ZeroTrace OSINT
Proxy Discovery
Scrape free proxy lists from multiple public sources, deduped and merged.
The proxy discovery tool pulls proxy lists from multiple public sources and merges them into a single deduped output, ready to feed into proxy validation.
Sources
The tool ships with a curated set of public proxy-list sources:
- proxy-list.download
- sslproxies.org
- free-proxy-list.net
- spys.one
- fate0/proxylist
- ProxyScrape (free tier)
- A handful of GitHub-hosted aggregators
Per-source last-updated timestamps are shown so you know which feeds are still maintained.
What you get
| Field | What it tells you |
|---|---|
| Proxy entry | host:port |
| Claimed protocol | What the source advertises (HTTP, HTTPS, SOCKS4, SOCKS5) |
| Claimed country | What the source advertises |
| Claimed anonymity | What the source advertises |
| Source | Which list contributed this entry |
Note the word "claimed." Free proxy lists are notoriously stale and lie freely about their entries' properties. The output of discovery is the input to validation, not the answer.
Dedupe and merge
Proxies that appear on multiple sources are deduped (keyed on host:port). The kept entry preserves the union of source attributions.
Filter chips
After scraping, filter the merged list by:
- Protocol (HTTP / HTTPS / SOCKS4 / SOCKS5).
- Country (multi-select).
- Anonymity (elite / anonymous / transparent — based on the source's claim, not validated).
Filtered output exports to clipboard or text for direct paste into validation.
Auto-validate
A one-click "test all" affordance feeds the merged list directly into the validation tool. The validation results then drop the entries that failed and characterise the survivors accurately.
The full discovery → validation → save pipeline takes a few minutes on a typical free-proxy-list haul of a thousand entries.
Free proxy lists are operated by unknown parties. Any traffic you route through a free proxy can be inspected, logged, modified, or used to deliver malware to you. For sensitive investigations, do not use free proxies — use known-good paid providers or your own infrastructure.
Pivots
The discovery tool's primary pivot is the auto-validate affordance. Individual proxies do not pivot meaningfully on their own — until validation tells you they work.
Sources attribution
Every source the tool scraped is listed in the result with its individual contribution count. Useful for spotting:
- Sources that returned zero entries (probably broken).
- Sources that dominated the merged list (you might want to weight your trust accordingly).
- Sources you no longer want to query (toggle off in settings).