Http-proxy-list - A lightweight project that hourly scrapes lots of free-proxy sites, validates if it works, and serves a clean proxy list

Overview

Free HTTP Proxy List 🌍

Hourly Update

It is a lightweight project that hourly scrapes lots of free-proxy sites, validates if it works, and serves a clean proxy list.

Scraper found 3626 proxies at the latest update. Usable proxies are below.

Usage

Click the file format that you want and copy the URL.

File Content Count
data.txt ip_address:port combined (seperated new line) 318
data.json ip, port 318
data-with-geolocation.json ip, port, geolocation 318

Sources

Sample Proxies With Geolocation Info

# Ip Port Country City Internet Service Provider
1 98.12.195.129 443 United States New York Spectrum
2 51.222.40.26 9090 Canada Beauharnois OVH SAS
3 130.185.119.20 3128 Germany Düsseldorf Contabo GmbH
4 34.145.237.227 80 United States Washington Google LLC
5 51.79.173.234 3128 Singapore Singapore OVH SAS
6 176.9.63.62 3128 Germany Falkenstein Hetzner Online GmbH
7 5.35.14.167 40016 Russia Moscow INFOLINE
8 79.170.154.180 8083 Russia Moscow Igor Vladimirovich Gorodkov
9 1.13.165.87 8080 China Haidian Shenzhen Tencent Computer Systems Company Limited
10 183.89.11.211 8080 Thailand Pak Kret Triple T Broadband Public Company Limited
11 187.115.192.227 8081 Brazil Belo Horizonte TELEFÔNICA BRASIL S.A
12 181.48.23.250 8080 Colombia Santiago de Cali Telmex Colombia S.A.
13 110.77.236.178 8080 Thailand Samphanthawong CAT Telecom Public Company Limited
14 203.124.60.109 8080 Pakistan Sialkot COMSATS
15 59.63.108.232 41979 China Beijing Chinanet
16 81.174.37.114 8080 Italy Milan NGI
17 124.70.46.14 3128 China Beijing Huawei Cloud Service data center
18 177.73.112.3 9090 Brazil Natal MGNET INFORMATICA E SERVIÔOS LTDA
19 46.173.214.14 8118 Russia Moscow Garant-Park-Internet LLC
20 188.133.158.51 1256 Russia Moscow Enforta-MSK

Contributing

Contributions are welcome, and they are greatly appreciated! Every little bit helps, and credit will always be given.

You might also like...
Log4jake works by spidering a web application for GET/POST requests

Log4jake Log4jake works by spidering a web application for GET/POST requests. It will then automatically execute the GET/POST requests, filling any di

This python script will automate the testing for the Log4J vulnerability for HTTP and HTTPS connections.

Log4J-Huntress-Automate-Script This python script will automate the testing for the Log4J vulnerability for HTTP and HTTPS connections. Pre-Requisits

wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]
wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]

WSVuls Website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.] What's WSVuls? WSVuls is a simple and powerf

HTTP security headers for Flask

Talisman: HTTP security headers for Flask Talisman is a small Flask extension that handles setting HTTP headers that can help protect against a few co

Set the draft security HTTP header Permissions-Policy (previously Feature-Policy) on your Django app.

django-permissions-policy Set the draft security HTTP header Permissions-Policy (previously Feature-Policy) on your Django app. Requirements Python 3.

CVE-2021-40346 integer overflow enables http smuggling
CVE-2021-40346 integer overflow enables http smuggling

CVE-2021-40346-POC CVE-2021-40346 integer overflow enables http smuggling Reference: https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021

This script checks for any possible SSRF dns/http interactions in xmlrpc.php pingback feature

rpckiller This script checks for any possible SSRF dns/http interactions in xmlrpc.php pingback feature and with that you can further try to escalate

Bypass 4xx HTTP response status codes.
Bypass 4xx HTTP response status codes.

Forbidden Bypass 4xx HTTP response status codes. To see all the test cases, check the source code - follow the NOTE comments. Script uses multithreadi

HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907

CVE-2022-21907 Description POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability. create by antx at 2022-01-17. Detail HTTP

Comments
  • IP failure

    IP failure

    Hello, I have tried to use this proxy list, but the IP is invalid, and I can't even access Google. Can I speed up the collection frequency, once every 10 minutes or 30 seconds?

    enhancement 
    opened by aadd445aadda 1
  • redundant results

    redundant results

    Screen Shot 2022-09-25 at 4 16 18 PM

    i wrote a javascript script to try to find a proxy in the US and with port 3128, and while looking through the data, i see that most of the entries are redundant, take the output of my script for example

    bug 
    opened by TechDudie 0
Owner
Mert Güvençli
Mert Güvençli
Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling.

sshuttle: where transparent proxy meets VPN meets ssh As far as I know, sshuttle is the only program that solves the following common case: Your clien

null 9.4k Jan 4, 2023
🍯 16 honeypots in a single pypi package (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres & MySQL)

Easy to setup customizable honeypots for monitoring network traffic, bots activities and username\password credentials. The current available honeypot

QeeqBox 259 Dec 31, 2022
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

mitmproxy mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets. mitmdump is the

mitmproxy 29.7k Jan 4, 2023
Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.

CVE-2021-31166: HTTP Protocol Stack Remote Code Execution Vulnerability This is a proof of concept for CVE-2021-31166 ("HTTP Protocol Stack Remote Cod

Axel Souchet 820 Dec 18, 2022
Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers

CVE-2022-21907 - Double Free in http.sys driver Summary An unauthenticated attacker can send an HTTP request with an "Accept-Encoding" HTTP request he

Podalirius 71 Dec 22, 2022
WebScan is a web vulnerability Scanning tool, which scans sites for SQL injection and XSS vulnerabilities

WebScan is a web vulnerability Scanning tool, which scans sites for SQL injection and XSS vulnerabilities Which is a great tool for web pentesters. Coded in python3, CLI. WebScan is capable of scanning and detecting sql injection vulnerabilities across HTTP and HTTP sites.

AnonyminHack5 12 Dec 2, 2022
How to exploit a double free vulnerability in 2021. 'Use-After-Free for Dummies'

This bug doesn’t exist on x86: Exploiting an ARM-only race condition How to exploit a double free and get a shell. "Use-After-Free for dummies" In thi

Stephen Tong 1.2k Dec 25, 2022
DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by launching a dictionary based attack against a webserver and analyse its response.

DirBruter DirBruter is a Python based CLI tool. It looks for hidden or existing directories/files using brute force method. It basically works by laun

vijay sahu 12 Dec 17, 2022
A cross-platform Python module that displays **** for password input. Works on Windows, unlike getpass. Formerly called stdiomask.

PWInput A cross-platform Python module that displays **** for password input. Works on Windows, unlike getpass. Formerly called stdiomask. Installatio

Al Sweigart 26 Sep 4, 2022