Socks proxy list
SOCKS is a protocol for handling traffic through a proxy server. It can be used with virtually any TCP/UDP application, including Web browsers and FTP clients. It provides a simple firewall because it checks incoming and outgoing packets and hides the IP addresses of client applications. Using Socks proxy is a good solution for internet anonymity and security (pay attention to VPN Virtual Private Network too).
There are two types of Socks proxy protocols: Socks 4 and Socks 5. Socks 4 proxy will allow working with TCP protocols only, like HTTP (web browsing via IE, Opera, Firefox, Safari,..), NNTP newsgroup access, IRC. Socks 5 proxy is more advanced, allowing to anonymize UDP protocols as well (ICQ for example).
Many popular applications support SOCKS proxies: Firefox, Google Chrome, Thunderbird, Safari,..
We accept: PayPal, Credit cards, Western Union, Web Money, LiqPay, Perfect Money, BitCoin
|IP address||Port||Country||Type||Checked (ago)||Check|
|220.127.116.11||Iran, Islamic Republic of||4||00:00:24|
|18.104.22.168||Iran, Islamic Republic of||4||00:00:52|
|22.214.171.124||Iran, Islamic Republic of||4||00:05:08|
|126.96.36.199||Iran, Islamic Republic of||4||00:07:20|
There are many reasons to hide your real identity when you use the internet. You might want to protect yourself against an oppressive government, or post personal messages to a forum without identifying yourself to the whole world as the poster.
Although everyone takes privacy in normal life for granted, trying to get the same level of privacy on the Internet (or even on your own computer) is a little less accepted, and sometimes a bit more complicated. While the general attitude his hard to change, many ways exist to enhance your privacy online.
Anonymous proxies hide information about your computer in the requests header (hide IP address, hide remote port). So you can safely navigate the internet and your information will never be used by hackers, spammers and somebody else.
For more security don't forget to use:
HTTPS instead of HTTP Secure POP instead of POP Secure IMAP instead of IMAP Jabber (via SSL or TLS) instead of ICQ VPN (via IPSec or SSL) Wi-Fi with WPA / WPA2 Encryption