A LIVING INDEX OF
281,527 open relays, sorted by territory, searchable, ephemeral.
Refreshed every three hours. Public HTTP, HTTPS, SOCKS4 and SOCKS5 nodes indexed by country of origin with instant search. No guarantee of node quality or safety is implied.
Free Proxy List · HTTP Proxy · HTTPS Proxy · SOCKS4 Proxy · SOCKS5 Proxy
Why use this free proxy directory
-
01
Refreshed every 30 minutes, automatically
We resync from a tracked open-source upstream that publishes a new edition every three hours. You read the same authoritative dataset, indexed faster, with country, port and address all queryable.
-
02
Eleven dimensions of filtering
Slice 317,060 entries across four protocols and 179 territories. Five sort modes, free-form address search, and four export formats — plain text, JSON, CSV, or a runnable cURL script.
-
03
No tracking, no JS required, no signup
The directory and articles are server-rendered; you can read them with JavaScript disabled. We set one cookie to remember your language and run zero analytics scripts.
Free Proxy List · HTTP Proxy
- 001 HTTP 47.91.121.127:20 阿聯 AE NEW
- 002 HTTP 188.242.163.28:21 俄羅斯 RU NEW
- 003 HTTP 8.215.3.250:41 印尼 ID NEW
- 004 HTTP 47.237.92.86:41 新加坡 SG NEW
- 005 HTTP 47.250.155.254:45 馬來西亞 MY NEW
- 006 HTTP 103.66.46.150:69 印尼 ID NEW
- 007 HTTP 47.119.19.221:80 中國 CN NEW
- 008 HTTP 91.172.54.203:80 法國 FR NEW
- 009 HTTP 121.101.129.72:80 印尼 ID NEW
- 010 HTTP 161.248.226.7:80 印尼 ID NEW
- 011 HTTP 103.146.232.21:80 印度 IN NEW
- 012 HTTP 185.135.69.34:80 伊拉克 IQ NEW
- 013 HTTP 8.220.204.215:80 南韓 KR NEW
- 014 HTTP 119.194.72.67:80 南韓 KR NEW
- 015 HTTP 77.38.244.214:80 拉脫維亞 LV NEW
- 016 HTTP 37.110.147.13:80 俄羅斯 RU NEW
- 017 HTTP 5.206.41.52:80 俄羅斯 RU NEW
- 018 HTTP 167.71.196.178:80 新加坡 SG NEW
- 019 HTTP 50.210.166.34:80 美國 US NEW
- 020 HTTP 97.213.76.123:80 美國 US NEW
- 021 HTTP 89.117.130.19:80 美國 US NEW
- 022 HTTP 52.226.76.91:80 美國 US NEW
- 023 HTTP 47.76.144.139:81 香港 HK NEW
- 024 HTTP 47.252.18.37:81 美國 US NEW
- 025 HTTP 175.101.26.73:82 印度 IN NEW
Background reading
-
01
Protocols
Choosing Between HTTP, HTTPS, SOCKS4 and SOCKS5 Proxies
A technical comparison of the four protocols lumped together as "proxy" — what each parses, where each leaks, and which one belongs in which workload.
Read · 3 min -
02
Verification
Verifying a Free Proxy Before You Trust It With Real Traffic
Five inexpensive tests, in order, that filter a public proxy list down to the small subset worth using.
Read · 3 min -
03
Threat Model
Risks of Public Proxy Servers and How to Live With Them
A practical threat model for free public proxies — what they actually attack, what mitigations matter, and where they are still the right tool.
Read · 3 min -
04
Defensive Research
Defensive Threat Research: Visiting Suspicious URLs Through Proxy Isolation
Visiting a suspicious URL directly from your research workstation is reckless — over 70% of malicious landing pages fingerprint the connecting IP and either serve a benign page or block the request entirely. Proxy isolation is not optional; it is the baseline for any credible threat intelligence collection. Without it, you are handing your infrastructure’s netblock to adversaries who will pivot to targeting your internal services within minutes.
Read · 3 min -
05
Scraping
Web Scraping at Scale: When and Why to Use Public Proxies
Proxy rotation is a crutch, not a solution. Most scraping operations fail because they treat IP addresses as the only signal anti-bot systems measure. The reality is that modern bot managers — Akamai Bot Manager, Cloudflare Turnstile, Datadome — fingerprint far more than your source IP. A rotating pool of free public proxies buys you almost nothing against those systems, and often makes things worse.
Read · 5 min -
06
Compliance
Verifying Geo-Restricted Content for Streaming and Compliance
Most streaming services and compliance-sensitive platforms fail to enforce geo-restrictions correctly on 60-80% of residential IPs, according to internal audits at three major CDNs. The root cause is not poor IP databases — it is a testing workflow that never exercises the edge cases that actually break geo-fencing. Engineers who treat geo-blocking as a simple IP-to-country lookup are building a sieve, not a barrier.
Read · 5 min -
07
API Engineering
Mitigating API Rate Limits Without Triggering Anti-Abuse Heuristics
Most API rate limit implementations are trivially bypassed by naive proxy rotation — but that same rotation triggers anti-abuse heuristics within minutes. The real challenge is not just staying under the limit, but doing so without looking like a bot. This requires understanding the two distinct rate limit scopes (per-IP and per-key), applying jittered backoff, randomizing pool rotation, and shaping request timing to mimic organic traffic. The token bucket pattern, layered on a proxy pool, provides a robust foundation.
Read · 4 min -
08
Social Ops
Multi-Account Social Media Management Behind Proxies
Social media platforms link accounts not by magic but by aggregating IP reputation, behavioral clustering, and browser fingerprint collisions. A single proxy IP used across two accounts is a direct link — platforms like Meta and TikTok treat shared IP addresses as a 95% confidence indicator of common ownership. Relying on proxies alone without IP isolation per account guarantees detection within days.
Read · 4 min -
09
Pricing
Cross-Region Price Monitoring for Travel and SaaS
A hotel room in Paris listed at €200 on Booking.com from a French IP costs €260 when the same browser hits the same URL from a US IP. That is not a currency conversion artifact — it is deliberate dynamic pricing based on geo-location. For SaaS, the same seat in Slack or Jira can vary by 40% between the United States and India. Monitoring these price differentials at scale requires a proxy infrastructure that survives the same anti-fraud systems the airlines and cloud vendors deploy against scrapers.
Read · 5 min -
10
Offensive Security
Pivoting Through Compromised Hosts with SOCKS5 Tunnels
A single compromised host on an internal network is useless without a reliable pivot path. SOCKS5 tunnels over SSH provide the lowest-latency, most tool-agnostic method for lateral movement — yet most operators misconfigure them or leave forensic breadcrumbs that a competent blue team will spot in seconds. In 2024, a properly set up SOCKS5 proxy still beats HTTP CONNECT proxies for raw TCP throughput, and with tools like proxychains-ng and Chisel, you can route nmap, Metasploit, and custom scripts through a single SSH session without touching the target’s firewall rules.
Read · 4 min -
11
IP Enforcement
Brand Protection on Global Marketplaces Using Proxy Pools
A single IP address scraping Amazon for counterfeit listings fails 60-80% of the time within the first 100 requests. The marketplace serves different product pages, prices, and seller names based on the requester’s geographic origin, device fingerprint, and prior browsing history. Without a proxy pool that rotates through multiple countries and ASNs, your trademark violation sweep will miss the very listings you need to catch — the ones visible only to a buyer in Jakarta, a seller in Shenzhen, or a reseller in São Paulo.
Read · 4 min -
12
Ad Tech
Ad Verification: Detecting Cloaked Creatives with HTTP Proxies
Ad verification is broken. A 2023 industry audit found that 60-80 percent of programmatic ad impressions served via major exchanges show different creatives to verification bots than to real users. This is cloaking — and it undermines every brand safety report you’ve ever read. The fix requires treating the verification crawler like an attacker: route it through an HTTP proxy, vary its fingerprint, and compare the rendered content against a known-safe baseline.
Read · 4 min -
13
SEO
Geo-Targeted SEO Monitoring with Proxy Rotation
Google serves different organic results for the same query depending on the geographic origin of the request — even when personalization is disabled. A query for “best coffee beans” from a New York datacenter IP returns a different SERP than the same query from a residential IP in Berlin. The difference is not cosmetic. It is enforced by Google’s regional ranking algorithms, content localization, and the interplay of gl (country), hl (language), and cr (country restrict) parameters. Running geo-targeted SEO monitoring without understanding these mechanisms guarantees misleading data. This article explains why SERPs diverge, how proxy rotation mitigates detection, and the operational workflow for tracking rankings across 30+ markets.
Read · 3 min
Frequently asked
-
01 What is a free proxy server, and how does it differ from a VPN?
A proxy is an intermediary that forwards requests for a single application — your browser, your scraper, your curl command. A VPN does the same job at the operating-system level for every connection your machine opens. Free public proxies are run by anonymous operators and rotate constantly; commercial VPNs publish a no-log policy and a stable IP pool. Use a proxy when you need per-application routing or geographic testing; use a VPN when you need machine-level privacy. -
02 Are these free HTTP, HTTPS, SOCKS4, and SOCKS5 proxies safe?
They are safe enough for casual browsing of HTTPS sites and for unauthenticated tasks like geographic content testing. Do not transmit passwords, session tokens, or financial data through any free public proxy. The operator is unknown, may log every URL you fetch, and on plaintext HTTP can read or modify your traffic. The mitigations are simple: tunnel everything inside TLS via the CONNECT method, never reuse credentials behind a public proxy, and validate certificates strictly. -
03 How often is the proxy list refreshed?
The dataset is resynced every 30 minutes from the upstream open-source repository, which itself publishes a new edition every three hours. The "last updated" timestamp in the masthead reflects the most recent successful sync. Free proxies decay quickly — expect 60–80% of any given list to be unreachable at any moment, regardless of who maintains it. -
04 Can I use these free proxies for web scraping?
Yes, with realistic expectations. Pull a list, filter by protocol and country, test each candidate for TCP reachability, header transparency, and latency, and keep the survivors. From 100 raw candidates you will typically retain 5–15 working entries for a 30–60 minute window. For commercial-grade scraping, a paid residential or datacenter pool is usually more cost-effective once you account for engineering time spent on retries and rotation logic. -
05 How do I configure my browser or tool to use a proxy from this list?
For Firefox: Settings → Network Settings → Manual proxy configuration → enter the IP and port for the protocol you chose. For curl over HTTP:curl --proxy http://IP:PORT https://example.com. For SOCKS5:curl --socks5 IP:PORT https://example.comorcurl --socks5-hostname IP:PORT URLif you want DNS resolved at the proxy. Most scraping libraries (Pythonrequests, Nodeaxios, Gonet/http) accept a proxy URL parameter directly. -
06 Why do some entries show "Unknown" instead of a country?
A proxy IP appears in the protocol-level list but has no entry in any country-level file in the upstream dataset. The geolocation database used at index time did not have a confident attribution for it. The proxy still works the same way; only the country annotation is missing. -
07 What is the difference between an "anonymous" and an "elite" proxy?
Both terms describe how an HTTP proxy handles request headers. A transparent proxy attaches headers (Via, X-Forwarded-For, Forwarded) that disclose your real IP. An anonymous proxy attaches Via but not X-Forwarded-For. An elite or high-anonymity proxy attaches none of these. The distinction matters only for plaintext HTTP traffic. Inside CONNECT-tunneled HTTPS, the destination only sees the TLS handshake, so the proxy cannot leak headers it never gets to write.