There are many Proxy Sites, Forums and Resources out there, however they all have one fundamental flaw - the lists are nearly always out of date or totally unchecked. The Proxy lists you find on most boards are no exception, the lists often contain massive amounts of dangerous Transparent Proxies.
The solution presented here is quite simple. Special for ProGamerCity members I present a list of fresh, public proxies, which were tested and filtered manually
Now a little bit about Proxy
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server. The proxy server evaluates the request as a way to simplify and control their complexity. Today, most proxies are web proxies, facilitating access to content on the World Wide Web.
How can I use proxy servers
- A proxy server has a variety of potential purposes, including:
- To keep machines behind it anonymous, mainly for security.
- To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.
- To apply access policy to network services or content, e.g. to block undesired sites.
- To access sites prohibited or filtered by your ISP or institution.
- To log / audit usage, i.e. to provide company employee Internet usage reporting.
- To bypass security / parental controls.
- To circumvent Internet filtering to access content otherwise blocked by governments.
- To scan transmitted content for malware before delivery.
- To scan outbound content, e.g., for data loss prevention.
- To allow a web site to make web requests to externally hosted resources (e.g. images, music files, etc.) when cross-domain restrictions prohibit the web site from linking directly to the outside domains.
A proxy server that passes requests and responses unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.
A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching.
What Proxy list is?
A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website. Proxies allow users to make indirect network connections to other computer network services. Proxy lists include the IP addresses of computers hosting open proxy servers, meaning that these proxy servers are available to anyone on the internet. Proxy lists are often organized by the various proxy protocols the servers use, most commonly:
There are 3 types of HTTP proxies:
- Fully anonymous proxies - Such proxies do not change request fields and look like real browser. Your real IP is also hidden of course. People that administer internet servers will think that you are not using any proxies.
- Anonymous proxies - Do not show a real IP but change the request fields, so it is very easy to detect that a proxy is being used by log analysis. You are still anonymous, but some server administrators restrict proxy requests.
- Transparent proxies (not anonymous, simply HTTP) - Change the request fields and they transfer the real IP. Such proxies are not applicable for security and privacy while surfing on the web. You can use them only for network speed improvement.
"Proxy chaining" is using several proxy servers in a series. Use the following settings in your browser: http://proxyA:portA/http://proxyB:portB/. Note: you may expect some speed loss.
SOCKS is a protocol that relays TCP sessions at a firewall host to allow application users transparent access across the firewall. Because the protocol is independent of application protocols, it can be (and has been) used for many different services, such as telnet, ftp, finger, whois, gopher, WWW, etc. Access control can be applied at the beginning of each TCP session; thereafter the server simply relays the data between the client and the application server, incurring minimum processing overhead. Since SOCKS never has to know anything about the application protocol, it should also be easy for it to accommodate applications which use encryption to protect their traffic from nosy snoopers. No information about the client is sent to the server – thus there is no need to test the anonymity level of the SOCKS proxies.
A lot of sites ask money for such type of list, but if you’re a PGC member, you get this stuff free of charge.
And I will keep this list up to date
Checked by Grooguz: 2012-05-29
Small example:
High Anonymous / Level1 Proxies (57)
Code:119.134.251.187:8080 79.140.105.122:80 121.14.31.13:80 220.231.106.75:8088 93.166.121.107:8118 41.75.203.44:80 199.168.138.52:3128 160.80.85.73:3128 27.68.241.122:8088 41.158.128.190:80 41.158.128.221:80 211.115.75.169:8888 65.111.173.250:80 217.76.35.238:3128 122.141.242.199:80 208.71.105.253:80
Anonymous / Level2 Proxies (101)
Code:183.22.9.71:8080 122.72.2.200:80 222.92.141.155:8090 59.34.1.151:8080 41.190.16.17:8080 190.145.55.171:3128 195.29.154.2:8080 46.105.227.105:80 200.219.187.239:8080 218.69.96.4:80 187.48.136.210:3128 122.0.66.102:8080 120.35.31.101:8080 196.12.146.215:80 122.193.102.23:3128 125.88.75.151:3128 58.83.224.217:8080 186.216.241.52:3128
Transparent / Level3 Proxies (925)
Code:112.90.224.195:80 119.147.241.58:80 114.30.47.10:80 202.143.128.102:3128 103.23.103.3:8080 218.108.85.115:3128 190.252.125.34:8080 146.255.9.124:3128 201.45.238.155:3128 61.167.49.188:8080 189.126.201.217:8080 41.197.132.186:8000 122.144.6.198:8080 189.126.201.129:8080 58.249.39.116:8080 212.118.244.167:3128 186.208.73.10:8080 117.103.85.115:3128 212.90.161.214:3128 91.200.170.18:8080 187.16.138.51:3128 110.172.152.139:3128 202.47.88.46:3128 177.85.233.80:8080 190.67.169.194:8080 119.110.69.185:8080 196.1.178.254:3128 121.33.249.170:8080 202.163.101.26:8080 121.17.144.131:8080 59.57.15.71:80 122.144.4.198:8080 189.3.240.26:80 175.176.244.178:8080
Full list of proxies in attachment
Please register or login to download attachments.