Last revised: November 19, 2024
Before using the Good-proxies.com web service (hereinafter referred to as "this resource"), please carefully read these Terms. Your use of this service automatically means your full agreement with all provisions of these terms. If you do not agree with at least one provision of these Terms, you are prohibited from using this resource.
Access key sales are conducted through an external resource located at digiseller.ru. Technical support email for payment aggregator issues: [email protected].
For selling Premium access keys, we use the electronic payment system located at free-kassa.ru. Technical support address for payment aggregator issues: free-kassa.ru/support.php.
For selling Premium access keys, we use the Webmoney electronic payment system located at webmoney.ru. Technical support address for payment system issues: webmoney.ru/rus/support/index.shtml.
For selling Premium access keys, we use the cardlink.link electronic payment system located at cardlink.link. Technical support address for payment system issues: [email protected].
Terms and Definitions
User — an individual who accesses this resource.
This resource — is a web service located at the URL: https://good-proxies.com.
Cookie — a small data file sent by a web server to your computer. Used for user identification, storing settings, keeping statistics and session tracking.
Premium Access Key — is a key that the user receives immediately after payment via email. Using this key, consisting of digits and Latin letters, the user gains the ability to use this resource.
Service Description
This resource provides users with an information service — access to a list of open IPv4 proxy servers that do not require authorization and are not owned or controlled by this resource. All open IPv4 proxy servers are collected from publicly available sources on the Internet and are checked and classified using this resource's software. The service is provided on a paid basis for personal use at your own risk, on an "as is" and "as available" basis.
Proxy server updates occur continuously. The time to check the functionality of all proxy servers in the list does not exceed 5-10 minutes. The timeout for checking each proxy server is 8 seconds.
For full access to this resource, the user must purchase a Premium Access Key. The key provides the ability to get full access for 3, 7, 30 or 60 days. To activate the Premium Access Key, you need to log in to the web interface of the resource. After activation of the key, its action cannot be suspended. The key can be activated no later than 10 months from the date of purchase, and after this period the key loses its validity. Paid funds for an expired key are not refunded.
How to Get Started
To get access to the API, you need to log in to the web interface once. After that, within one minute you will get access to the API.
The services for providing proxy lists are paid. The rates for services can be viewed on the main page of the site. After purchasing a key, you will get access to the paid section, where you can constantly view proxy lists. Login is done by entering the key in the upper right corner of the page. Each key has a certain validity period (from 3 to 60 days). During this period, you can use the resource without restrictions within reasonable limits (up to 34,560 requests to the proxy list per day). If this limit is exceeded, the key will be blocked until the end of the current day according to server time. Also, on the resource it is allowed to send requests to the API to get a proxy list no more than twice within 5 seconds (API is available at https://api.good-proxies.com/api). Proxy lists can be received daily only from ten different IP subnets in the format "a.b.0.0/16" (for example, 123.123.*.* — where "*" can be any number from 0 to 255).
The key validity period starts from the moment of logging into the account using the key on the main page of the resource or after the first request to the API. After the key expires, access to proxy lists will be closed.
To get a proxy list, you need to purchase a Premium Access Key. Links to purchase keys can be found on the main page. Payment is made through the digiseller.market website. After purchasing and receiving the key, you need to log into your account. In the account, you can always see how much time is left until the key expires. Test access keys may have other parameters.
System Algorithm and Where Proxies Come From on This Site
Two proxy collector robots work in the system, which daily collect and check thousands of publicly available Internet resources to search for working proxy servers. All proxies immediately undergo a quick check for connection speed, country determination, anonymity, proxy type, as well as the ability to transmit POST requests, REFERER and COOKIE. Two test pages with a size of 961 bytes and from 800 to 1200 bytes are used to check proxies. All checked proxies are considered working and are immediately added to the site database. The database is updated continuously. Non-working proxies are not added to the database as this is inefficient. Working proxies are automatically checked for functionality in queue order. If any proxy stops working, it is automatically deleted from the database. This algorithm ensures the availability of up-to-date proxy server lists.
The maximum response time for HTTP/S is 8 seconds, for SOCKS4/5 — also up to 8 seconds.
API Description
Proxy check timeout — 8 seconds.
Within 5 seconds you can send 2 requests.
A list of proxies is issued, sorted in ascending order by the date of the last check. The most recently checked proxies will be displayed at the top of the list.
API is available at https://api.good-proxies.com/api. You can send requests via HTTP and HTTPS protocols.
Limitation: 34,560 API requests per day and no more than ten IP subnets in the format "a.b.0.0/16" (for example, 123.123.*.* — where "*" can be any number from 0 to 255).
Parameter Description
key — Premium Access Key. This is a required parameter. Usage example: key=ACCESS_KEY
.
type — Proxy type. Possible values: http
, https
, socks4
, socks5
. If the parameter is not specified, proxies of all types will be loaded. Usage example: type=http
.
anon — Proxy anonymity level. Possible values: transparent
, anonymous
, elite
. If the parameter is not specified, proxies of all anonymity types will be loaded. Usage example: anon=elite
.
count — The number of proxies received. The maximum number of proxies is specified. If you specify 0
or leave the value blank, the entire available proxy list will be returned. Usage example: count=0
.
ping — Proxy response time in milliseconds. Maximum value is 8000. Usage example: ping=8000
.
works — The number of successful proxy tests out of the total number of attempts as a percentage. Available values: from 0 to 100. Usage example: works=50
— this means that proxies will be issued that have at least 50% successful checks out of the total number of functionality tests.
time — Getting proxies that have been checked for functionality within the specified time (in seconds). For example, if you specify 10 seconds, then all proxies checked in the last 10 seconds will be returned. Usage example: time=10
.
country — Countries for received proxies. The two-letter country code is specified. Usage example: country=ru
.
city — Cities for received proxies. The full name of the city in Russian is specified, but for some cities an English name may be used. Example of use: city=Paris
.
A more detailed API description is available at https://good-proxies.com/api-docs.
Proxy Types
- SOCKS4/SOCKS5 proxies are used for any TCP/IP connections: HTTP, HTTPS, FTP and others. These proxies can be used in browsers, download managers, FTP clients, ICQ clients and other applications. The SOCKS protocol usually provides an elite level of anonymity, less often — an anonymous level.
- SSL proxies never transmit your IP address, transmitting requests as is, which provides an elite level of anonymity.
- For SSL/HTTP proxies, the anonymity level is determined by the lowest level. That is, if proxies have an elite level through an SSL connection, and transparent through HTTP, then the overall anonymity level of proxies will be considered transparent.
- HTTP, SSL/HTTP, SSL proxies are mainly used for viewing websites (HTTP and/or HTTPS).
Rules for Using This Resource
1. It is forbidden to use the Premium access key by different people.
2. It is forbidden to use proxy servers for illegal purposes that violate the legislation of both the Russian Federation and other countries.
3. It is forbidden to collect proxies from this resource for further distribution on the Internet.
4. The administration of this resource does not guarantee and cannot guarantee the functionality of all proxies at the time of issue.
5. The administration of this resource is not responsible for possible damage caused to you as a result of using this resource.
6. The administration of this resource is not responsible for any financial losses that occurred due to the fault of a person using the Premium access key to obtain a proxy list, as well as in case of unforeseen, force majeure circumstances or bankruptcy of this resource. The administration is not obligated to compensate for possible losses.
7. The administration of this resource has the right to make any changes to the rules of this project without notice. Changes take effect immediately after publication.
8. The administration of this resource does not bear and cannot bear responsibility for the actions of users of this resource.
9. The administration of this resource is not responsible for incorrect determination of countries for some proxies, since the database for determining countries may become outdated, and the update may come after an indefinite time.
10. The administration of this resource cannot guarantee that the proxy servers will meet your needs.
11. The user of this resource receives access to proxy server lists at their own risk, and under their own responsibility on an "as is" and "as available" basis.
12. The administration of this resource does not guarantee that the provided proxy servers do not keep logs.
13. The administration of this resource does not bear any responsibility for the possible use of proxy servers, information about which is provided on this resource.
14. The user of this resource undertakes to use the provided proxy servers only for personal purposes. The user assumes all risks and responsibility for using the provided proxy servers.
15. Resale of keys from this resource is prohibited.
16. At the slightest suspicion of using a key by more than one person, the key will be blocked until the circumstances are clarified.
17. The administration of this resource cannot guarantee high speed of proxy servers.
18. The administration of this resource cannot guarantee that proxy servers are not banned on any Internet resource.
19. The administration of this resource cannot guarantee the availability of proxy servers to Internet resources.
20. It is forbidden to use the services of this resource through proxy servers, VPN servers and through remote desktop.
21. The administration of this resource cannot guarantee any ping (response time) to proxy servers.
22. The user must ensure the confidentiality of their key.
23. The cost of the Premium access key may be higher than indicated by the amount of commission of any payment system, depending on the selected payment method.
24. It is forbidden to use proxy servers provided by this resource for purposes that violate the rules of using resources to which access is made through proxy servers.
25. Access to this resource is provided to users for their convenience on an "as is" and "as available" basis. The administration of this resource does not guarantee that the use of this resource and/or the provision of its content will be uninterrupted, complete and error-free, and reserves the right to change this resource and its content at any time, as well as to cease providing access to them.
26. It is forbidden to check the proxy list received from this resource for functionality on publicly available websites.
27. All possible abuses using proxies are prohibited, including inflating counters, voting, site ratings, etc.
28. It is forbidden to use proxies from this resource for SPAM (illegal mailing) and other types of illegal mailings (SPAM on forums, guest books, blogs, social networks, bulletin boards and mass registrations on websites without the consent of their owners).
29. Most proxies may work slowly, but sometimes faster options are found.
30. If one of the access keys was blocked for violating the terms of use, then all other access keys (old and new) from the same user may be blocked in case of repeated violations.
31. It is forbidden to use the services of this site if any point of the terms of use violates the law of the country from which you are currently accessing this site.
32. The administration of this resource reserves the right to issue proxy lists with partially or completely non-working proxies to those suspected of violating the terms of use.
33. It is forbidden to use the Premium access key simultaneously on more than one computer.
34. The administration of this resource does not guarantee and cannot guarantee that all proxies received from this resource will be working.
35. Any information about the number of proxies on this resource may be inaccurate.
36. Access to this resource through a browser must be done using a browser in which JavaScript and Cookie are supported and enabled, and add-ons/plugins that somehow restrict the operation of this resource must be disabled. Otherwise, the functionality of this resource is not guaranteed.
37. All found public IPv4 proxies without IP and login authorization.
38. If the administration of this resource considers that too many requests are coming from an IP address to the server on which this resource is located, then the IP may be blocked.
39. The user of this resource must ensure the confidentiality of their Premium access key (including the API link to receive proxies, since the Premium access key is located in them) and proxy lists received from this resource.
40. Under no circumstances shall the administration of this resource, or any other persons involved in the creation, production or distribution of this resource, be liable for compensation of any direct, indirect, consequential, incidental and special circumstances damages, lost profits and business interruption as a result of use or inability to use this resource and its materials, even if the administration of this resource was aware of the possibility of such damages.
41. An inactive Premium access key can be used to extend another Premium access key if the extended key has not expired. A Premium access key used to extend another Premium access key cannot be used for authorization in the web interface and for API requests.
42. It is forbidden to use proxy servers to bypass website protection or blocking systems.
43. It is forbidden to use this resource to bypass authorization on paid or limited resources without the permission of the owners.
44. The user agrees not to use the received proxies for conducting unauthorized tests, including, but not limited to, load tests, attacks on infrastructure or abuse of web resource systems.
45. The administration of this resource has the right to require additional information from the user to confirm the legality of their actions and use of the provided proxies, in case of suspicions of violation of the terms of use.
46. The user agrees not to use this resource to bypass access restrictions on pages that require consent to user agreements or privacy terms.
47. The resource administration reserves the right to block access to the site or provided services for users whose actions may damage the server infrastructure or disrupt the work of other users.
48. All proxy lists received from this resource are for personal use only. It is forbidden to transfer or distribute these lists to third parties without the permission of the resource administration.
49. It is forbidden to use proxy servers received from this resource to bypass geographic or other restrictions established on Internet resources to which access is made through these proxies.
50. The administration of this resource is not responsible for possible copyright violations or other legal problems related to the use of received proxy servers.
51. In case of using proxies from this resource for actions that may result in legal consequences, users agree to compensate for all possible damages that may arise to the resource administration or other parties in connection with these actions.
52. Users agree to use proxies from this resource only in countries where such actions are legal, and not to violate local laws and regulations regarding network security and privacy.
53. The administration reserves the right to change or supplement this list of rules at any time, and changes take effect immediately after publication on the site.
Privacy Policy
Collection and Use of Information
By continuing to interact with this site, you express your consent that your user data (Username, email address, cookies, location information, IP address, OS type and version, browser type and version, device type and screen resolution, source from where the user came to the site, from which site or by which advertisement, OS and browser language, which pages the user opens and which buttons they click) will be processed by Good-proxies.com for the purpose of collecting data about site visitors for more convenient work with it and improving the quality of site functionality in the future. If you do not want your data to be processed, leave the site.
Disclosure of Information
We do not disclose information about users to companies, organizations and individuals not affiliated with us. Exceptions are the cases listed below:
By law requirement. Information may be disclosed for the purpose of preventing fraud or other illegal actions, by legislative requirement and in other cases provided for by law.
To provide services, fulfill obligations. The user agrees that personal information may be transferred to third parties for the purpose of providing services ordered on the site, fulfilling other obligations to the user. Such persons, for example, include courier services, postal services, freight services and others.
What personal information is processed when users contact support by email, online chat?
We process all correspondence received from clients, including text content and metadata. For this purpose, we store users' email addresses. Our site or mail servers generate metadata related to our communication using the SMTP protocol. Our goal is to provide the most effective user support and improve service performance.
A platform provided by another service is used for correspondence: Zendesk (for real-time communication and email correspondence). When you contact us, your data, including name and email address, are registered on this platform. Therefore, please review the privacy policy of this service:
Zendesk: https://www.zendesk.com/company/policies-procedures/
Privacy Policy of External Service Digiseller.ru
Digiseller: https://digiseller.ru/privacy
Analytics
Good-proxies.com uses Yandex.Metrica (web analytics), LiveInternet and Cloudflare services to analyze information about site visits. When a user's browser loads an internet page of our site, program code is executed that allows to obtain various information (about screen resolution, device, language, related sites, etc.) for analysis using web analytics. Web analytics can store cookie files to identify users who revisit the site.
Security
We take appropriate security measures for collecting, storing and processing collected data to protect them from unauthorized access, modification, disclosure or destruction, we limit our employees, contractors and agents access to personal data, we constantly improve methods of collecting, storing and processing data, including physical security measures, to counter unauthorized access to our systems.
Nevertheless, we cannot guarantee 100% that our security measures will prevent third-party "hackers" from illegally obtaining this information, although we take all reasonable measures to prevent such security breaches. You acknowledge the risk of such breaches to the extent that they occur, despite our reasonable security measures.
Disclaimer
The Privacy Policy does not apply to any other sites and is not applicable to third-party websites that may contain mentions of our site and from which links to the site may be made, as well as links from this site to other sites on the Internet. We are not responsible for the actions of other websites.
Entry into Force of the Privacy Policy and Changes to It
We may review this policy from time to time. You can view the current version of the Privacy Policy at any time at the following URL: https://good-proxies.com/toc
By using this site, you express your consent to this privacy policy. If you do not agree with this policy, please do not use our site. Your further use of the site after changes have been made to this policy will be considered as your consent to these changes.
How to Opt Out of Using Cookie Files
You can always revoke your consent to use cookies in the browser. If you do not wish to use cookies, you can configure your browser to automatically block cookies or alert you each time an internet page requests permission to add cookie files. To configure the necessary parameters, go to one of the links listed below:
Other Terms
By purchasing a Premium access key to this resource, the user agrees to receive the informational newsletter of this resource to their email address specified when purchasing the Premium access key.
Example PHP Script for Getting Proxies via API
Can be downloaded at: https://good-proxies.com/test.tgz
Changing the Terms of Use of This Resource
The current version of the terms of use of this resource is always located on the page at https://good-proxies.com/toc. The administration of this resource reserves the right to make changes to this document without prior notice, and changes take effect immediately after publication.
Rights of the Administration of This Resource
The resource administration reserves the right, in case of detection or suspicion of violation by the User of the terms of use of this resource, to block access to such Users without prior notice and refund of paid funds. Blocking access to proxies is done by blocking access keys, IP addresses, email addresses, payment details belonging to the User.
The administration reserves the right to change any parameters of this resource without prior notice.
Tariff Plans
3 days premium access - limitations: 34560 API requests per day.
7 days premium access - limitations: 34560 API requests per day.
30 days premium access - limitations: 34560 API requests per day.
60 days premium access - limitations: 34560 API requests per day.
Proxies for Services (detailed description)
Check speed 50 threads and proxies are issued that have been checked within the last 10 minutes.
Refund
Due to the fact that the proxies provided to the user are open and not controlled by this resource, and a disclaimer is given regarding any guaranteed proxy characteristics, the user is entitled to demand a refund of funds for purchasing a key to access this resource if defects were found in it that were not mentioned by the seller. A refund is provided only in case of downtime of this resource for 1/2 of the key service period, but not less than 24 hours. In all other cases, including permanent or temporary absence of proxy servers with any specific characteristics, for example, HTTP proxies from Russia working with both Yandex and Google without captcha, a refund is not provided.
The refund is made minus the used full and partial days of the Premium access key.
Refund of funds in the DigiSeller and Webmoney systems is possible only to a WebMoney Transfer system wallet or by crediting to the account of Russian mobile operators, regardless of the payment method. If necessary, register in the WebMoney Transfer payment system. Additional costs related to the conversion of electronic currencies are not compensated. The exception is a refund when paying for goods through the PayPal system, such a refund is made within the PayPal system in accordance with the established regulations of the PayPal user agreement (para. 11 "PayPal Protection Program").
Refund of funds in the Freekassa.ru system is possible only to an electronic wallet of the FKWALLET system located at https://fkwallet.io. This system has many ways to withdraw funds. Additional costs related to the conversion of electronic currencies and payment system fees are not compensated.
To refund funds in the cardlink.link system, you need to go to the link https://cardlink.link and find the section for refunding funds. Additional costs related to the conversion of electronic currencies and payment system fees are not compensated.
Immediately after the refund, the Premium access key, the funds for which were returned, is blocked.
Feedback
Support service
[email protected]