Free Proxy Server Summary
We offer one of the most comprehensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available to the public. Thanks to our reliable software, over a million free proxies are scanned and checked every day, allowing us to offer one of the most up-to-date and verified proxy lists available on the web - completely free of charge.
The list is updated every three minutes. You can use the free proxy with any application, software and web browser. Convenient filters allow you to select a proxy from the following list based on the required parameters.
IP Address | Port | Username | Password | Country | Protocols | Anonymity | Speed | Uptime | Response | Latency | Updated |
---|---|---|---|---|---|---|---|---|---|---|---|
46.227.37.61 | 1088 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 162 ms | 37 ms | 3 min |
5.189.130.215 | 30211 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 88% | 1620 ms | 8 ms | 7 min |
103.245.109.131 | 1088 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 89% | 1622 ms | 196 ms | 1 min |
36.255.86.170 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 20% | 1623 ms | 157 ms | 3 min |
49.128.199.163 | 50100 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 76% | 1626 ms | 274 ms | 3 min |
43.252.236.114 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1666 ms | 285 ms | 1 min |
79.141.173.165 | 3128 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 56% | 1669 ms | 119 ms | 9 min |
101.51.104.95 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 42% | 1669 ms | 192 ms | 2 min |
194.113.104.148 | 3600 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1675 ms | 45 ms | 6 min |
45.196.151.59 | 5432 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 97% | 1687 ms | 103 ms | 4 min |
202.159.107.137 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1689 ms | 169 ms | 3 min |
103.109.56.97 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 39% | 1691 ms | 273 ms | 2 min |
50.96.204.3 | 18351 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1694 ms | 121 ms | 4 min |
177.223.238.20 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1696 ms | 213 ms | 7 min |
195.225.49.138 | 55774 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1696 ms | 38 ms | 1 min |
142.44.241.192 | 7497 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 100% | 1696 ms | 95 ms | 4 min |
104.20.198.49 | 80 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1698 ms | 11 ms | 50 sec |
197.234.13.97 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1698 ms | 126 ms | 6 min |
103.106.241.153 | 1080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 77% | 1699 ms | 163 ms | 3 min |
138.97.2.198 | 4145 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 79% | 1699 ms | 217 ms | 4 min |
139.162.100.214 | 18199 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 99% | 1699 ms | 250 ms | 3 min |
38.150.14.244 | 1234 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 94% | 170 ms | 304 ms | 2 min |
200.152.107.102 | 1080 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 98% | 1701 ms | 214 ms | 3 min |
83.235.22.245 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1703 ms | 51 ms | 5 min |
93.190.140.109 | 25935 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1705 ms | 17 ms | 8 min |
45.7.210.199 | 4153 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1707 ms | 251 ms | 4 min |
159.223.118.43 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 96% | 1707 ms | 94 ms | 5 min |
115.144.67.215 | 12925 | **** |
**** |
|
socks5 | elite (HIA) | 1 ms | 74% | 1711 ms | 269 ms | 3 min |
103.112.234.97 | 5678 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1713 ms | 166 ms | 5 min |
190.14.213.250 | 8080 | **** |
**** |
|
socks4 | elite (HIA) | 1 ms | 100% | 1714 ms | 154 ms | 4 min |
Free Proxy Lists: How They Work and How to Choose
Free proxy lists provide a quick way to switch IP addresses, suitable for bulk operations, data crawling, bypassing request restrictions, or accessing geo-blocked content. However, since these proxies are usually provided by third parties, their stability, speed, and security vary, so reasonable screening is essential.
Core parameters of proxy list
-
- Response time (Ping)
- Measures the speed at which a proxy server processes requests, which directly affects the user experience. Proxies with low latency (usually <100ms) are suitable for real-time operations, such as automated tasks or web browsing.
-
- Proxy Type
- HTTP(S) proxy: suitable for basic HTTP requests such as web page access and file download.
- SOCKS4/SOCKS5 proxy: supports a wider range of protocols (such as UDP), suitable for P2P connections or scenarios that need to bypass strict firewalls.
-
- Anonymity level
- Transparent proxy: does not hide the real IP, only used for caching or access control.
- Ordinary anonymous proxy: hides the user's IP, but may still expose traces of proxy use.
- Elite: Completely hides IP and proxy usage records, suitable for privacy-sensitive tasks.
-
- Speed and Bandwidth
- Free proxies often have limited bandwidth, which can cause slow connections or timeouts, so high-speed proxies are better for data-intensive tasks like scraping.
-
- Uptime
- The stability of the proxy server is crucial. Proxies with an uptime below 99% may frequently go offline, affecting long-term tasks.
-
- Authentication method
- Some proxies require username/password or IP whitelist verification, which increases security but may also reduce convenience.
Limitations of Free Proxies
- Short-term tasks:Such as temporarily accessing blocked websites or testing IP switching.
- Low risk operation:Such as anonymous browsing (avoid logging into sensitive accounts).
- Study and Research:Learn about proxy technology and test different protocols and anonymity levels.
Suggestion
If the task involves sensitive data (such as account login, financial operations), it is recommended to use a paid VPN or private proxy instead of relying on free solutions. Free proxies are more suitable for non-critical purposes, and it is recommended to use them with firewalls and HTTPS connections to reduce security risks.
Free proxy lists are a useful tool that should be used with caution. Proper screening of parameters (such as speed, anonymity, and uptime) can increase the success rate, but long-term or high-security tasks still require more reliable solutions.