Free Proxy Servers List
We provide one of the most extensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available for public use. Thanks to our reliable software, over a million free proxies are scanned and checked daily, allowing us to offer one of the most up-to-date and verified lists of available proxies on the web - completely free of charge.
The list is updated every three minutes. You can use free proxies with any applications, software and web browsers. A convenient filter allows you to select a proxy according to the desired parameters from the list below.
Download proxies through API
Instructions on how to setup Proxy on Windows, Android or iOS
Filtering the proxy list
ip address | port | Username | Password | country | protocols | anonymity | speed | uptime | response | latency | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
62.109.31.192 | 20000 | ******* | ******* | socks5 | elite (HIA) | 363 ms | 100% | 35 ms | 175 ms | 1 min | |
146.19.196.173 | 54337 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4993 ms | 244 ms | 1 min | |
45.77.43.128 | 22036 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 96% | 4417 ms | 236 ms | 1 min | |
195.66.156.196 | 1080 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 100% | 205 ms | 22 ms | 1 min | |
176.31.141.22 | 51327 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 2209 ms | 14 ms | 1 min | |
202.40.188.201 | 4145 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 99% | 240 ms | 193 ms | 1 min | |
54.38.242.224 | 31143 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 92% | 4766 ms | 16 ms | 1 min | |
180.210.222.161 | 1080 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 41% | 4389 ms | 295 ms | 1 min | |
61.7.138.170 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 83% | 4692 ms | 198 ms | 1 min | |
51.77.212.149 | 11584 | ******* | ******* | socks4 | elite (HIA) | 68 ms | 100% | 1800 ms | 10 ms | 1 min | |
1.1.1.177 | 80 | ******* | ******* | socks4 | elite (HIA) | 81 ms | 100% | 1918 ms | 4 ms | 1 min | |
85.206.167.138 | 31951 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3574 ms | 37 ms | 1 min | |
80.54.62.254 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 59% | 1585 ms | 27 ms | 1 min | |
175.100.47.191 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 75% | 4585 ms | 273 ms | 1 min | |
103.130.113.129 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 92% | 3089 ms | 206 ms | 1 min | |
196.216.11.135 | 4673 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 37% | 5000 ms | 228 ms | 1 min | |
110.34.166.179 | 4153 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3107 ms | 154 ms | 1 min | |
103.75.185.134 | 6359 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 65% | 5072 ms | 220 ms | 1 min | |
177.106.0.129 | 3128 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 97% | 4674 ms | 217 ms | 1 min | |
101.109.19.13 | 8080 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 37% | 3271 ms | 191 ms | 1 min | |
129.21.30.116 | 3128 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4373 ms | 93 ms | 1 min | |
81.23.127.90 | 8080 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4906 ms | 48 ms | 1 min | |
46.227.37.113 | 1088 | ******* | ******* | socks4 | elite (HIA) | 77 ms | 100% | 3395 ms | 37 ms | 1 min | |
95.182.78.3 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 1870 ms | 57 ms | 1 min | |
141.94.174.6 | 37876 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4909 ms | 14 ms | 1 min | |
109.169.242.69 | 7788 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 52% | 4401 ms | 61 ms | 1 min | |
75.119.206.18 | 23456 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 75% | 64 ms | 145 ms | 1 min | |
23.225.14.198 | 59774 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 77% | 4786 ms | 154 ms | 1 min | |
115.73.220.114 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 91% | 3594 ms | 235 ms | 1 min | |
89.237.32.65 | 51549 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3876 ms | 72 ms | 1 min |
How does the free proxy list work?
A free proxy list can be useful for tasks that require the use of multiple IP addresses at once, such as bulk actions, increasing browsing, or bypassing request limits set by various online services.
Here is our list of free proxy servers. We collect them from various sources on the Internet, including closed forums and private databases. Since the proxies are provided by third parties, we cannot guarantee their stability or performance.
However, we regularly check and rank this list based on a variety of parameters: ping, type, country, connection speed, anonymity level, and uptime. The current status of each proxy at the time of checking is displayed in the right column.
Proxy list parameters
- Speed
This indicator determines the efficiency of the connection and the speed of loading web pages, which is especially important for web scraping and quick data searches. Proxies with low speed can cause timeouts or incomplete extraction of information.
- Type
Choose HTTP(S) proxies for convenient web browsing, fast file downloads and HTTP requests. For connecting to any IP address and port, UDP support and simplified DNS requests, the SOCKS4/SOCKS5 proxy list is better suited.
- Anonymity
The level of anonymity varies: from proxies that reveal your IP address to those that hide both it and the fact that a proxy is being used. Proxies with a low anonymity level hide your IP but show that a proxy is being used, while those with a higher level can distort the IP and hide its use.
- Response Time
This parameter indicates the time it takes the proxy to transmit your request to the server and receive a response. The lower the response time, the better the performance, which is especially important for real-time applications.
- Uptime
Uptime is the time of uninterrupted operation of the proxy, which reflects the reliability of the server. For stable operation of the proxy, you should choose servers with an uptime of at least 99% to minimize failures and ensure constant availability.
- Authentication
Some proxy servers require authentication via login/password or adding the IP to a whitelist. While this improves security, it can also degrade performance if not implemented properly.
- Usage Limits
Some ISPs may impose limits on the amount of data transferred, the number of simultaneous connections, or access to certain web resources to maintain quality of service and prevent abuse.