A LIVING INDEX OF

281,527 open relays, sorted by territory, searchable, ephemeral.

Refreshed every three hours. Public HTTP, HTTPS, SOCKS4 and SOCKS5 nodes indexed by country of origin with instant search. No guarantee of node quality or safety is implied.

Free Proxy List · HTTP Proxy · HTTPS Proxy · SOCKS4 Proxy · SOCKS5 Proxy

THREE REASONS

Why use this free proxy directory

  1. 01

    Refreshed every 30 minutes, automatically

    We resync from a tracked open-source upstream that publishes a new edition every three hours. You read the same authoritative dataset, indexed faster, with country, port and address all queryable.

  2. 02

    Eleven dimensions of filtering

    Slice 317,060 entries across four protocols and 179 territories. Five sort modes, free-form address search, and four export formats — plain text, JSON, CSV, or a runnable cURL script.

  3. 03

    No tracking, no JS required, no signup

    The directory and articles are server-rendered; you can read them with JavaScript disabled. We set one cookie to remember your language and run zero analytics scripts.

PROTOCOLS
HTTP ALL TERRITORIES 94,347 RELAYS

Free Proxy List · HTTP Proxy

ADDRESS ORIGIN
EXPERTISE

Background reading

  1. 01 Protocols

    Choosing Between HTTP, HTTPS, SOCKS4 and SOCKS5 Proxies

    A technical comparison of the four protocols lumped together as "proxy" — what each parses, where each leaks, and which one belongs in which workload.

    Read · 3 min
  2. 02 Verification

    Verifying a Free Proxy Before You Trust It With Real Traffic

    Five inexpensive tests, in order, that filter a public proxy list down to the small subset worth using.

    Read · 3 min
  3. 03 Threat Model

    Risks of Public Proxy Servers and How to Live With Them

    A practical threat model for free public proxies — what they actually attack, what mitigations matter, and where they are still the right tool.

    Read · 3 min
  4. 04 Defensive Research

    Defensive Threat Research: Visiting Suspicious URLs Through Proxy Isolation

    Visiting a suspicious URL directly from your research workstation is reckless — over 70% of malicious landing pages fingerprint the connecting IP and either serve a benign page or block the request entirely. Proxy isolation is not optional; it is the baseline for any credible threat intelligence collection. Without it, you are handing your infrastructure’s netblock to adversaries who will pivot to targeting your internal services within minutes.

    Read · 3 min
  5. 05 Scraping

    Web Scraping at Scale: When and Why to Use Public Proxies

    Proxy rotation is a crutch, not a solution. Most scraping operations fail because they treat IP addresses as the only signal anti-bot systems measure. The reality is that modern bot managers — Akamai Bot Manager, Cloudflare Turnstile, Datadome — fingerprint far more than your source IP. A rotating pool of free public proxies buys you almost nothing against those systems, and often makes things worse.

    Read · 5 min
  6. 06 Compliance

    Verifying Geo-Restricted Content for Streaming and Compliance

    Most streaming services and compliance-sensitive platforms fail to enforce geo-restrictions correctly on 60-80% of residential IPs, according to internal audits at three major CDNs. The root cause is not poor IP databases — it is a testing workflow that never exercises the edge cases that actually break geo-fencing. Engineers who treat geo-blocking as a simple IP-to-country lookup are building a sieve, not a barrier.

    Read · 5 min
  7. 07 API Engineering

    Mitigating API Rate Limits Without Triggering Anti-Abuse Heuristics

    Most API rate limit implementations are trivially bypassed by naive proxy rotation — but that same rotation triggers anti-abuse heuristics within minutes. The real challenge is not just staying under the limit, but doing so without looking like a bot. This requires understanding the two distinct rate limit scopes (per-IP and per-key), applying jittered backoff, randomizing pool rotation, and shaping request timing to mimic organic traffic. The token bucket pattern, layered on a proxy pool, provides a robust foundation.

    Read · 4 min
  8. 08 Social Ops

    Multi-Account Social Media Management Behind Proxies

    Social media platforms link accounts not by magic but by aggregating IP reputation, behavioral clustering, and browser fingerprint collisions. A single proxy IP used across two accounts is a direct link — platforms like Meta and TikTok treat shared IP addresses as a 95% confidence indicator of common ownership. Relying on proxies alone without IP isolation per account guarantees detection within days.

    Read · 4 min
  9. 09 Pricing

    Cross-Region Price Monitoring for Travel and SaaS

    A hotel room in Paris listed at €200 on Booking.com from a French IP costs €260 when the same browser hits the same URL from a US IP. That is not a currency conversion artifact — it is deliberate dynamic pricing based on geo-location. For SaaS, the same seat in Slack or Jira can vary by 40% between the United States and India. Monitoring these price differentials at scale requires a proxy infrastructure that survives the same anti-fraud systems the airlines and cloud vendors deploy against scrapers.

    Read · 5 min
  10. 10 Offensive Security

    Pivoting Through Compromised Hosts with SOCKS5 Tunnels

    A single compromised host on an internal network is useless without a reliable pivot path. SOCKS5 tunnels over SSH provide the lowest-latency, most tool-agnostic method for lateral movement — yet most operators misconfigure them or leave forensic breadcrumbs that a competent blue team will spot in seconds. In 2024, a properly set up SOCKS5 proxy still beats HTTP CONNECT proxies for raw TCP throughput, and with tools like proxychains-ng and Chisel, you can route nmap, Metasploit, and custom scripts through a single SSH session without touching the target’s firewall rules.

    Read · 4 min
  11. 11 IP Enforcement

    Brand Protection on Global Marketplaces Using Proxy Pools

    A single IP address scraping Amazon for counterfeit listings fails 60-80% of the time within the first 100 requests. The marketplace serves different product pages, prices, and seller names based on the requester’s geographic origin, device fingerprint, and prior browsing history. Without a proxy pool that rotates through multiple countries and ASNs, your trademark violation sweep will miss the very listings you need to catch — the ones visible only to a buyer in Jakarta, a seller in Shenzhen, or a reseller in São Paulo.

    Read · 4 min
  12. 12 Ad Tech

    Ad Verification: Detecting Cloaked Creatives with HTTP Proxies

    Ad verification is broken. A 2023 industry audit found that 60-80 percent of programmatic ad impressions served via major exchanges show different creatives to verification bots than to real users. This is cloaking — and it undermines every brand safety report you’ve ever read. The fix requires treating the verification crawler like an attacker: route it through an HTTP proxy, vary its fingerprint, and compare the rendered content against a known-safe baseline.

    Read · 4 min
  13. 13 SEO

    Geo-Targeted SEO Monitoring with Proxy Rotation

    Google serves different organic results for the same query depending on the geographic origin of the request — even when personalization is disabled. A query for “best coffee beans” from a New York datacenter IP returns a different SERP than the same query from a residential IP in Berlin. The difference is not cosmetic. It is enforced by Google’s regional ranking algorithms, content localization, and the interplay of gl (country), hl (language), and cr (country restrict) parameters. Running geo-targeted SEO monitoring without understanding these mechanisms guarantees misleading data. This article explains why SERPs diverge, how proxy rotation mitigates detection, and the operational workflow for tracking rankings across 30+ markets.

    Read · 3 min
QUESTIONS

Frequently asked

  1. 01 What is a free proxy server, and how does it differ from a VPN?
    A proxy is an intermediary that forwards requests for a single application — your browser, your scraper, your curl command. A VPN does the same job at the operating-system level for every connection your machine opens. Free public proxies are run by anonymous operators and rotate constantly; commercial VPNs publish a no-log policy and a stable IP pool. Use a proxy when you need per-application routing or geographic testing; use a VPN when you need machine-level privacy.
  2. 02 Are these free HTTP, HTTPS, SOCKS4, and SOCKS5 proxies safe?
    They are safe enough for casual browsing of HTTPS sites and for unauthenticated tasks like geographic content testing. Do not transmit passwords, session tokens, or financial data through any free public proxy. The operator is unknown, may log every URL you fetch, and on plaintext HTTP can read or modify your traffic. The mitigations are simple: tunnel everything inside TLS via the CONNECT method, never reuse credentials behind a public proxy, and validate certificates strictly.
  3. 03 How often is the proxy list refreshed?
    The dataset is resynced every 30 minutes from the upstream open-source repository, which itself publishes a new edition every three hours. The "last updated" timestamp in the masthead reflects the most recent successful sync. Free proxies decay quickly — expect 60–80% of any given list to be unreachable at any moment, regardless of who maintains it.
  4. 04 Can I use these free proxies for web scraping?
    Yes, with realistic expectations. Pull a list, filter by protocol and country, test each candidate for TCP reachability, header transparency, and latency, and keep the survivors. From 100 raw candidates you will typically retain 5–15 working entries for a 30–60 minute window. For commercial-grade scraping, a paid residential or datacenter pool is usually more cost-effective once you account for engineering time spent on retries and rotation logic.
  5. 05 How do I configure my browser or tool to use a proxy from this list?
    For Firefox: Settings → Network Settings → Manual proxy configuration → enter the IP and port for the protocol you chose. For curl over HTTP: curl --proxy http://IP:PORT https://example.com. For SOCKS5: curl --socks5 IP:PORT https://example.com or curl --socks5-hostname IP:PORT URL if you want DNS resolved at the proxy. Most scraping libraries (Python requests, Node axios, Go net/http) accept a proxy URL parameter directly.
  6. 06 Why do some entries show "Unknown" instead of a country?
    A proxy IP appears in the protocol-level list but has no entry in any country-level file in the upstream dataset. The geolocation database used at index time did not have a confident attribution for it. The proxy still works the same way; only the country annotation is missing.
  7. 07 What is the difference between an "anonymous" and an "elite" proxy?
    Both terms describe how an HTTP proxy handles request headers. A transparent proxy attaches headers (Via, X-Forwarded-For, Forwarded) that disclose your real IP. An anonymous proxy attaches Via but not X-Forwarded-For. An elite or high-anonymity proxy attaches none of these. The distinction matters only for plaintext HTTP traffic. Inside CONNECT-tunneled HTTPS, the destination only sees the TLS handshake, so the proxy cannot leak headers it never gets to write.