HTTP, SOCKS4, SOCKS5 proxies scraper and checker.
- Asynchronous.
- Uses regex to search for proxies (ip:port format) on a web page, allowing proxies to be extracted even from json without making changes to the code.
- It is possible to specify the URL to which to send a request to check the proxy.
- Can sort proxies by speed.
- Supports determining the geolocation of the proxy exit node.
- Can determine if the proxy is anonymous.
You can get proxies obtained using this script in threatcode/proxy-list.
- Download and unpack the archive with the program.
- Edit
config.ini
to your preference. - Install Python (minimum required version is 3.7).
- Run the script that installs dependencies and starts
proxy-spider
:- On Windows run
start.cmd
- On Unix-like operating systems run
start.sh
- On Windows run
To use proxy-spider
in Termux, knowledge of the Unix command-line interface is required.
- Download Termux from F-Droid. Don't download it from Google Play.
- Run the following command (it will automatically update Termux packages, install Python, and download and install
proxy-spider
):bash <(curl -fsSL 'https://raw.githubusercontent.com/threatcode/proxy-spider/main/install-termux.sh')
- Edit
~/proxy-spider/config.ini
to your preference using a text editor (vim/nano). - To run
proxy-spider
use the following command:cd ~/proxy-spider && sh start-termux.sh
To check the local proxy lists, start the Python HTTP server on your local machine by running the python -m http.server --bind localhost
command in the folder with the proxy lists. After that, add links to the appropriate files in config.ini
.
When the script finishes running, the following folders will be created (this behavior can be changed in the config):
proxies
- proxies with any anonymity level.proxies_anonymous
- anonymous proxies.proxies_geolocation
- same asproxies
, but includes exit-node's geolocation.proxies_geolocation_anonymous
- same asproxies_anonymous
, but includes exit-node's geolocation.
Geolocation format is ip:port|Country|Region|City
.