About proxy list
All the proxies before coming to the list undergo a thorough check.
Each proxy is checked on the set of parameters (ping, connection speed, country, type and degree of anonymity).
Types of proxy
There is 4 main types of proxy:
  • HTTP — allows to visit web-sites and download files from HTTP.
  • HTTPS — also called SSL proxies. With these proxies you can view HTTP and HTTPS sites.With special software they may be used with any protocol like SOCKS proxies.
  • Socks 4 — can be used with any TCP/IP protocol with any destination address and port.
  • Socks 5 — you may also use UDP protocol, make DNS requests, und use BIND function for port forwarding.
About anonymity of proxy
There is 4 main types of proxy:
  • No anonymity — remote host knows your IP and knows you are using proxy.
  • Low anonymity — remote host does not know your IP, but it knows you are using proxy.
  • Medium anonymity — remote host knows you are using proxy, and thinks it knows your IP, but this is not yours (this is usually a multihomed proxy which shows its inbound interface as REMOTE_ADDR for a target host).
  • High anonymity — remote host does not know your IP and has no direct proof of proxy usage (proxy-connection family header strings). If such hosts do not send additional header strings it may be considered as high-anonymous. If a high-anonymous proxy supports keep-alive you can consider it to be extremely-anonymous. However, such a host is highly possible to be a honey-pot.
Proxy usage
All major browsers should support proxy option.
  • Mozilla Firefox — Tools > Options > Advanced > Settings > Manual proxy configuration.
  • Google Chrome — Options > Under the hood > Network > Change proxy settings > LAN settings > Use a proxy server > Advanced > HTTP.
  • Opera — Tools > Preferences > Advanced > Network.
  • Safari — Preferences → Advanced → Proxy Settings.
  • Internet Explorer — Tools > Internet options > Connections > LAN settings > Use a proxy server > Advanced > HTTP.
Security notes
Our proxy list consists of third-party proxy servers configured for public use. We have absolutely zero control over any of these proxy servers. USE OUR DATABASE AT YOUR OWN RISK.