Fusion Proxy

Free Network Tool

Free online proxy checker

Paste up to 500 proxies and verify which ones are alive. Each entry is tested against a known target, and we report latency, country, and a simple anonymity classification. Submitted lists are processed in memory and discarded after the response.

500 proxies per check4 protocolsMemory-only β€” no credentials storedLatency & anonymity per entry
Protocol
0 / 500 lines

Accepted formats: ip:port, ip:port:user:password, or user:password@ip:port. We never store credentials β€” lists are kept in memory only.

What the checker tells you

A proxy is only useful if it is actually reachable, returns the IP it claims, and is fast enough for what you’re building. The checker confirms each of those three things in a single pass so you can drop dead entries from your list before they cost you a job.

Reachability

Each entry is connected to once, with a short timeout. Anything that can’t complete the handshake is marked failed.

Latency

We record how long the round-trip took, so you can sort working proxies from fastest to slowest.

Country & ASN

The exit IP is matched against a public IP-to-country dataset, so you can group results by region.

Anonymity class

We compare what our judge endpoint sees from the proxy to what your real IP looks like. Elite, anonymous, or transparent.

How a check is performed

  1. You paste a list. One proxy per line. Up to 500 entries per submission.
  2. We parse each line. The format is detected automatically: with or without credentials, in any common order.
  3. We open a connection through the proxy. A small judge endpoint on our side returns its view of the request.
  4. We classify each entry. The judge response tells us whether the proxy passes through, masks, or strips identifying headers.
  5. We stream results back. Each entry appears in the table as soon as it is checked, so you can stop the run early if you want.

Frequently asked questions

How many proxies can I check at once?
Up to 500 per submission. The tool is rate limited per IP, so spamming many submissions in a row will be slowed down.
What proxy formats are supported?
Plain ip:port, ip:port:user:password, and user:password@ip:port. We do not need a scheme prefix because you select the protocol explicitly.
Do you store the credentials I paste?
No. Submitted lists are kept in memory only and discarded once the response has been written. We do not log entries to disk.
What does β€œanonymity” mean here?
It is a coarse classification based on what our judge endpoint sees through the proxy: elite (no identifying headers), anonymous (proxy headers but no source IP), or transparent (your real IP is exposed).
Why does a proxy show as failed when it works in my client?
Many proxies work for browsers but fail for direct script clients, or have geo-restrictions on the destination we test against. The checker is a quick sanity test, not a full reachability suite.
Why do I need to pick a single protocol?
Auto-detecting the protocol of an unknown proxy by trying every one would let people probe random ports for proxy software. Picking the protocol explicitly removes that capability.
Can I check rotating proxies?
Yes, but the result is for the rotation gateway you submitted. Each line gets one connection.
Are the results good for ranking proxies?
Latency on a single sample is noisy. For ranking, run the same list a few times and take the median, or rely on the dashboard tools that check from multiple regions.

Need a list of proxies that just work?

Skip the maintenance. Our residential, ISP, and datacenter pools are tested before they reach you.

Start free trial