Hotmail Proxy

PapaProxy - premium datacenter proxies with the fastest speed. Fully unlimited traffic. Big Papa packages from 100 to 15,000 IP
  • Some of the lowest prices on the market, no hidden fees;
  • Guaranteed refund within 24 hours after payment.
  • All IPv4 proxies with HTTPS and SOCKS5 support;
  • Upgrade IP in a package without extra charges;
  • Fully unlimited traffic included in the price;
  • No KYC for all customers at any stage;
  • Several subnets in each package;
  • Impressive connection speed;
  • And many other benefits :)
Select your tariff
Price for 1 IP-address: 0$
We have over 100,000 addresses on the IPv4 network. All packets need to be bound to the IP address of the equipment you are going to work with. Proxy servers can be used with or without login/password authentication. Just elite and highly private proxies.
Types of proxies

Types of proxies

Datacenter proxies

Starting from $19 / month
Select tariff
  • Unlimited Traffic
  • SOCKS5 Supported
  • Over 100,000 IPv4 proxies
  • Packages from 100 proxies
  • Good discount for wholesale
Learn More

Private proxies

Starting from $2,5 / month
Select tariff
  • Unlimited Traffic
  • SOCKS5 Supported
  • Proxies just for you
  • Speed up to 200 Mbps
  • For sale from 1 pc.
Learn More

Rotating proxies

Starting from $49 / month
Select tariff
  • Each request is a new IP
  • SOCKS5 Supported
  • Automatic rotation
  • Ideal for API work
  • All proxies available now
Learn More

UDP proxies

Starting from $19 / month
Select tariff
  • Unlimited traffic
  • SOCKS5 supported
  • PremiumFraud Shield
  • For games and broadcasts
  • Speed up to 200 Mbps
Learn More

Try our proxies for free

Register an account and get a proxy for the test. You do not need to fill payment data. Support most of popular tasks: search engines, marketplaces, bulletin boards, online services, etc. tasks
Rectangle Rectangle Rectangle Rectangle
Available regions

Available regions

PapaProxy's server proxies provide fast and stable connections, making them ideal for business applications that require reliability and high performance. They offer lower latency, higher throughput, and better anonymity than public proxies. Server proxies also allow you to control and manage traffic, providing a more secure and private interaction with the Internet.PapaProxy's server proxies provide high-speed and stable connections, making them ideal for business tasks that require reliability and high performance. They offer lower latency, higher throughput, and better anonymity than public proxies. Server proxies also allow you to control and manage traffic, providing a more secure and private interaction with the Internet.

  • IP updates in the package at no extra charge;

  • Unlimited traffic included in the price;

  • Automatic delivery of addresses after payment;

  • All proxies are IPv4 with HTTPS and SOCKS5 support;

  • Impressive connection speed;

  • Some of the cheapest cost on the market, with no hidden fees;

  • If the IP addresses don't suit you - money back within 24 hours;

  • And many more perks :)

You can buy proxies at cheap pricing and pay by any comfortable method:

  • VISA, MasterCard, UnionPay

  • Tether (TRC20, ERC20)

  • Bitcoin

  • Ethereum

  • AliPay

  • WebMoney WMZ

  • Perfect Money

You can use both HTTPS and SOCKS5 protocols at the same time. Proxies with and without authorization are available in the personal cabinet.

 

Port 8080 for HTTP and HTTPS proxies with authorization.

Port 1080 for SOCKS 4 and SOCKS 5 proxies with authorization.

Port 8085 for HTTP and HTTPS proxies without authorization.

Port 1085 for SOCKS4 and SOCKS5 proxy without authorization.

 

We also have a proxy list builder available - you can upload data in any convenient format. For professional users there is an extended API for your tasks.

Free proxy list

Free Hotmail proxy list

Note - these are not our test proxies. Publicly available free lists, collected from open sources, to test your software. You can request a test of our proxies here
IP Country PORT ADDED
41.230.216.70 tn 80 27 minutes ago
50.168.72.114 us 80 27 minutes ago
50.207.199.84 us 80 27 minutes ago
50.172.75.123 us 80 27 minutes ago
50.168.72.122 us 80 27 minutes ago
194.219.134.234 gr 80 27 minutes ago
50.172.75.126 us 80 27 minutes ago
50.223.246.238 us 80 27 minutes ago
178.177.54.157 ru 8080 27 minutes ago
190.58.248.86 tt 80 27 minutes ago
185.132.242.212 ru 8083 27 minutes ago
62.99.138.162 at 80 27 minutes ago
50.145.138.156 us 80 27 minutes ago
202.85.222.115 cn 18081 27 minutes ago
120.132.52.172 cn 8888 27 minutes ago
47.243.114.192 hk 8180 27 minutes ago
218.252.231.17 hk 80 27 minutes ago
50.175.123.233 us 80 27 minutes ago
50.175.123.238 us 80 27 minutes ago
50.171.122.27 us 80 27 minutes ago
Feedback

Feedback

I mainly use them for promotion in VK and posting on forums. Proxies are always clean and not banned. Before buying you can check IP in spam databases, as you can see the address and have the opportunity to choose from a list. I highly recommend this provider!
Marcel Cormier

I have been using their services for more than a month and do not plan to change providers. The prices are about the same as their competitors, but here the bandwidth is calculated differently. I get three times more bandwidth for my money, while maintaining quality or even better. Highly recommended!
John Wolter

I have been working here for six months. Proxies are clean, I use them for accounts and they don't get banned. Support is responsive, always ready to help. It's just a pity that it doesn't work around the clock. Overall, everything is great, no complaints.
Mark Dagg

I started using their services last year, and during this time there have been no problems. In case of rare situations, the support service always promptly solves questions and helps to sort things out.
tony

I have been using different services for a long time and often face problems, such as a sharp drop in speed or blocked accounts. The service I have been using for the last 3 months has not failed once. Stable speed, fast loading pages. Reliable and stable, I recommend it.
Nels Huso

I have been cooperating with the website for about 3 months now. The speed of the servers is high, failures were not noticed. The prices are quite low when compared to other marketplaces. For now I will stay with you, dear administration)
Kenneth Byrd

I cannot say that I have always got perfect proxies but if I have any problem they always help me promptly. And other sellers often have somewhat worse quality.
Nicolo Benito

Fast integration with API

Fast integration with API

Simple tool for complete proxy management - purchase, renewal, IP list update, binding change, upload lists. With easy integration into all popular programming languages, PapaProxy API is a great choice for developers looking to optimize their systems.

Quick and easy integration.
Full control and management of proxies via API.
Extensive documentation for a quick start.
Compatible with any programming language that supports HTTP requests.

Ready to improve your product? Explore our API and start integrating today!

Python
Golang
C++
NodeJS
Java
PHP
React
Delphi
Assembly
Rust
Ruby
Scratch

And 500+ more programming tools and languages

F.A.Q.

F.A.Q.

How to use fail2ban to protect server from UDP FLOOD attacks? Close

Fail2Ban is a security tool that analyzes log files for malicious patterns and bans IP addresses that show suspicious activity. Although Fail2Ban is primarily designed to work with TCP-based protocols like SSH, HTTP, and MySQL, it can be configured to work with UDP-based protocols, including UDP flood attacks.

To use Fail2Ban to protect your server from UDP flood attacks, follow these steps:

1. Install Fail2Ban:


sudo apt-get update
sudo apt-get install fail2ban

2. Create a custom UDP log file:

Create a log file to store the UDP flood attack data. This log file should be located in the /var/log/ directory, and it should have the appropriate permissions. For example, you can create a log file named udp-flood.log:


sudo touch /var/log/udp-flood.log
sudo chown syslog:adm /var/log/udp-flood.log
sudo chmod 640 /var/log/udp-flood.log

3. Configure Fail2Ban to monitor the UDP log file:

Create a new filter file for UDP flood attacks, for example, /etc/fail2ban/filter.d/udp-flood.conf:


[Definition]
failregex = ^.*UDP.*Flood.*
ignoreregex =

Replace HOST with the actual hostname or IP address of your server, and with the IP address of the attacking host.

Next, create a new action file for UDP flood attacks, for example, /etc/fail2ban/action.d/udp-flood.conf:


[Definition]
actionstart =
actionstop =
actioncheck =
actionban = iptables -I INPUT -s  -j DROP; iptables-save
actionunban = iptables -D INPUT -s  -j DROP; iptables-save

Replace IP with the IP address of the banned host.

Finally, create a new jail configuration file for UDP flood attacks, for example, /etc/fail2ban/jail.d/udp-flood.local.conf:


[udp-flood]
enabled = true
port = 
logpath = /var/log/udp-flood.log
maxretry = 3
findtime = 300
bantime = 1800
action = udp-flood

Replace UDP_PORT with the UDP port you want to monitor.

Reload Fail2Ban configuration:


sudo systemctl reload fail2ban
What is a proxy name? Close

A proxy name is the address or hostname of a proxy server. A proxy server is an intermediary server that acts as a gateway between a client (such as a web browser or application) and the internet. The proxy server receives requests from the client, forwards them to the appropriate server on the internet, and then returns the requested data to the client.

The proxy name is usually an IP address or a domain name that points to the IP address of the proxy server. For example, a proxy server might have a name like "proxy.example.com" or an IP address like "192.168.1.100". Clients use this proxy name to connect to the proxy server, which then processes the requests and provides the necessary resources.

It's important to note that the term "proxy name" can be somewhat ambiguous, as it might refer to the hostname or the actual IP address of the proxy server. In most cases, when people refer to a proxy name, they are referring to the hostname or domain name of the proxy server.

How to get OAuth2 Access Token for unknown services? Close

To obtain an OAuth2 access token for an unknown service, you will need to follow these general steps. Keep in mind that the exact process may vary depending on the service provider and their OAuth2 implementation.

1. Identify the service provider: Determine the service provider you want to access using OAuth2. This could be a third-party application or API.

2. Check the service provider's documentation: Visit the service provider's official documentation or developer portal to find information about their OAuth2 implementation, including the authorization endpoint, token endpoint, and any required scopes or parameters.

3. Register your application: In most cases, you will need to register your application with the service provider to obtain a client ID and client secret. This is usually done through a dedicated developer portal or console. During registration, you may need to provide information about your application, such as its name, description, and redirect URIs.

4. Obtain authorization code: Direct the user to the service provider's authorization endpoint with the necessary parameters, such as the client ID, client secret, and the desired scopes. The user will be prompted to log in and grant your application access to the requested permissions. Upon successful authentication, the service provider will redirect the user to your application's redirect URI with an authorization code in the URL.

5. Exchange authorization code for an access token: Use your application's backend server to make a POST request to the service provider's token endpoint with the following parameters: client ID, client secret, authorization code, redirect URI, and (optionally) a grant type (usually "authorization_code"). The service provider will respond with an access token, which can be used to authenticate requests to their API on behalf of the user.

6. Store and use the access token: Save the access token securely in your application or cache, and use it in the Authorization header of your API requests to the service provider. Access tokens typically have an expiration time, so you may need to periodically refresh them using a refresh token or by repeating the authorization flow.

What do server proxies mean? Close

Several virtual proxy servers can be created within one device. These are special dedicated servers that only "service" such traffic. Many devices can connect to them at the same time.

What is a local proxy? Close

It means a proxy that has no access to the Internet. It is created using special software on the user's computer. Most often it is used to check the performance of the created site or web-application.

Our statistics

>12 000

packages were sold in a few years

8 000 Tb

traffic spended by our clients per month.

6 out of 10

Number of clients that increase their tariff after the first month of usage

HTTP / HTTPS / Socks 4 / Socks 5

All popular proxy protocols that work with absolutely any software and device are available
With us you will receive

With us you will receive

  • Many payment methods: VISA, MasterCard, UnionPay, WMZ, Bitcoin, Ethereum, Litecoin, USDT TRC20, AliPay, etc;
  • No-questions-asked refunds within the first 24 hours of payment;
  • Personalized prices via customer support;
  • High proxy speed and no traffic restrictions;
  • Complete privacy on SOCKS protocols;
  • Automatic payment, issuance and renewal of proxies;
  • Only live support, no chatbots.
  • Personal manager for purchases of $500 or more.

    What else…

  • Discounts for regular customers;
  • Discounts for large proxy volume;
  • Package of documents for legal entities;
  • Stability, speed, convenience;
  • Binding a proxy only to your IP address;
  • Comfortable control panel and downloading of proxy lists.
  • Advanced API.