Skip to content

ZeroTrace OSINT

Proxy Discovery

Scrape free proxy lists from multiple public sources, deduped and merged.

The proxy discovery tool pulls proxy lists from multiple public sources and merges them into a single deduped output, ready to feed into proxy validation.

Sources

The tool ships with a curated set of public proxy-list sources:

  • proxy-list.download
  • sslproxies.org
  • free-proxy-list.net
  • spys.one
  • fate0/proxylist
  • ProxyScrape (free tier)
  • A handful of GitHub-hosted aggregators

Per-source last-updated timestamps are shown so you know which feeds are still maintained.

What you get

FieldWhat it tells you
Proxy entryhost:port
Claimed protocolWhat the source advertises (HTTP, HTTPS, SOCKS4, SOCKS5)
Claimed countryWhat the source advertises
Claimed anonymityWhat the source advertises
SourceWhich list contributed this entry

Note the word "claimed." Free proxy lists are notoriously stale and lie freely about their entries' properties. The output of discovery is the input to validation, not the answer.

Dedupe and merge

Proxies that appear on multiple sources are deduped (keyed on host:port). The kept entry preserves the union of source attributions.

Filter chips

After scraping, filter the merged list by:

  • Protocol (HTTP / HTTPS / SOCKS4 / SOCKS5).
  • Country (multi-select).
  • Anonymity (elite / anonymous / transparent — based on the source's claim, not validated).

Filtered output exports to clipboard or text for direct paste into validation.

Auto-validate

A one-click "test all" affordance feeds the merged list directly into the validation tool. The validation results then drop the entries that failed and characterise the survivors accurately.

The full discovery → validation → save pipeline takes a few minutes on a typical free-proxy-list haul of a thousand entries.

Free proxy lists are operated by unknown parties. Any traffic you route through a free proxy can be inspected, logged, modified, or used to deliver malware to you. For sensitive investigations, do not use free proxies — use known-good paid providers or your own infrastructure.

Pivots

The discovery tool's primary pivot is the auto-validate affordance. Individual proxies do not pivot meaningfully on their own — until validation tells you they work.

Sources attribution

Every source the tool scraped is listed in the result with its individual contribution count. Useful for spotting:

  • Sources that returned zero entries (probably broken).
  • Sources that dominated the merged list (you might want to weight your trust accordingly).
  • Sources you no longer want to query (toggle off in settings).

Command Palette

Search for a command to run...