Quickstart
Run the first useful ZeroTrace Proxy workflow from input to saved pool.
This quickstart uses sanitized example proxies. Replace them with your own authorized sources when working in the app.
Goal
Create a small task, check proxy health, save usable results, and understand where to go next.
1. Open Check Proxies
Go to Core Tools -> Check Proxies.
Use Many proxies as the input mode and paste a small list:
http://192.0.2.10:8080
socks5://198.51.100.20:1080
203.0.113.30:3128These IP ranges are documentation examples. They are not expected to be real working proxies.
2. Configure the Task
| Setting | Suggested first value |
|---|---|
| Name | Docs demo check |
| Start mode | Start now |
| Protocol hint | Auto |
| Timeout | 10 to 20 seconds |
| Request URL | Keep the default unless you need a specific target |
| Expected status | 200 |
| Resolve country | Enabled for richer result data |
| HTTPS check | Enabled |
3. Read the Results
Important columns:
| Column | Meaning |
|---|---|
| Status | Alive or dead based on the configured probe. |
| Protocol | Detected protocol after auto detection. |
| Latency | Round-trip probe time in milliseconds. |
| Quality | High, medium, low, or poor based on score. |
| Anonymity | Elite, anonymous, transparent, or unknown. |
| HTTPS | Whether the proxy supports HTTPS probing. |
| Network type | Residential, mobile, datacenter, or unknown. |
4. Save Good Rows
If your real task returns good candidates:
- Select alive rows.
- Click Save to pool.
- Create a pool such as
Checked HTTPS Pool. - Add tags such as
checked,https, ordemo. - Save.
5. Continue the Workflow
| Next step | Use when |
|---|---|
| Benchmark and Leak Test | You need reliability and privacy checks before using a pool. |
| Build a Quality Pool | You want reusable saved sets with tags and source metadata. |
| Run a Rotation Runtime | You want a local endpoint that rotates across pool entries. |
| Discover Proxy Chains | You want to test or search multi-hop chains. |
The smallest useful ZeroTrace workflow is: check a list, save alive candidates, then benchmark and leak-test the saved pool.