Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
165.22.52.130 | 8000 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 64% | 1523 ms | 155 ms | 5 min |
206.189.9.30 | 42331 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 1525 ms | 15 ms | 7 min |
23.19.250.89 | 1337 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 154 ms | 140 ms | 3 min |
147.45.43.159 | 34006 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 154 ms | 8 ms | 3 min |
70.166.167.55 | 57745 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 98% | 155 ms | 155 ms | 3 min |
89.237.33.1 | 51549 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1572 ms | 70 ms | 2 min |
103.112.234.113 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1574 ms | 164 ms | 5 min |
72.167.221.145 | 11320 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1576 ms | 207 ms | 4 min |
195.201.147.185 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1583 ms | 21 ms | 2 min |
162.240.58.147 | 36022 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1584 ms | 133 ms | 3 min |
176.236.163.34 | 59311 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1584 ms | 59 ms | 6 min |
80.54.62.254 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 58% | 1585 ms | 27 ms | 5 min |
177.128.44.129 | 31337 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1589 ms | 240 ms | 6 min |
209.126.4.217 | 39757 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1591 ms | 103 ms | 5 min |
104.129.206.65 | 8800 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 1591 ms | 105 ms | 5 min |
121.126.103.107 | 5288 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1595 ms | 272 ms | 7 min |
117.26.40.156 | 2829 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 64% | 1597 ms | 234 ms | 2 min |
116.105.64.35 | 5020 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 67% | 1598 ms | 272 ms | 3 min |
95.216.201.74 | 1080 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 160 ms | 39 ms | 6 min |
110.78.148.87 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 82% | 1600 ms | 207 ms | 3 min |
177.128.120.85 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1602 ms | 249 ms | 5 min |
184.174.72.235 | 51724 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1605 ms | 149 ms | 5 min |
103.206.225.133 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 35% | 1606 ms | 161 ms | 6 min |
190.0.15.18 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1609 ms | 158 ms | 5 min |
116.118.48.140 | 33739 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 67% | 1609 ms | 227 ms | 4 min |
149.20.253.100 | 12551 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 161 ms | 107 ms | 4 min |
123.49.2.110 | 58551 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 94% | 1612 ms | 181 ms | 4 min |
147.182.138.62 | 28434 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 15% | 1615 ms | 93 ms | 7 min |
103.12.246.105 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1616 ms | 163 ms | 5 min |
204.98.164.243 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1618 ms | 147 ms | 5 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.