What VPNs do

Hide your network activity

When you use the internet, your computer and phone hold
an IP address, which is publically accessible. Connect to
a VPN to get an anonymous IP address, which will make
it impossible for people to learn your identity and location.

Protect your passwords and data

Your internet traffic can easily be intercepted
and read. VPNs protect all the data you
transfer and receive thanks to
encryption.

Create private channels
between users

Our VPN contains a protected local network
that can't be accessed from outside.
You can exchange confidential files and data
without worrying about them being leaked.

Give you unrestricted internet access

It's totally up to you which sites you want
to open. Simply choose a server in a country
where the site you want
is available.

What are the benefits?

Change location

Change your IP address across all platforms at the click of a button: browsers, mail, games.

Unrestricted internet

Constant internet access without any restrictions from network admins or service providers.

Encrypted traffic

All the data that you send or receive online is securely encrypted.

Secure file exchange

Securely exchange files with other VPN users.

Confidentiality

Privacy and anonymity when visiting any site.

Protection from tracking

Providers and admins can monitor
what you do online. VPNs protect
you from this.

Server map

We're constantly adding new servers to give you as many options as possible. We also regularly update our existing servers to make them faster and more powerful.

Our network is currently made up of 110 servers, spread across 78 cities 44 countries countries.

Why is this important? It means that you can choose the server that works best for you. You can speed test any server to help you find the best option. Otherwise you can let us choose the ideal server for you automatically.

Each of our servers work independently of one another, therefore, making our whole network stable. Even if several of our servers go down at once, there will still be hundreds that are working at any given moment.

Take a look at our server map to see how many countries we can provide access to.

Learn more about proxy lists

Proxies are needed when using a VPN is either impossible or inconvenient. For example, when mass action is required from multiple IP addresses simultaneously, such as parsing, increasing views, visits, removing limits on the number of requests from online services, etc.

Proxies from our list do not belong to us. They are collected automatically by the "spider robot" from thousands of different sites on the internet, including closed forums and even some private proxy databases.

Please note that these are not our own proxies, so we can not be held responsible for their performance and stability, but only show their status at the time of verification. The right column in the list shows how long ago the check was performed.

All proxy servers in the list are checked and sorted according to various parameters.

For example, the type of proxy depends on how you will be able to use it. Here are the types:
  • HTTP: regular proxies that support HTTP requests. You can use them to view websites and download files over HTTP.
  • HTTPS: Also called SSL-enabled proxy servers. Allow you to view HTTPS sites. Using specialized programs, they can be used for any protocol, like SOCKS proxy servers.
  • Socks 4: Proxies that support the SOCKS protocol version 4. They can be used to connect over TCP / IP protocol to any address and port.
  • Socks 5: Includes all the features of version 4. Additional features include use of the UDP Protocol, the ability to make DNS requests through a proxy, and use of the BIND method to open the port for incoming connections.

Proxy anonymity is a very important parameter. This determines whether your real address will be hidden and whether or not the destination server will suspect that you're using a proxy.

Anonymity categories that are in our proxy list:
    • No anonymity: The remote server knows your IP address and knows that you are using a proxy.
    • Low anonymity: The remote server does not know your IP, but knows that you are using a proxy.
    • Average anonymity: The remote server knows that you are using a proxy and thinks that it knows your IP, but it is not yours (these are usually multi-network proxies that show the remote server the incoming interface as REMOTE_ADDR).
    • High anonymity: The remote server does not know your IP, and it has no direct evidence that you are using a proxy. These are anonymous proxies.

The speed is indicated in milliseconds, but it is not a ping. You can see how fast a small text file was uploaded via proxy. The easiest way is to focus on the color of the strip: green is fast, and red is slow.

The ping will vary. If this is an important parameter for you, it is better to check it directly from the device where the proxy will be used.

For owners of paid subscription, you can download the proxy list in .txt and .csv formats, as well as get API access. You can request access to the API from technical support.

Here's what else our proxy checker can do:

  • Upload verified proxies in Ip:Port text format, or a table in .csv format.
  • Increase the speed of proxy verification using multithreading. 20 threads are available for free verification, and up to 64 threads are available for users with a paid subscription.
  • One proxy is checked for about 30 seconds. In the free version, there are 20 simultaneous verification threads available. The paid version has 64 proxy check threads.
  • You can check 100 proxies at a time. If you plan to regularly check a large number of proxy servers, log in with your access code and check for proxies without limits.
  • The "results table" parameter shows the verification process and its results in real time.
  • When checking a large sheet, you can uncheck the "non-working" checkbox to prevent extra rows from appearing.

There's an API for the proxy checker. You can embed proxy verification in your program or on your site. Conditions available upon request.