Proxy-list consists of free proxy servers that are regularly and thoroughly checked for latency (ping), type, country, connection speed, anonymity. New proxies are added periodically. In a paid subscription, you can export the entire proxy list in IP:Port format and API access.

API access
Location IP Port Protocol Latency Anonymity Last check

Proxy list: what is it and why is it needed

A proxy list is a list of IP addresses collected by a "spider bot" from various sources. IPs are collected from: open databases, private proxy databases, closed forums, specialized sites, etc. Thanks to this, a huge number of proxies for any goals and objectives get into the list.

When you might need a proxy list

This solution is great for situations where:

  1. It is not possible or inconvenient to use VPN for your tasks
  2. Multiple IP addresses use is required
  3. You need to practice / test, but there is no extra money to buy a proxy

A large number of users use such proxy lists to implement tasks such as:

  • parsing information from various sources (parsing search results, websites, directories, database and etc.)
  • mass posting
  • mass liking campaigns
  • work with multiple accounts
  • of course, the proxy list can also be adapted for other tasks

Characteristics and capabilities of the proxy list

A high-quality proxy-list, as a rule, provides a wide choice of proxy locations, the possibility of flexible sheet settings using filters for various parameters. Such as proxy anonymity, connection type and others.

Possible connection types

  • HTTP: such proxies are classified as ordinary. Suitable for internet surfing and downloading files using the specified internet protocol
  • HTTPS: suitable for working with sites that use secure encryption. This category also known as a Secure Sockets Layer proxy
  • SOCKS4: such proxies provide connectivity to hosts and ports using TCP/IP
  • SOCKS5: characterized by the presence of all the possibilities inherent in the previous group. At the same time they support the User Datagram Protocol and can be used to make DNS queries. In such proxies BIND method is supported to allow listening ports to be opened

Possible levels of anonymity of the proxies presented in the sheet:


The IP address is passed to the target host. Such solutions are suitable in cases where anonymity does not play a role, for example, to create a CDN, speed up the work of distributed services, etc.

Low anonymity

In this case, your real address is hidden by the proxy server from the target host. But the fact of using proxy is not hidden.

Medium level of anonymity

In this case, the remote host is also aware of the use of the proxy. In addition, it is told the IP, but not real, and the other disguised as yours - as a result, the target host believes that it has determined your IP address. To this the categories most often include network proxies, which show the target hosts the incoming interface as REMOTE_ADDR.

High anonymity level

The real IP address is not given to the target host. However, there is also no evidence that proxy is used.

Data transfer speed

Also, the proxies that are included in the list differ in speed, which is indicated in milliseconds, but this is not ping. Checked by uploading a small file. For your convenience in the proxy list proxy speed color is used - three colors: green, yellow and red to indicate fast, medium and slow servers, respectively.

Ping is a unique characteristic. In the case when ping plays a key role in solving the problem, it would be more appropriate to test on the device where it is planned to use the proxy.

Paid and free proxies: the nuances you need to know about

IMPORTANT! Proxies are collected into a proxy list automatically by a robot. We are not server owners and do not give guarantees of their serviceability and functionality.

In addition, we recommend refraining from using free proxies for "serious" tasks, due to high probability of their "fall" and compromise.

The table will show the main differences between the paid and free product:

Used simultaneously by many people, some of whom use proxies under the "gray" tasks.
Proxy type/characteristic Free Paid
Speed Low. The speed is quite unstable. Consistently high speed at any time...
Ping High, sometimes very high Low, characterized by stability.
«Mass usage» IP addresses are provided to users in one hand.
Anonymity/Privacy Low level. No guarantees of anonymity/privacy. Guarantee of anonymity/privacy (when buying elite anonymous proxies)
Data security Nobody gives it. Considerable chance of data falling into third parties. Guarantee of anonymity of any data (including passwords, bank card data, etc.).
Support As a rule, it is not. provided There is technical support. Usually 24/7.

Extended functionality is available to customers of our service and owners of a paid subscription (WEB TOOLS) (files .txt and .csv), as well as the ability to download all proxies and use API access.

Subscription required

API access and extended functionality of the tools is available for customers of our service and subscription holders NETWORK TOOLS.

If you don't already have a NETWORK TOOLS subscription to get full access to our tools, you can purchase one here