Custom Search


Why Build a Free Proxy Server Listing Service?


The goal of ultraProxies.com is to display working public proxies (so you don't waste a lot of time configuring your system with useless, but still listed proxy IP addresses).

In pursuit of that goal we have tested the HTTP(S) IP addresses displayed and found they have a proxy server at the IP:Port combination and the server is responding to requests at the time of the tests and that date is listed beside all displayed proxies. (That way we can copy the IP and port to our configuration and actually expect it to work instead of the usual expectation of it failing and how many more do we need to copy and paste before finding a working server?).

All of the content on this site is presented as is without making any claims, expressed or implied, to ownership of the IP addresses and certainly no warranty of usability, quality, speed, or any other claim to the content for any purpose whatsoever. Also because we don't own the IP addresses listed we must also warn you that you use the IP addresses at your own risk.

If we have an IP listed that belongs to you and that you do not want listed on this site simply click the Contact link and let me know about it. Any valid request to remove content will be honored and processed in a timely manner.

Contributing Proxies


If you would like to list your proxy IP addresses on this site click on Add Proxy or just click here. You can add a list of addresses as well as entering the IP and port one at a time. If you add a list the server will check each IP:Port combination before displaying them on this page. Any new proxy server IPs contributed with a proxy server listening and accepting requests will be added to the home page immediately upon confirmation, usually no more than about a minute after you add an address. For more information about Proxy IP addresses click here.

Why use a Proxy Server?


Contrary to what you may have heard, or read, surfing the Internet anonymously is not illegal, nor is it morally wrong. Using a proxy server protects you from prying eyes and gives voice to whistle blowers, and those living in authoritarian countries, as well as protects people that just desire privacy when using the Internet.

Article 12 of The United Nations Universal Declaration of Human Rights states, "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks."

Privacy is your right. Don't let anything, or anyone, try to convince you your online privacy is any less important than privacy is in any other aspect of your life.

What is a Proxy Server


A proxy server is a an application (computer program) that services requests from its clients by forwarding client requests to another proxy, or web server. A client establishes a connection to a proxy server then requests a service, or resource like a web page, file, or possibly even another proxy server connection. The proxy server then processes the request on behalf of the client as if the request were coming directly from the client's computer and then returns any responses back to the client. However, a proxy server might optionally alter the client's request, or server response. In some cases it might even cache the server response and when receiving a similar request return that cached response without even contacting the specified server, speeding up the client's request considerably.


NOTE: You can install a proxy server on your local computer, or at any point between the user and the destination computers, locally, or on the Internet.

What are public proxies and why do I need one?

During this presentation we will refer to Internet addresses as an IP, or IPs. An IP is the underlying unique identifier that sets your computer apart from all the other computers connected to the Internet. It usually looks something like 192.168.1.1, basically four distinct numbers separated by three periods, or dots. Now with the newer IPv6 protocol you might find text amongst the numbers and more than three dots, but this shouldn't make any difference in this discussion. We just include it to be thorough.

At its most basic a proxy is a bit of software connected to the Internet that sits and listens on a given IP and port. The port could be any whole number between 0 to 65535 (barring any predefined ports like HTML and e-mail). So, potentially, you can have more than one Proxy Server running at the same IP address, the only difference between them will be the Port number. With that many ports available you can actually have quite a few Proxy Servers listening at a single IP.

When you connect to a Proxy Server you can connect a variety of ways, but for this discussion we will focus on HTTP (Web Browsing).

When you access a web site from your browser (Internet Explorer, or Chrome, etc..), you leave a trail and some unscrupulous people use that trail to follow you all over the Internet trying to track you well enough that they can attempt to profile you. Basically trying learn enough about you that they can profitably sell that information to the highest bidder, usually to legitimate businesses, but not always and no matter whom they sell it to, they control that information, who sees it and gets to use it, not you. Now-a-days you can expect a certain level of protection using a current anti-virus program like MacAfee, or Norton's Internet Security but they can't hide your IP for you. Keeping your web use private is a good way of protecting yourself from these people and you can do that easily with a Proxy Server. Best of all it's free!

The way the Proxy Server protects you is by not just hiding your IP, but at least as importantly, by hiding your outgoing Port number as well! For instance, when you connect to this web site you are coming in on Port []. If this was a Proxy Server it would forward your request using its own IP, instead of yours, then it would pick a port at random and use it for the request. So, anybody watching sees you enter on port X, but you will arrive at your real destination on port Y. And Y can be any number between 0 and 65535. Making it nearly impossible to track you past the Proxy Server. Likely you are not the only person using the Proxy Server at that moment making it even more unlikely for someone to track you past the Proxy Server. A person connected to a Proxy Server requires too much effort to track past the Proxy Server and forces the monitors to look for less protected prey. Also traffic between you and your Proxy Server is normally encrypted, so any onlookers have no idea if you are watching a video, or downloading the latest book, or just shopping. Either way you can go about your business without strangers looking over your shoulder and tracking every move you make. That may sound paranoid, but it is just business as usual on the Internet. Sort of the price you pay for all the freedom the Internet gives everyone, but that creates opportunities for abuse which you can mitigate by using a Proxy Server.

Archives


The archives contain all of the IP addresses that have been displayed previously on our home page at one time or another in the past year. They may still be valid, but have been listed on this site for 24 hours and are no longer considered fresh. We endeavor to find and list only the newest proxy IP addresses and feel once they have been listed for a day then too many people are aware of them and they begin to slow down as more, and more, people connect through them. However, any IP addresses listed below are still valid, tested, and rated proxies and likely still work.

Testing


Once you have added an IP and port to your configuration you should always go toTest Proxy and test your configuration. If it passes all 12 tests it is beyond our server to detect your IP, and probably most other servers. In some cases however the proxy might be on a blacklist and may not work on the site you want to visit, but your real IP will still remain private in that situation.

Testing your proxy IP and port configuration


It is very important that you test your proxy configuration after adding a new IP and port number to your system. This page was designed for that purpose.

There are currently 12 different tests this page does to see if you are coming in via a proxy server. Most other test pages I've come across only include the first 6 tests on this page, so if your configuration passes all 12 tests it is highly unlikely that any host you visit will be able to detect your IP from behind the proxy server

Even if your configuration does not pass all of the tests the proxy server still adds an extra layer of complexity. Making it that much more difficult for any third party trying to track your Internet usage.

Anonymous Proxy


Anonymous proxies mask your IP, replacing it with their own, however the servers you go to may be able to detect your real IP. In practice though it is probably not going to be noticed unless the servers put in a bit of effort by adding a bit of code, before each page is displayed, that can easily detect your real IP. If your goal is to have your IP undetectable by the server you are visiting you will need a High-Anonymous proxy, or better.

High-Anonymous Proxy


The High-Anonymous proxies mask your IP, replacing it with their own. However the servers you go to may still be able to detect your real IP. This is unlikely, but servers that do add code to detect underlying IP addresses can possibly detect your IP.

HTTP Proxy


An HTTP Proxy Server is a piece of software running on a remote server that accepts requests from other computers using the HTTP protocol (Mainly Web browsers) and forwards those requests to specified servers anywhere on your network or the Internet. Depending on the response from the specified server the proxy server will forward the response back to you. To speed things up though it might already have a cached version of the data and could forward the cached response to save time.

To use one of the proxy servers listed on this page you would add one of the IP addresses listed below, along with the port number listed beside it, into your computer's configuration. If you are using the Windows operating system, both Internet Explorer and Google Chrome, possibly other browsers, can use these proxies by entering the configuration information into the "Internet Options" window. You do this by selecting the "Connections" tab, pressing the "LAN settings" button and entering the IP and port in the Proxy Server box. "Internet Options" can be accessed from the Tools menu in Internet Explorer or, more directly, from the "Control Panel".

HTTPS Proxy


An HTTPS Proxy Server is a piece of software running on a remote server that accepts requests from other computers using the HTTPS protocol (Encrypted HTTP connection, typically using a web browser) and forwards those requests to specified servers anywhere on your network or the Internet. Depending on the response from the specified server the proxy server will forward the response back to you. To speed things up though it might already have a cached version of the page and might forward the cached response to save time.

To use one of the proxy servers listed on this page you would add one of the IP addresses listed below, along with the port number listed beside it, into your computer's configuration. If you are using the Windows operating system, both Internet Explorer and Google Chrome, possibly other browsers, can use these proxies by entering the configuration information into the "Internet Options" window. You do this by selecting the "Connections" tab, pressing the "LAN settings" button and entering the IP and port in the Proxy Server box. "Internet Options" can be accessed from the Tools menu in Internet Explorer or, more directly, from the "Control Panel".

SOCKS4 Proxy


There are two kinds of SOCKS proxy protocols, SOCKS4, and the more sophisticated SOCKS5 protocol. The SOCKS4 protocol is used by a proxy server to route network packets between a client and a server and can be used with any TCP and/or UDP application.

Using a Socks Proxy Server requires software with native SOCKS support so requests go through the SOCKS proxy server, rather than addressing the target host directly.

There are programs that allow any existing networked software to connect, via SOCKS, to external networks by SOCKSifying them. By SOCKSifying them I mean setting up existing networked software so their requests are automatically redirected through the SOCKS proxy server. This can be accomplished by purchasing software like, proxifier (Win, Mac), or proxycap (Win, Mac). You can find this kind of software free on the Internet for Windows at Freecap.ru and for the Mac at Socat, and for Linux, BSD, and Solaris at Dante

SOCKS5 Proxy


There are two kinds of SOCKS proxy protocols, SOCKS4, and the more sophisticated SOCKS5 protocol. Both protocols are used by a proxy server to route network packets between a client and a server and can be used with any TCP and/or UDP application. SOCKS5 also permits anonymous UDP connections as well as user authentication, so only authorized users can access the socks proxy server.

Transparent Proxy


Transparent proxies don't hide, or mask, your real IP in any way. In RFC 2616 the standard definition is: "A 'transparent proxy' is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification". and "A 'non-transparent proxy' is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering".

Gateway - Sometimes called a tunneling, or transparent, proxy


A gateway is a proxy server that passes all requests and replies unchanged.

JavaScript


You can find instructions on how to enable, or disable, Javascript in your web browser at Mister Ed's Website.

There are currently Javascript instructions at Mister Ed's Website for:


Browsers [ Internet Explorer ] [ Firefox ] [ Mozilla ] [ Netscape ] [ AOL ] [ Opera ]
Browsers 2 [ Safari ] [ Google Chrome
Explorer Clones [ SlimBrowser ] [ Maxthon ] [ Avant ]
Mobile browsers [ Opera Mini ]


JavaScript is used to enhance web pages. Adding animation as well as responding to user input immediately. Instead of having to communicate with the web server and wait for a response JavaScript can process the request on the user's computer immediately. This speeds up the processing of web pages dramatically and creates a superior user experience.

eBay Sniper