Free Proxy Servers List
We provide one of the most extensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available for public use. Thanks to our reliable software, over a million free proxies are scanned and checked daily, allowing us to offer one of the most up-to-date and verified lists of available proxies on the web - completely free of charge.
The list is updated every three minutes. You can use free proxies with any applications, software and web browsers. A convenient filter allows you to select a proxy according to the desired parameters from the list below.
Download proxies through API
Instructions on how to setup Proxy on Windows, Android or iOS
Filtering the proxy list
ip address | port | Username | Password | country | protocols | anonymity | speed | uptime | response | latency | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
62.109.31.192 | 20000 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 100% | 35 ms | 45 ms | 2 min | |
163.5.138.179 | 3128 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 32% | 590 ms | 14 ms | 2 min | |
188.40.94.107 | 14503 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 88% | 4510 ms | 19 ms | 2 min | |
103.220.42.180 | 58456 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4681 ms | 155 ms | 2 min | |
81.12.104.38 | 3629 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 93% | 3420 ms | 80 ms | 2 min | |
69.163.160.228 | 23787 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 66% | 693 ms | 144 ms | 2 min | |
195.209.188.101 | 58543 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3412 ms | 41 ms | 2 min | |
101.109.27.239 | 4145 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 44% | 428 ms | 185 ms | 2 min | |
103.14.20.225 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 66% | 1532 ms | 182 ms | 2 min | |
103.212.93.201 | 45639 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3421 ms | 155 ms | 2 min | |
156.239.38.108 | 3128 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4116 ms | 152 ms | 2 min | |
188.40.137.106 | 6969 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3798 ms | 22 ms | 2 min | |
85.142.68.26 | 8100 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3172 ms | 147 ms | 2 min | |
37.27.32.80 | 80 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3795 ms | 27 ms | 2 min | |
104.18.41.123 | 2096 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3091 ms | 4 ms | 2 min | |
103.79.96.194 | 4153 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3307 ms | 170 ms | 2 min | |
178.254.61.31 | 35596 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 2398 ms | 4 ms | 2 min | |
123.108.98.89 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 97% | 4892 ms | 178 ms | 2 min | |
91.121.217.157 | 61246 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4984 ms | 12 ms | 2 min | |
125.87.83.138 | 2324 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 36% | 3404 ms | 255 ms | 2 min | |
35.244.181.58 | 80 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4000 ms | 7 ms | 2 min | |
188.9.213.6 | 8080 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3514 ms | 23 ms | 2 min | |
119.18.158.131 | 4153 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 99% | 4099 ms | 171 ms | 2 min | |
203.24.103.134 | 80 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4401 ms | 4 ms | 2 min | |
118.193.58.234 | 19179 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3607 ms | 10 ms | 2 min | |
103.77.60.22 | 53281 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 98% | 2106 ms | 268 ms | 2 min | |
132.255.109.226 | 4153 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 99% | 3992 ms | 233 ms | 2 min | |
93.190.137.117 | 11435 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 63% | 4098 ms | 15 ms | 2 min | |
49.12.148.201 | 60394 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 79% | 2718 ms | 24 ms | 2 min | |
103.23.41.110 | 30058 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 98% | 4889 ms | 427 ms | 2 min |
How does the free proxy list work?
A free proxy list can be useful for tasks that require the use of multiple IP addresses at once, such as bulk actions, increasing browsing, or bypassing request limits set by various online services.
Here is our list of free proxy servers. We collect them from various sources on the Internet, including closed forums and private databases. Since the proxies are provided by third parties, we cannot guarantee their stability or performance.
However, we regularly check and rank this list based on a variety of parameters: ping, type, country, connection speed, anonymity level, and uptime. The current status of each proxy at the time of checking is displayed in the right column.
Proxy list parameters
- Speed
This indicator determines the efficiency of the connection and the speed of loading web pages, which is especially important for web scraping and quick data searches. Proxies with low speed can cause timeouts or incomplete extraction of information.
- Type
Choose HTTP(S) proxies for convenient web browsing, fast file downloads and HTTP requests. For connecting to any IP address and port, UDP support and simplified DNS requests, the SOCKS4/SOCKS5 proxy list is better suited.
- Anonymity
The level of anonymity varies: from proxies that reveal your IP address to those that hide both it and the fact that a proxy is being used. Proxies with a low anonymity level hide your IP but show that a proxy is being used, while those with a higher level can distort the IP and hide its use.
- Response Time
This parameter indicates the time it takes the proxy to transmit your request to the server and receive a response. The lower the response time, the better the performance, which is especially important for real-time applications.
- Uptime
Uptime is the time of uninterrupted operation of the proxy, which reflects the reliability of the server. For stable operation of the proxy, you should choose servers with an uptime of at least 99% to minimize failures and ensure constant availability.
- Authentication
Some proxy servers require authentication via login/password or adding the IP to a whitelist. While this improves security, it can also degrade performance if not implemented properly.
- Usage Limits
Some ISPs may impose limits on the amount of data transferred, the number of simultaneous connections, or access to certain web resources to maintain quality of service and prevent abuse.