Bonaire Proxy

PapaProxy - premium datacenter proxies with the fastest speed. Fully unlimited traffic. Big Papa packages from 100 to 15,000 IP
  • Some of the lowest prices on the market, no hidden fees;
  • Guaranteed refund within 24 hours after payment.
  • All IPv4 proxies with HTTPS and SOCKS5 support;
  • Upgrade IP in a package without extra charges;
  • Fully unlimited traffic included in the price;
  • No KYC for all customers at any stage;
  • Several subnets in each package;
  • Impressive connection speed;
  • And many other benefits :)
Select your tariff
Price for 1 IP-address: 0$
We have over 100,000 addresses on the IPv4 network. All packets need to be bound to the IP address of the equipment you are going to work with. Proxy servers can be used with or without login/password authentication. Just elite and highly private proxies.
Types of proxies

Types of proxies

Datacenter proxies

Starting from $19 / month
Select tariff
  • Unlimited Traffic
  • SOCKS5 Supported
  • Over 100,000 IPv4 proxies
  • Packages from 100 proxies
  • Good discount for wholesale
Learn More

Private proxies

Starting from $2,5 / month
Select tariff
  • Unlimited Traffic
  • SOCKS5 Supported
  • Proxies just for you
  • Speed up to 200 Mbps
  • For sale from 1 pc.
Learn More

Rotating proxies

Starting from $49 / month
Select tariff
  • Each request is a new IP
  • SOCKS5 Supported
  • Automatic rotation
  • Ideal for API work
  • All proxies available now
Learn More

UDP proxies

Starting from $19 / month
Select tariff
  • Unlimited traffic
  • SOCKS5 supported
  • PremiumFraud Shield
  • For games and broadcasts
  • Speed up to 200 Mbps
Learn More

Try our proxies for free

Register an account and get a proxy for the test. You do not need to fill payment data. Support most of popular tasks: search engines, marketplaces, bulletin boards, online services, etc. tasks
Rectangle Rectangle Rectangle Rectangle
Available regions

Available regions

PapaProxy's server proxies provide fast and stable connections, making them ideal for business applications that require reliability and high performance. They offer lower latency, higher throughput, and better anonymity than public proxies. Server proxies also allow you to control and manage traffic, providing a more secure and private interaction with the Internet.PapaProxy's server proxies provide high-speed and stable connections, making them ideal for business tasks that require reliability and high performance. They offer lower latency, higher throughput, and better anonymity than public proxies. Server proxies also allow you to control and manage traffic, providing a more secure and private interaction with the Internet.

  • IP updates in the package at no extra charge;

  • Unlimited traffic included in the price;

  • Automatic delivery of addresses after payment;

  • All proxies are IPv4 with HTTPS and SOCKS5 support;

  • Impressive connection speed;

  • Some of the cheapest cost on the market, with no hidden fees;

  • If the IP addresses don't suit you - money back within 24 hours;

  • And many more perks :)

You can buy proxies at cheap pricing and pay by any comfortable method:

  • VISA, MasterCard, UnionPay

  • Tether (TRC20, ERC20)

  • Bitcoin

  • Ethereum

  • AliPay

  • WebMoney WMZ

  • Perfect Money

You can use both HTTPS and SOCKS5 protocols at the same time. Proxies with and without authorization are available in the personal cabinet.

 

Port 8080 for HTTP and HTTPS proxies with authorization.

Port 1080 for SOCKS 4 and SOCKS 5 proxies with authorization.

Port 8085 for HTTP and HTTPS proxies without authorization.

Port 1085 for SOCKS4 and SOCKS5 proxy without authorization.

 

We also have a proxy list builder available - you can upload data in any convenient format. For professional users there is an extended API for your tasks.

Free proxy list

Free proxy list

Note - these are not our test proxies. Publicly available free lists, collected from open sources, to test your software. You can request a test of our proxies here
IP Country PORT ADDED
41.230.216.70 tn 80 41 minutes ago
50.168.72.114 us 80 41 minutes ago
50.207.199.84 us 80 41 minutes ago
50.172.75.123 us 80 41 minutes ago
50.168.72.122 us 80 41 minutes ago
194.219.134.234 gr 80 41 minutes ago
50.172.75.126 us 80 41 minutes ago
50.223.246.238 us 80 41 minutes ago
178.177.54.157 ru 8080 41 minutes ago
190.58.248.86 tt 80 41 minutes ago
185.132.242.212 ru 8083 41 minutes ago
62.99.138.162 at 80 41 minutes ago
50.145.138.156 us 80 41 minutes ago
202.85.222.115 cn 18081 41 minutes ago
120.132.52.172 cn 8888 41 minutes ago
47.243.114.192 hk 8180 41 minutes ago
218.252.231.17 hk 80 41 minutes ago
50.175.123.233 us 80 41 minutes ago
50.175.123.238 us 80 41 minutes ago
50.171.122.27 us 80 41 minutes ago
Feedback

Feedback

I've been using this proxy for six months now to use GPT chat and I've never had any problems. Everything works fast and stable, the price is very low, and there is a money back guarantee within 48 hours, which is very convenient.
Kenton Van Hise

Great literally everything. This is the only place where I have found cheap proxies that work great. The support is also on the level, responds very quickly. I am happy with everything.
Jason Ning

I use this proxy systematically and appreciate its features: many geolocations, flexibility in changing equipment and operator, and excellent speed. In addition, the support is fast and responsive.
Domz

I use proxy service for posting on forums and social networks. I have been in this field for many years and I can safely say that this project is by far the best of all available on the market! You can choose practically any country in the world, affordable prices, everything is automated and activated immediately after the payment. The quality of proxies is very good, fast speed, high level of stability. I don't have any complaints about technical support, as its employees are always online and answer quickly in case of anything.
Brayden

I have no claims for proxies that are good and not too expensive. The other pluses are the connection speed and stability. Feel free to use, I definitely recommend it!
Daniel James

Good proxies, no complaints. Everything suits the quality of work: stability, high connection speed. Recommended.
ΔΟΥΛΑΚΑΚΗΣ ΚΩΝΣΤΑΝΤΙΝΟΣ

These guys improve the mood even when buying proxies - smiling and conveying positivity! The company is characterized by a human attitude and provides a quality product. I have been working exclusively with them for a year and a half and see no reason to change the service!
Manase Fidimalal

Fast integration with API

Fast integration with API

Simple tool for complete proxy management - purchase, renewal, IP list update, binding change, upload lists. With easy integration into all popular programming languages, PapaProxy API is a great choice for developers looking to optimize their systems.

Quick and easy integration.
Full control and management of proxies via API.
Extensive documentation for a quick start.
Compatible with any programming language that supports HTTP requests.

Ready to improve your product? Explore our API and start integrating today!

Python
Golang
C++
NodeJS
Java
PHP
React
Delphi
Assembly
Rust
Ruby
Scratch

And 500+ more programming tools and languages

F.A.Q.

F.A.Q.

What is proxy tunneling? Close

Proxy "tunneling" should be understood as the isolation of traffic from the user. It allows you to form a fully protected channel for data exchange, which will be isolated from all other traffic.

How to use Metamask in Selenium? Close

Using MetaMask in Selenium involves interacting with the MetaMask extension within a browser controlled by Selenium WebDriver. Below is an example using Python and Chrome WebDriver to automate MetaMask interactions

1. Install Required Packages

Make sure you have Selenium and the appropriate WebDriver for your browser installed. You can install them using:


pip install selenium

Download the ChromeDriver executable and make sure it's in your system's PATH or provide the path explicitly.

2. Install MetaMask Extension

Ensure that the MetaMask extension is installed in your browser. You can install it from the Chrome Web Store.

3. Example Script

Here's a basic example script using Python and Chrome WebDriver to interact with MetaMask:


from selenium import webdriver
from selenium.webdriver.common.by import By
import time

# Create a WebDriver instance (assuming Chrome in this example)
driver = webdriver.Chrome()

try:
    # Navigate to a website that uses MetaMask (e.g., a dApp)
    driver.get("https://example.com")

    # Wait for MetaMask to load (adjust wait time based on your system and network speed)
    time.sleep(5)

    # Find and click the MetaMask extension icon
    metamask_icon = driver.find_element(By.CSS_SELECTOR, ".icon-container")
    metamask_icon.click()

    # Switch to the MetaMask popup window
    driver.switch_to.window(driver.window_handles[-1])

    # Perform MetaMask interactions (e.g., login, transaction)
    # Example: Find and click the "Connect" button
    connect_button = driver.find_element(By.XPATH, "//button[contains(text(), 'Connect')]")
    connect_button.click()

    # Wait for MetaMask interactions to complete (adjust wait time based on your actions)
    time.sleep(5)

    # Close the MetaMask popup window
    driver.close()

    # Switch back to the original window
    driver.switch_to.window(driver.window_handles[0])

    # Continue with other actions on the original website

finally:
    # Close the browser window
    driver.quit()

4. Customize the Script

Customize the script based on the specific MetaMask actions you want to perform. For example, you might need to handle MetaMask login, transaction confirmations, etc.

Use appropriate locators (CSS selectors, XPaths, etc.) to identify MetaMask elements.

Adjust wait times based on your system and network speed.

5. Execute the Script

Run the script, and it should automate interactions with MetaMask while navigating a website that integrates MetaMask functionality.

Remember that browser automation, including interacting with extensions like MetaMask, should be done responsibly and in compliance with the terms of service of the websites and extensions involved. Automated interactions with MetaMask might trigger security measures, so use such automation for testing and development purposes only.

How to know the type of proxy? Close

To know the type of proxy, you need to identify the communication protocol it uses. Proxies can be categorized based on the protocol they support, such as HTTP, HTTPS, SOCKS, or other specific protocols. Here's how to determine the type of proxy you are using or working with:

1. Check the proxy settings: If you are using a proxy on your device or within an application, examine the proxy settings to see which protocol is specified. For example, the settings might indicate "HTTP Proxy," "HTTPS Proxy," or "SOCKS Proxy."

2. Observe the proxy URL: The proxy URL can sometimes indicate the type of proxy. For example, an HTTP proxy URL usually starts with "http://" or "https://" followed by the proxy server's IP address or hostname, while a SOCKS proxy URL typically starts with "socks://" followed by the proxy server's IP address or hostname.

3. Analyze the proxy server's behavior: You can also determine the type of proxy by observing how it handles incoming and outgoing requests. For instance, an HTTP proxy will typically forward HTTP and HTTPS requests, while a SOCKS proxy can handle any type of traffic, including non-HTTP protocols.

4. Use online tools or software: There are various online tools and software applications that can help you identify the type of proxy. By connecting to the proxy server and analyzing the traffic, these tools can often determine the protocol used by the proxy.

5. Consult the proxy provider: If you are unsure about the type of proxy you are using, you can always consult the proxy provider or the documentation that came with the proxy server. They should be able to provide you with the necessary information about the proxy type.

How to get OAuth2 Access Token for unknown services? Close

To obtain an OAuth2 access token for an unknown service, you will need to follow these general steps. Keep in mind that the exact process may vary depending on the service provider and their OAuth2 implementation.

1. Identify the service provider: Determine the service provider you want to access using OAuth2. This could be a third-party application or API.

2. Check the service provider's documentation: Visit the service provider's official documentation or developer portal to find information about their OAuth2 implementation, including the authorization endpoint, token endpoint, and any required scopes or parameters.

3. Register your application: In most cases, you will need to register your application with the service provider to obtain a client ID and client secret. This is usually done through a dedicated developer portal or console. During registration, you may need to provide information about your application, such as its name, description, and redirect URIs.

4. Obtain authorization code: Direct the user to the service provider's authorization endpoint with the necessary parameters, such as the client ID, client secret, and the desired scopes. The user will be prompted to log in and grant your application access to the requested permissions. Upon successful authentication, the service provider will redirect the user to your application's redirect URI with an authorization code in the URL.

5. Exchange authorization code for an access token: Use your application's backend server to make a POST request to the service provider's token endpoint with the following parameters: client ID, client secret, authorization code, redirect URI, and (optionally) a grant type (usually "authorization_code"). The service provider will respond with an access token, which can be used to authenticate requests to their API on behalf of the user.

6. Store and use the access token: Save the access token securely in your application or cache, and use it in the Authorization header of your API requests to the service provider. Access tokens typically have an expiration time, so you may need to periodically refresh them using a refresh token or by repeating the authorization flow.

What does a VPN connection do? Close

VPN allows you to hide your real IP address, as well as further encrypt your traffic. VPN is also actively used for address spoofing. For example, the user is in the Russian Federation, but by connecting through a VPN server, the site "thinks" that the user is from the United States.

Our statistics

>12 000

packages were sold in a few years

8 000 Tb

traffic spended by our clients per month.

6 out of 10

Number of clients that increase their tariff after the first month of usage

HTTP / HTTPS / Socks 4 / Socks 5

All popular proxy protocols that work with absolutely any software and device are available
With us you will receive

With us you will receive

  • Many payment methods: VISA, MasterCard, UnionPay, WMZ, Bitcoin, Ethereum, Litecoin, USDT TRC20, AliPay, etc;
  • No-questions-asked refunds within the first 24 hours of payment;
  • Personalized prices via customer support;
  • High proxy speed and no traffic restrictions;
  • Complete privacy on SOCKS protocols;
  • Automatic payment, issuance and renewal of proxies;
  • Only live support, no chatbots.
  • Personal manager for purchases of $500 or more.

    What else…

  • Discounts for regular customers;
  • Discounts for large proxy volume;
  • Package of documents for legal entities;
  • Stability, speed, convenience;
  • Binding a proxy only to your IP address;
  • Comfortable control panel and downloading of proxy lists.
  • Advanced API.