Free Ghost Proxy
Stable Proxies:
IP address | Port | Country | Protocol | Verified |
---|---|---|---|---|
194.26.229.46 | 20002 | Russian Federation | socks | 22 hours ago |
194.26.229.46 | 20009 | Russian Federation | socks | 1 day ago |
161.123.116.54 | 22332 | Canada | http | 1 day ago |
37.186.66.36 | 3629 | Armenia | socks | 1 day ago |
85.21.233.231 | 1337 | Russian Federation | socks | 1 day ago |
172.67.160.84 | 80 | United States | http | 1 day ago |
172.67.165.174 | 80 | United States | http | 1 day ago |
172.66.0.96 | 80 | United States | http | 1 day ago |
91.107.143.161 | 3128 | Germany | http | 2 day ago |
91.201.119.198 | 1337 | Russian Federation | socks | 2 day ago |
89.133.137.45 | 4145 | Hungary | socks | 2 day ago |
77.68.77.181 | 80 | United Kingdom | http | 2 day ago |
92.205.110.118 | 35153 | France | socks | 2 day ago |
83.17.171.252 | 36099 | Poland | socks | 2 day ago |
173.212.223.23 | 28083 | Germany | socks | 2 day ago |
213.219.198.69 | 80 | Russian Federation | http | 3 day ago |
81.19.137.61 | 80 | France | socks | 3 day ago |
193.233.232.116 | 80 | Austria | socks | 3 day ago |
172.104.143.136 | 80 | Germany | http | 3 day ago |
78.30.191.213 | 8080 | Serbia | http | 3 day ago |
109.202.160.2 | 8888 | Russian Federation | http | 3 day ago |
13.51.234.32 | 8096 | Sweden | http | 4 day ago |
172.64.154.143 | 80 | United States | http | 4 day ago |
62.109.0.18 | 24101 | Russian Federation | socks | 4 day ago |
65.21.159.49 | 80 | Finland | http | 4 day ago |
77.232.128.191 | 80 | Russian Federation | http | 5 days ago |
46.105.44.110 | 80 | France | http | 5 days ago |
152.53.3.82 | 7891 | Austria | socks | 5 days ago |
152.53.3.82 | 7890 | Austria | https | 5 days ago |
172.64.144.179 | 80 | Netherlands | http | 5 days ago |
213.21.59.134 | 4153 | Russian Federation | socks | 5 days ago |
95.220.110.1 | 80 | Russian Federation | socks | 5 days ago |
93.177.67.178 | 80 | Germany | http | 6 days ago |
93.171.103.125 | 8080 | Russian Federation | http | 6 days ago |
104.244.76.38 | 80 | Luxembourg | http | 6 days ago |
34.175.101.255 | 80 | Spain | http | 6 days ago |
91.65.102.12 | 80 | Germany | http | 1 week ago |
178.252.170.222 | 3128 | Iran | http | 1 week ago |
195.231.69.203 | 80 | Italy | http | 1 week ago |
172.67.75.35 | 80 | United States | http | 1 week ago |
172.67.128.150 | 80 | United States | http | 1 week ago |
172.66.40.144 | 80 | United States | http | 1 week ago |
172.64.145.59 | 80 | United States | http | 1 week ago |
172.67.165.123 | 80 | United States | http | 1 week ago |
172.67.162.240 | 80 | United States | http | 1 week ago |
79.121.102.227 | 8080 | Hungary | http | 1 week ago |
37.140.31.63 | 80 | Russian Federation | http | 1 week ago |
159.69.206.198 | 80 | Germany | http | 1 week ago |
185.146.173.59 | 80 | Sweden | http | 1 week ago |
103.130.145.169 | 80 | Turkey | http | 1 week ago |
79.174.12.190 | 80 | Russian Federation | http | 1 week ago |
41.65.236.53 | 1976 | Egypt | http | 1 week ago |
172.64.145.223 | 80 | United States | http | 1 week ago |
91.148.127.60 | 8080 | Serbia | http | 1 week ago |
178.254.42.248 | 80 | Germany | http | 1 week ago |
172.67.182.221 | 80 | United States | http | 1 week ago |
172.67.68.245 | 80 | Netherlands | http | 1 week ago |
172.64.194.218 | 80 | United States | http | 1 week ago |
45.81.232.17 | 8191 | Germany | socks | 1 week ago |
66.235.200.122 | 80 | United States | http | 1 week ago |
172.67.163.136 | 80 | United States | http | 1 week ago |
77.221.136.210 | 80 | Sweden | http | 1 week ago |
79.124.77.148 | 3128 | Bulgaria | http | 1 week ago |
176.10.111.23 | 80 | Switzerland | http | 1 week ago |
185.244.210.185 | 80 | France | http | 1 week ago |
95.110.227.85 | 3128 | Italy | http | 1 week ago |
147.45.104.252 | 80 | Russian Federation | http | 1 week ago |
206.189.12.206 | 80 | Netherlands | http | 1 week ago |
77.221.140.172 | 5556 | Sweden | socks | 1 week ago |
89.109.53.26 | 8123 | Russian Federation | http | 1 week ago |
217.160.99.39 | 80 | Germany | http | 1 week ago |
172.67.146.14 | 80 | United States | http | 1 week ago |
45.81.232.17 | 25306 | Germany | socks | 1 week ago |
91.228.186.61 | 80 | Turkey | http | 1 week ago |
45.81.232.17 | 22235 | Germany | socks | 1 week ago |
45.159.248.66 | 80 | United Kingdom | http | 1 week ago |
172.67.148.149 | 80 | United States | http | 1 week ago |
172.67.156.239 | 80 | United States | http | 1 week ago |
104.234.1.25 | 80 | Netherlands | http | 1 week ago |
91.107.142.189 | 80 | Germany | http | 1 week ago |
94.154.221.91 | 5678 | Ukraine | socks | 1 week ago |
46.164.227.196 | 1080 | Russian Federation | socks | 1 week ago |
45.81.232.17 | 63186 | Germany | socks | 1 week ago |
95.164.116.124 | 80 | Turkey | http | 1 week ago |
135.125.248.252 | 80 | Germany | http | 1 week ago |
88.198.161.3 | 80 | Germany | http | 1 week ago |
5.39.69.35 | 57486 | France | socks | 1 week ago |
185.105.118.72 | 80 | Finland | https | 1 week ago |
46.164.226.252 | 1080 | Russian Federation | socks | 1 week ago |
94.140.224.134 | 65056 | Russian Federation | https | 2 weeks ago |
213.91.232.94 | 8080 | Bulgaria | http | 2 weeks ago |
109.197.153.25 | 8888 | Russian Federation | http | 2 weeks ago |
178.48.68.61 | 18080 | Hungary | http | 2 weeks ago |
88.198.82.189 | 3128 | Germany | https | 2 weeks ago |
51.75.126.150 | 50677 | France | socks | 2 weeks ago |
185.221.160.17 | 80 | Russian Federation | http | 2 weeks ago |
89.179.112.252 | 5678 | Russian Federation | socks | 2 weeks ago |
51.75.126.150 | 48751 | France | socks | 2 weeks ago |
172.64.145.201 | 80 | United States | http | 2 weeks ago |
172.64.144.116 | 80 | United States | http | 2 weeks ago |
Fast and stable proxies
Russia |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
249$
|
5 000 IP
399$
|
USA |
100 IP
25$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
249$
|
5 000 IP
399$
|
Great Britain |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
249$
|
5 000 IP
399$
|
Germany |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
249$
|
5 000 IP
499$
|
Europe |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
229$
|
5 000 IP
379$
|
China |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
249$
|
5 000 IP
Sold out
|
Ukraine |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
Australia |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
Canada |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
Netherlands |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
France |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
Turkey |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
India |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
Poland |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
Spain |
100 IP
19$
|
500 IP
69$
|
1 000 IP
99$
|
3 000 IP
Sold out
|
5 000 IP
Sold out
|
Mix of countries |
1 000 IP
99$
|
3 000 IP
229$
|
5 000 IP
379$
|
10 000 IP
729$
|
15 000 IP
1049$
|
FAQ
What is the MAC address?
A MAC (Media Access Control) address is a unique identifier assigned to every network device, such as a computer, smartphone, or router. It is a hardware address that is used to identify the device on a network, and is often referred to as the device's "physical" or "hardware" address.
A MAC address consists of a series of numbers and letters, and is usually formatted as a series of six pairs of hexadecimal digits, separated by colons or hyphens. For example, a MAC address might look like this: 00:11:22:33:44:55.
The MAC address is stored in the device's hardware, and is not typically visible to the user. It is used by the device's operating system and network hardware to identify the device and communicate with other devices on the network.
In summary, a MAC address is a unique identifier assigned to every network device. It is used to identify the device on a network and is usually formatted as a series of six pairs of hexadecimal digits. The MAC address is stored in the device's hardware and is not typically visible to the user.
What is cron, and how does it work?
Cron is a Unix-based utility for scheduling tasks (also known as "cron jobs") to run automatically at specified intervals. It's commonly used for system administration tasks, such as running backups, sending emails, and updating databases.
Cron operates by reading a configuration file called the crontab, which lists the commands to be run and the schedule for when they should run. The schedule is defined using a series of fields that specify the minute, hour, day of the month, month, and day of the week when the command should run.
Here's an example of a crontab entry:
# ┌───────────── minute (0 - 59)
# │ ┌───────────── hour (0 - 23)
# │ │ ┌───────────── day of the month (1 - 31)
# │ │ │ ┌───────────── month (1 - 12)
# │ │ │ │ ┌───────────── day of the week (0 - 7) (Sunday to Saturday;
# │ │ │ │ │ 7 is also Sunday on some systems)
# │ │ │ │ │
# │ │ │ │ │
# * * * * * command to execute
0 0 * * 0 /usr/bin/backup.sh
In this example, the /usr/bin/backup.sh command will be executed every Sunday at midnight (0 minutes, 0 hours).
Cron runs in the background, checking the crontab at regular intervals to see if any commands need to be executed. When it's time to run a command, Cron starts a new process to execute it and logs the output of the command in a file called the syslog.
Overall, Cron is a powerful tool for automating repetitive tasks, and it's widely used on Unix-based systems, including Linux, macOS, and other Unix-like operating systems.
How to scrape Telegram group members?
Scraping Telegram group members can be accomplished programmatically using the Telegram Bot API. To do this, you'll need to create a bot account, obtain an API key, and use the API to extract information about the members of a Telegram group.
Here are the basic steps to scrape Telegram group members:
1. Create a bot account: To access the Telegram Bot API, you need to create a bot account and obtain an API key. You can do this by talking to the BotFather bot on Telegram and following the steps to create a new bot.
2. Get the group chat ID: In order to extract information about the members of a Telegram group, you need to know the chat ID of the group. You can obtain the chat ID by using the getUpdates method from the Telegram Bot API and looking at the response.
3. Use the Telegram Bot API to get group members: Once you have the chat ID, you can use the getChatMembersCount method from the Telegram Bot API to get the number of members in the group. You can then use the getChatMembers method to get information about each member, such as their user ID and username.
4. Extract the desired information: You can extract the desired information about the members, such as their username, user ID, and status, and store it in a data structure for later use.
Note that scraping Telegram group members may violate the terms of service of Telegram, so be sure to review their policies before proceeding. Additionally, you should be mindful of the rate limits imposed by the Telegram Bot API, as excessive usage can result in your API key being blocked.
How do honeypots work?
A honeypot is a security mechanism used to detect and prevent unauthorized access to a computer system or network. It works by creating a fake, attractive target (such as a decoy server or fake database) that is designed to lure in potential attackers or malicious software. The idea is that attackers will be drawn to the honeypot, leaving the real systems and data untouched and allowing security personnel to observe the attacker's behavior and tactics.
Once an attacker interacts with the honeypot, the system logs the activity and alerts security personnel, who can then take appropriate action, such as blocking the attacker's IP address or deploying countermeasures. The data collected from the honeypot can also be used to improve security and better understand the tactics of attackers, helping organizations to better protect their systems and data.
Honeypots can be an effective tool in the fight against cyber attacks, but they should be used in conjunction with other security measures, such as firewalls, intrusion detection systems, and anti-virus software, in order to provide comprehensive protection. Additionally, it's important to regularly monitor and update the honeypot to ensure that it remains effective against new and evolving threats.
Who can trace your IP address?
Your IP address can be traced by any entity that has access to the log data of the server that you are communicating with, such as your internet service provider (ISP), website administrators, and in some cases, government agencies. Additionally, malicious actors can also track your IP address through hacking techniques, such as network sniffing. To maintain online privacy and security, it's recommended to use secure browsing techniques and tools such as virtual private networks (VPNs).
New Reviews
- Jules
The customer support is unparalleled. They assisted me with all of my inquiries.
- Ramon Cortes
The service is outstanding, it met my high expectations and the after-sales service is fantastic. I use the proxies for sneaker bots and they work perfectly. I highly recommend it.
- Joshua
I am very happy with this service. Not only are the prices reasonable and straightforward, but the support is great. They truly care about providing good service. I have contacted them multiple times as a programmer and they have always gone above and beyond to help. I also purchased a yearly package, which is ending soon and I will definitely renew. I mostly use the rotating proxy for real-time NASDAQ market and e-commerce.
- Mark
I'd like to dispute the negative comments. If you give them a chance, you'll see that they're actually a great company. Their staff is incredibly helpful and they offer a lot of assistance. In my opinion, they are one of the best companies out there, and I've tried several others.
- Darijan Budiman
The team at Proxy is fantastic and the customer service is top-notch. Since switching my business to their solution, we have seen a boost in our capabilities and are able to provide even better service to our clients. The company is always improving and even responded promptly during the busy holiday season, showing a dedication to their customers.
- Jasper Davies
I recently updated my account and everything is now resolved. The verification process was smooth, and I got my balance back. Now, I can use my proxy account without any problems. Thanks to the support team!