HTTP, SOCKS4, SOCKS5 proxies scraper and checker with support of determining exit-node's geolocation for each proxy.
A lightning-fast, feature-rich proxy scraper and checker built in Rust.
Collect, test, and organize HTTP/SOCKS4/SOCKS5 proxies from multiple sources with detailed metadata and intelligent filtering.
protocol://user:pass@host:port
)Get pre-checked proxies from monosans/proxy-list - updated regularly using this tool.
This tool makes many network requests and can impact your IP-address reputation. Consider using a VPN for safer operation.
All configuration options are documented in
config.toml
- edit it to customize sources, timeouts, and output preferences.
Note: For Termux users, see the dedicated section below.
Download the appropriate binary from nightly builds
Extract the archive to a dedicated folder
Configure by editing config.toml
to your needs
Run the executable
Note: Docker version uses a simplified log-based interface (no TUI).
Install Docker Compose
Download the docker archive from nightly builds
proxy-scraper-checker-docker
Extract to a folder and configure config.toml
Build and run:
# Windows
docker compose build
docker compose up --no-log-prefix --remove-orphans
# Linux/macOS
docker compose build --build-arg UID=$(id -u) --build-arg GID=$(id -g)
docker compose up --no-log-prefix --remove-orphans
Important: Download Termux from F-Droid, not Google Play (why?).
Auto-install with one command:
bash <(curl -fsSL 'https://raw.githubusercontent.com/monosans/proxy-scraper-checker/main/termux.sh')
Configure using a text editor:
nano ~/proxy-scraper-checker/config.toml
Run the tool:
cd ~/proxy-scraper-checker && ./proxy-scraper-checker
This product includes GeoLite2 Data created by MaxMind, available from https://www.maxmind.com