Logo
Core Tools

Proxy Checker

Detect whether proxies are alive and classify protocol, quality, anonymity, location, and network type.

Proxy Checker validates candidate proxies and turns a raw list into a decision-ready table.

Proxy Checker

Inputs

  • single proxy
  • many proxies
  • file
  • saved pool
  • handoff rows from extractor or another tool

Important Controls

ControlRecommendation
Protocol hintUse Auto unless you already know every proxy is HTTP or SOCKS.
HTTPS checkKeep enabled when you care about HTTPS-capable clients.
Resolve countryEnable for country, city, ASN, ISP, organization, and network type.
Expected status codesUse 200 for simple availability or add target-specific success codes.
Request URLKeep default for general checks; use your target URL for target-specific validation.
TimeoutStart around 10 to 20 seconds, then reduce after learning source quality.
Random User-AgentUseful when sources or targets treat generic clients differently.

Protocol Detection

If a proxy has no scheme, ZeroTrace Proxy tries likely protocols. SOCKS-like ports such as 1080, 1081, 9050, and 9051 try SOCKS candidates first. Other ports try HTTP first.

Supported normalized schemes include HTTP, HTTPS, SOCKS4, SOCKS4a, SOCKS5, and SOCKS5h.

Result Fields

FieldMeaning
StatusAlive or dead for the configured probe.
Detected protocolThe protocol that worked.
Quality score0 to 100 score based on latency, HTTPS, anonymity, and auth.
QualityHigh, medium, low, or poor.
AnonymityElite, anonymous, transparent, or unknown.
Supports HTTP/HTTPSWhich probe families worked.
Exit IPPublic IP observed through the proxy.
Network typeResidential, mobile, datacenter, or unknown.
ASN/ISP/OrganizationEnrichment data for the exit IP.

How To Interpret Quality

LabelPractical meaning
HighStrong candidate for benchmarking or pool use.
MediumUsable but should be benchmarked and leak-tested.
LowKeep only if source scarcity matters.
PoorUsually remove unless investigating a source problem.

Details That Matter

FeatureDetail
Scheme normalizationHTTP, HTTPS, SOCKS4, SOCKS4a, SOCKS5, and SOCKS5h are normalized for checking.
Port-aware probingSOCKS-like ports try SOCKS first; other ports try HTTP first when the scheme is missing.
Dual probe modeHTTP and HTTPS probes run unless HTTPS checking is disabled.
Expected status listYou can require one code or a list of accepted status codes for target-specific validation.
Auth signalDistinguishes configured credentials, proxy auth challenge, and no-auth responses.
Anonymity signalsUses forwarding headers such as Via, X-Forwarded-For, and Forwarded.
IP enrichmentUses IP enrichment with fallback lookup and a cache for location/network metadata.
Network typeClassifies residential, mobile, datacenter, or unknown using provider flags, ASN/company type, ISP, organization, and domain hints.
Score ingredientsAnonymity, HTTPS support, latency, and authentication shape contribute to the 0 to 100 score.
Result memoryChecked timestamp, raw and normalized proxy, exit IP, location, ASN, ISP, organization, error, and support flags stay with the row.

Transparent proxies can expose forwarding headers. Send serious candidates to Test Proxy Leaks before using them in sensitive workflows.

Best Next Steps

  • Send alive rows to Benchmark Proxies.
  • Send promising rows to Test Proxy Leaks.
  • Save filtered rows to a pool for later rotation.
  • Use Proxy Viewer to inspect one suspicious candidate in detail.

On this page