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 99% | 1495 ms | 155 ms | 8 min |
38.57.3.41 | 11493 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 99% | 1496 ms | 124 ms | 6 min |
93.190.139.54 | 34337 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 89% | 1498 ms | 20 ms | 5 min |
113.140.74.26 | 8000 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 90% | 150 ms | 259 ms | 5 min |
182.253.246.213 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1500 ms | 174 ms | 6 min |
37.221.161.2 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1503 ms | 33 ms | 8 min |
189.106.62.102 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 90% | 1504 ms | 179 ms | 26 sec |
171.254.1.221 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 62% | 1504 ms | 265 ms | 8 min |
192.111.137.34 | 18765 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1506 ms | 210 ms | 6 min |
171.228.188.56 | 5104 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1506 ms | 253 ms | 4 min |
103.82.37.232 | 21790 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 1507 ms | 290 ms | 6 min |
192.210.239.169 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1509 ms | 97 ms | 5 min |
36.255.104.1 | 13623 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1512 ms | 170 ms | 5 min |
159.203.41.116 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1513 ms | 101 ms | 4 min |
119.18.152.139 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 94% | 1517 ms | 183 ms | 2 min |
201.159.15.133 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1518 ms | 246 ms | 6 min |
142.4.207.10 | 48012 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 63% | 1521 ms | 101 ms | 5 min |
103.23.237.71 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 58% | 1521 ms | 157 ms | 7 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.