HTTP, SOCKS4, SOCKS5 proxies scraper and checker with support of determining exit-node's geolocation for each proxy.
HTTP, SOCKS4, SOCKS5 proxies scraper and checker.
protocol://username:password@host:port
on a web page or in a local file, allowing proxies to be extracted even from json without code changes.You can get proxies obtained using this project in monosans/proxy-list.
This is the easiest way, but it is only available for x86-64 Windows, x86-64/arm64 macOS and x86-64 Linux. Just download the archive for your OS from nightly.link, unzip it, edit config.toml
and run the proxy_scraper_checker
executable.
If Windows antivirus detects the executable file as a virus, please read this.
Docker Compose
.config.toml
to your preference.docker compose build --pull
docker compose up --no-log-prefix --remove-orphans
config.toml
to your preference.proxy-scraper-checker
:
start.cmd
start.sh
To use proxy-scraper-checker
in Termux, knowledge of the Unix command-line interface is required.
proxy-scraper-checker
):bash <(curl -fsSL 'https://raw.githubusercontent.com/monosans/proxy-scraper-checker/main/install-termux.sh')
~/proxy-scraper-checker/config.toml
to your preference using a text editor (vim/nano).proxy-scraper-checker
use the following command:cd ~/proxy-scraper-checker && sh start-termux.sh
All other info is available in config.toml
file.
This product includes GeoLite2 Data created by MaxMind, available from https://www.maxmind.com.