Anonymous proxies: frequently asked questions

Our proxies function with the binding of IP addresses:

All products on our website can be paid using our payment service - Methods of payment: Visa, MasterCard, American Express, Stripe, USDT, Bitcoin, Litecoin, Ethereum, TRON, Dash, Perfect Money, Alipay and other cryptocurrencies. To buy a package proxy, press the Tariffs section. Select the proxy package you need and click on. After that, you will automatically be redirected to a round-the-clock online store of instant purchases. To enter the online store, you need to register an account and verify it using the existing email address. After payment, you will instantly get access to your personal account and the proxy list.

Within 24 hours after activation, if you do not suit you, you can return your money. To issue a return of funds, please contact technical support.

You can take a test of our proxies for 60 minutes. There will be 73 IP addresses in the test, the "Mix of countries" tariff. For this you need register on our website and contact technical support with a request for a free proxy test.

This can happen if for example you are disconnected from the Internet and you have a dynamic IP. (If the IP of your provider is “dynamic” i.e (IP constantly changes when disconnected from the Internet, disconnex) and you are the buyer of our proxy: contact our technical support, we will very quickly help solve the problem with the dynamic IP). Check the work of the proxy in the browser (are the pages of famous popular sites through proxy open?), If they do not work there either, write to technical support, we will solve the issue. If, however, in any browser they work, most likely the problem is not on our side.

Proxy checker to check our proxies 1. Our proxy operates through a login/password and binding to IP. 2. Your "verification programs" can be blocked by our servers, as the usual protection against attacks may work. Check the performance of the proxy, for example, the Proxifier program or through a regular browser and if everything works, but your program is not, then look for the cause in the program, this happens and usually in 99.999% is user errors. If you still can’t work, contact our technical support service.

It is possible to extend the account if it still works for you and you can go to the control panel. If your account is overdue, then you will not be able to go to the control panel and use the extension function! To extend the current account, you need to find the section in the client’s panel: and press the 30, 90, or 360 days and extend the account. After activation, you will see a change in time and the number of remaining days.

All our services should be attached to the IP address of the computer on which you work. This option is a security module and cannot be disconnected. Third persons cannot use your proxy, even if you provide them with your username / password to access the service. This is due to the fact that the proxy is tied precisely to your device and will not work on another computer. To install the binding, you need to find a real IP (computer or remote server) from which you want to run the proxy (before checking, be sure to turn off the VPN if you have). You can do this on the page IP - Information Write down the received IP. Then under the account In your personal account. select and go в Active Services. Some service pages display the fields in which you need to specify the login and password for authentication on proxy, as well as the IP address of your device received on the site Enter IP and click the "Install" button. Changes will enter into force after 5-10 minutes.

The proxy server is an IP address and “service” located at the data center (data center). With such IP there are no other living users using the Internet from home. Such IP are suitable for most service tasks. It has a low cost, high stability and unlimited traffic. However, it is not recommended to use in tasks where the user is subject to further checks (antifrod). Such types of tasks include registration in bookmakers, registration on the websites of banks and payment systems, receiving cash bonuses in various systems, etc. The rest of the proxy server is ideal in terms of price/quality ratio.

The list of client tasks is quite extensive and we cannot completely test all of them, but proxy are great for most typical tasks. First of all, the service is intended for professionals who need to collect large volumes of data.

Our proxies are extremely durable, as they are deployed on their real equipment and you can be confident. The period you bought an account for, our proxy will definitely live, moreover, if you want to extend the subscription, then you should also not be afraid that something could happen to our proxy.

We have static proxies, that is, they are not updated. Once a week you can update the list manually (use the control panel Find the section Update the IP list and click get new IP). When buying a second same proxy package, the difference in IP can be 85-95%

Only one user can work on one account. Each account in your personal account is attached to your IP provider and if you gave your account to someone and this user entered it first, then you will not be able to connect. This is done with one purpose to avoid free connections.

This is a normal phenomenon. The system for protecting search engines from scanners is simply triggered. This behavior has already been noticed not only on our service but also with ordinary providers.

If your program requires a special login/password format, then in the control panel there is a designer for layouts of various formats and their unloading. Available tags: {ip}, {port}. Example: {ip}: {port} @name: pass. We have foreseen this and you can create any login/password format for any program. And we also have an API for remote access to the list of available proxies.

All lists of proxies are imported with ports. You can download it in TXT and CSV format in your account. If for some reason you have a proxy without a port, you can enter manually: For http/s порт 8085. For Socks(4,5) - 1085.

In such niches, antifrod systems are very well tuned. If you have never used a proxy server with your source before, do not waste your time. It should be understood that the proxy servers are unprofitable when individual users interact with services under close attention.

We block the postal ports of the protocols POP3, SMTP и IMAP, To avoid spam mailing through proxy servers. Spam and illegal activities using our proxy servers are prohibited and clearly indicated in the conditions of service. We also closed most of the popular proxy - kekers. The proxy server testing tool cannot process the request, since the package is tied precisely to the IP address of the equipment and cannot use the proxy server by default. Google works with interruptions on its own. We recommend that you do not use Google proxy for this source.

No. This is a 100% guarantee that you are the only one who uses this Proxy package. This provides maximum anonymity and speed. If you need to use proxy on several devices at the same time, break a large package into smaller bags and tie them to the appropriate IP addresses of the devices.

In 99% of cases, this is the incorrect presentation of the ge on the site you check. The problem is that most services very rarely or do not update their geobases at all, and we regularly double -check the entire pool through Ripe. We recommend that IP check in the source. We are not responsible for other services.

There is no hard restriction, but you must understand that the more flows you use, the greater the load on your server and the slower your proxy can be. If too much, such a request can be regarded as DDOS attacks and the entire IP address pool is automatically blocked, so you should also know about the source. In this case, we cannot return the money, since your behavior has led to blocking.

The channels of our servers vary from 100 Mbps to 1 Gbit/s, and although we do not artificially limit the speed of up to 10 Mbps, as some services do, we have at least 100 Mbit/s. The speed cannot be guaranteed. It depends on many factors.

The work of the proxy server can only be checked through the browser. Tie a proxy package to the IP address of the device you want to check. Enter the resulting IP address and port in the browser settings (we recommend using port 8080). If the IP address has changed, the proxy server works. Due to the binding by IP proxy, it cannot be verified by external services or programs.

Yes, you can download the list of proxy in txt format and CSV. To do this, click on the desired format in your account and the loading of the proxy list will begin to automatically.

All proxies without exception are anonymous, and the IP addresses are faked. Perhaps the software or verification program does not work properly and give you a real IP address. We recommend turning off Flash and all superstructures, applications and other programs. They can also cause IP address leakage. Antivirus can also prevent your anonymity on the network.

If you use our proxy server, you will not have such problems. All our servers are connected to ports at a speed of 100 Mbps to 1 Gbit/s. This problem can occur only on the source side. Some services can limit the speed of IP addresses in their data centers, but this cannot be influenced. If you still have problems with the speed of work, contact the technical support service. We will solve the problem as soon as possible.

Yes, if your provider gives out different IPs in one subnet, authorization by login/password should work reliably (99.9% of the providers work in one subnet). In this case, the binding is carried out according to the Mask /21 from the tied IP of your personal account. The IP address ranges are calculated automatically. You can use CIDR calculator to calculate the range. For example, use this — CIDR service Range - - If the IP address changes to another IP address within this subnet, the proxy will continue to work with the authentication by login/password. You do not need to change the IP address in the client panel every time.

Server proxies and personal proxies are similar in characteristics, but server proxies are issued to several users and are not suitable for all sites. Individual proxies are issued alone and suitable for personal use and work with most sites on the Internet.

More than 300 class subnets (C) in the total proxy buffer. It is impossible to get a list of proxies with completely different subnets and distributed IP. The list of IP addresses is never selected manually, but is always generated randomly. To predict in advance how many subtesses the client will receive, it is impossible. has been operating in the market of personal, anonymous, individual proxy servers since 2012. During this time, we managed to become one of the leaders of the with a highly developed network infrastructure, acquire our own IP addresses and autonomous systems and develop a flexible pricing policy for our regular customers.

Our proxy servers will provide you with the opportunity in 100% anonymous mode to bypass locks, resources with closed and limited access. The lease conditions for the client are very profitable and understandable. At any time, you can contact our managers to get competent consultation and ask all questions of interest. The price policy is configured to any user, a large and small volume of proxies.

We have constant discounts on some packages. Use the function to extend in your account (the price of extension may be lower than the price of a newly purchased product). A warning! If your account that you decide to extend is no longer working, then you will not be able to use the extension function, since you cannot go to the control panel. You have to buy a new account.

All tariff plans


Choose your proxy package

Quality, Speed, Stability

We have been on the market since 2012

Frequently asked questions (FAQ)

Frequently asked questions (FAQ) are a list of questions and their answers that help users quickly find the information they need about a product, service, or topic. FAQs are typically posted on company websites, white papers, or printed materials.

One of the most popular FAQ topics is technical support, as users often encounter problems when using various devices and programs. Here are some examples of questions that may appear in the FAQ section:

1. How to create an account on our website?

2. How to place an order and pay for it online?

3. How to download a list of proxy servers?

4. What should I do if I have problems?

5. How to contact ProxyElite.Biz support?

FAQs can also be useful for other areas of your business, such as information resources or online courses. For example, an FAQ in a programming course might include questions about how to start learning a programming language, where to find self-study materials, how to ask the teacher a question, etc.

When writing an FAQ, it is important to keep the following guidelines in mind:

1. Keep it short and clear. Answers to questions should be clear and concise so that users can quickly find the information they need.

2. Structure the information. Separate questions into categories or topics so that users can easily find the answer to their question.

3. Update the FAQ regularly. Please check the information is up to date and add new questions as needed.

Frequently asked questions are a convenient and effective way to provide information about a product or service. A properly written FAQ will help users get answers to their questions quickly and without unnecessary effort.

Comparison proxy table
Server proxies ProxyElite.Biz HTTP HTTPS SOCKS4 SOCKS5
Anonymity Partially Partially Complete Complete
The speed of the proxy Before 100 Mb/s Before 100 Mb/s Before 100 Mb/s Before 100 Mb/s
Ports proxies 8080/8085 8080/8085 1080/1085 1080/1085
Work without authorization Yes Yes Yes Yes
Unlimited traffic Yes Yes Yes Yes
Work with the HTTPS-sites No Yes Yes Yes
Stream restriction No No No No
Class subnets (C) In the buffer 250 250 250 250