Sunday, April 27, 2014

socks4 & socks5 proxy 50/50

socks4 proxy 50/50 socks5 proxy 50/50

119.4.227.235:18186
218.18.64.85:1080
117.82.196.26:18186
177.65.173.6:1080
60.176.47.246:18186
171.101.126.46:1080
201.91.152.250:1080
179.185.17.90:1080
103.10.231.110:1080
125.67.135.181:18186
121.15.15.196:1080
186.167.32.115:1080
179.232.127.236:1080
42.121.59.142:1080

SOCKS is brief for SOCKet Secure that is an Internet

protocol that routes network packets between a

client and server via a proxy server. And that proxy

server is thus called SOCKS proxy server. SOCKS

protocol is usually used by SOCKS proxy to bypass

Internet filters to gain access to websites and

contents which are blocked by governments,

workplaces or schools. Then when we saying SOCKS we

most time mean SOCKS proxy.

A socks server handles requests from clients inside

of a company's firewall and only allows or rejects

connection requests, depending on the requested

Internet destination or user identification. When a

connection and a subsequent "bind" request are

already setup, socks5 proxy 50/50 the flow of knowledge exchange

follows the standard protocol .

HTTP proxy server - the HTTP proxy server was

originally designed to be used only with HTTP

protocol. To say it even simpler, if you need to

open any http:// or https:// like website HTTP proxy

servers work best solution in 90% cases. There are

hardly anydistinction between SOCKS and HTTP proxy

servers if they are used by HTTP protocol .

SOCKS proxy servers - the SOCKS proxy servers tend

to be more flexibleand don't seize you. While HTTP

proxy servers could hide your IP only if you're

browsing a web site page, SOCKS proxy servers could

help you keep your information private (your IP)

even if you are using such programs like ICQ, Skype,

MSN or even email clients like Outlook, socks4 proxy 50/50.

At present time there are 2 versions of the SOCKS

protocol: 4 and 5. The 4th version, as it appeared

earlier,is much more widespread. However, In most

cases, as a SOCKS proxy can "proxy" any TCP / UDP

protocol, it may used also by mail programs, however

they do not do it. Therefore, for such programs

there was developed a unique software automatically

enabling TCP and UDP networking client applications

to traverse a SOCKS server.

Thursday, April 17, 2014

proxy list 2010 :80 :3128 2014 fresh list

Anonymous proxy list:

59.65.98.151:1998
190.207.130.226:8080
82.71.246.188:80
190.205.220.5:3128
190.37.60.137:8080
190.72.99.82:8080
201.209.219.20:8080
186.89.14.230:3128
186.88.115.34:8080
186.95.84.202:8080
207.210.77.90:80
123.231.250.6:3128
201.242.110.114:8080
186.93.223.184:80
220.248.63.61:8088
220.248.63.115:8088
190.153.68.227:80
118.97.44.34:8080
186.5.199.5:3128

Non-anonymous proxy list:

190.94.222.106:3128
190.38.223.244:8080
190.36.0.252:8080
190.202.192.193:8080
190.37.200.120:8080
186.5.116.232:3128
221.120.123.142:80
202.159.23.70:8080
190.79.57.200:8080
200.8.7.81:8080
190.205.98.6:8080
42.201.225.239:8080
186.92.124.221:8080

Socks 4/5 proxy list:

190.198.129.139:1080
201.243.197.79:1080
210.6.165.179:1080
210.6.119.117:1080
210.6.113.3:1080
210.6.91.195:1080
210.6.79.43:1080
210.6.73.86:1080
210.6.72.199:1080
210.6.67.246:1080
210.6.54.102:1080

High-Anonymous proxy list:

210.6.48.155:8088
210.6.42.199:8088
210.6.38.190:8088
210.6.29.13:8088
210.6.11.98:8088
200.29.179.221:3128
61.158.62.190:8088
61.158.89.233:8088
168.63.20.19:8123
146.185.174.233:8080
180.235.150.26:3030
182.93.240.246:8080
190.198.133.8:8080
201.243.158.182:8080
190.153.98.96:8080
139.0.16.202:8080
217.16.9.173:3128
186.90.67.93:8080
76.72.173.43:80
186.93.152.146:8080
219.218.110.141:8088
176.9.150.212:3128
190.38.224.24:8080
190.78.133.60:8080
61.92.37.49:8088
201.211.131.10:8080
190.207.217.215:8080
190.203.187.67:8080
190.79.16.152:8080
111.95.184.153:8080
190.38.96.82:8080
201.209.53.198:8080
190.94.234.230:8080
186.66.79.180:8088
221.120.123.141:80
77.175.165.191:80
183.89.90.47:3128
61.93.47.130:8088
61.93.59.95:8088
186.94.238.66:8080
117.117.226.75:8088
117.117.192.97:8088
117.117.96.190:8088
201.209.24.138:8080
190.75.176.217:8080
201.211.125.156:8080
190.198.149.104:8080
88.159.214.140:80
186.88.222.92:8080
186.94.63.19:8080
186.95.68.111:8080
213.144.132.109:80
190.37.92.172:8080
190.73.255.229:8080
36.74.72.205:3128
190.94.217.77:8080
186.93.112.248:8080
180.235.150.27:3030
80.167.238.77:1080
190.153.68.253:8080
201.221.131.62:8080
37.187.3.202:8118
182.93.241.38:8080
190.205.152.129:8080
115.124.92.254:9876
190.200.2.52:8080
186.93.127.35:8080
180.250.219.98:8080
115.154.19.137:8088
190.37.209.166:8080

Anonymous proxy - these proxys let remote computers

know, that someone is used a proxy, however, they do

not expose the IP address of users.

High anonymous proxy - These proxy servers does not

let remote computers know itself is a proxy server

and does not expose the original IP address.

Non-anonymous proxy - The proxys identifies themself

is proxy server and also expose the original IP

address of users.