Free Proxy Servers List
We provide one of the most extensive lists of free HTTP(S), SOCKS4 and SOCKS5 proxy servers available for public use. Thanks to our reliable software, over a million free proxies are scanned and checked daily, allowing us to offer one of the most up-to-date and verified lists of available proxies on the web - completely free of charge.
The list is updated every three minutes. You can use free proxies with any applications, software and web browsers. A convenient filter allows you to select a proxy according to the desired parameters from the list below.
Download proxies through API
Instructions on how to setup Proxy on Windows, Android or iOS
Filtering the proxy list
| ip address | port | Username | Password | country | protocols | anonymity | speed | uptime | response | latency | updated |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 45.80.110.219 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 3805 ms | 11 ms | 1 ms | |
| 89.237.35.129 | 51549 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4487 ms | 69 ms | 4 ms | |
| 104.27.35.115 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 1619 ms | 7 ms | 6 ms | |
| 110.139.206.93 | 80 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 70% | 3913 ms | 222 ms | 8 ms | |
| 119.18.155.66 | 4153 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 99% | 2598 ms | 171 ms | 11 ms | |
| 205.196.220.122 | 52586 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 77% | 4870 ms | 149 ms | 19 ms | |
| 93.190.138.24 | 20629 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 88% | 4691 ms | 16 ms | 101 ms | |
| 147.185.161.127 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 2392 ms | 11 ms | 105 ms | |
| 99.86.63.31 | 443 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4490 ms | 137 ms | 108 ms | |
| 85.242.190.63 | 5156 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 94% | 4407 ms | 55 ms | 113 ms | |
| 103.220.42.180 | 58456 | ******* | ******* | socks4 | elite (HIA) | 2 ms | 100% | 1570 ms | 118 ms | 119 ms | |
| 104.16.1.33 | 80 | ******* | ******* | http | elite (HIA) | 37 sec | 100% | 2094 ms | 8 ms | 126 ms | |
| 117.5.72.4 | 2109 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 73% | 5093 ms | 259 ms | 130 ms | |
| 185.193.31.51 | 80 | ******* | ******* | http | elite (HIA) | 37 sec | 100% | 4811 ms | 11 ms | 135 ms | |
| 104.21.26.152 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 4989 ms | 11 ms | 138 ms | |
| 207.180.226.58 | 53447 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 62% | 2794 ms | 11 ms | 143 ms | |
| 45.80.110.191 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 4784 ms | 8 ms | 145 ms | |
| 63.141.128.178 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 486 ms | 11 ms | 149 ms | |
| 41.160.238.106 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 91% | 3390 ms | 174 ms | 154 ms | |
| 162.254.38.202 | 47092 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 99% | 1899 ms | 154 ms | 159 ms | |
| 209.141.35.182 | 53667 | ******* | ******* | socks5 | elite (HIA) | 1 ms | 55% | 4308 ms | 147 ms | 168 ms | |
| 118.173.197.241 | 4145 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 99% | 3427 ms | 193 ms | 173 ms | |
| 45.196.151.236 | 5432 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 93% | 4577 ms | 27 ms | 177 ms | |
| 45.80.111.109 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 2932 ms | 13 ms | 179 ms | |
| 103.116.202.241 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 59% | 4685 ms | 165 ms | 184 ms | |
| 104.16.2.29 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 3511 ms | 8 ms | 187 ms | |
| 181.115.17.146 | 8080 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 4427 ms | 152 ms | 193 ms | |
| 115.127.180.90 | 5678 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 83% | 3700 ms | 178 ms | 198 ms | |
| 192.227.152.167 | 3128 | ******* | ******* | socks4 | elite (HIA) | 1 ms | 100% | 3883 ms | 104 ms | 205 ms | |
| 104.21.21.145 | 80 | ******* | ******* | http | elite (HIA) | 35 sec | 100% | 2979 ms | 4 ms | 212 ms |
How does the free proxy list work?
A free proxy list can be useful for tasks that require the use of multiple IP addresses at once, such as bulk actions, increasing browsing, or bypassing request limits set by various online services.
Here is our list of free proxy servers. We collect them from various sources on the Internet, including closed forums and private databases. Since the proxies are provided by third parties, we cannot guarantee their stability or performance.
However, we regularly check and rank this list based on a variety of parameters: ping, type, country, connection speed, anonymity level, and uptime. The current status of each proxy at the time of checking is displayed in the right column.
Proxy list parameters
- Speed
This indicator determines the efficiency of the connection and the speed of loading web pages, which is especially important for web scraping and quick data searches. Proxies with low speed can cause timeouts or incomplete extraction of information.
- Type
Choose HTTP(S) proxies for convenient web browsing, fast file downloads and HTTP requests. For connecting to any IP address and port, UDP support and simplified DNS requests, the SOCKS4/SOCKS5 proxy list is better suited.
- Anonymity
The level of anonymity varies: from proxies that reveal your IP address to those that hide both it and the fact that a proxy is being used. Proxies with a low anonymity level hide your IP but show that a proxy is being used, while those with a higher level can distort the IP and hide its use.
- Response Time
This parameter indicates the time it takes the proxy to transmit your request to the server and receive a response. The lower the response time, the better the performance, which is especially important for real-time applications.
- Uptime
Uptime is the time of uninterrupted operation of the proxy, which reflects the reliability of the server. For stable operation of the proxy, you should choose servers with an uptime of at least 99% to minimize failures and ensure constant availability.
- Authentication
Some proxy servers require authentication via login/password or adding the IP to a whitelist. While this improves security, it can also degrade performance if not implemented properly.
- Usage Limits
Some ISPs may impose limits on the amount of data transferred, the number of simultaneous connections, or access to certain web resources to maintain quality of service and prevent abuse.