v0.4.2 — public beta — apache 2.0

Your internet,
extended to your
agents. Not theirs.

freeproxy is an open-source rotating proxy that pools the network access you already pay for — home, work, school, mobile — and serves it back to your AI agents over a private mesh. The web you can reach, your agents can reach. No data-center IPs. No silent throttles. No 403s aimed at the model, not you.

4,812 nodes online 187 countries 23.4 TB rotated this week
~/agents/research-bot — freeproxy live
$freeproxy up --mcp
wireguard tunnel established tail-43c1.ts.net joined rota 5 nodes mcp server listening stdio | :7777 health: home-fiber 200ms phone-5g 98ms cafe-wifi 412ms work-vpn 71ms school-eduroam timeout
claude>fetch arxiv.org/abs/2406.04692
rotating via home-fiber (203.0.113.42) 200 OK 82 KB in 410ms
$

The open web was built on the principle that any user could reach any page.

Then it got gated. Cloudflare challenges. CAPTCHA walls. IP reputation lists. Bot scores.

These systems do not, in fact, block bots. They block users without enough trust score — and AI providers, sharing a tiny pool of data-center IPs, have none.

You, however, have plenty. Your phone, your home connection, your laptop on the office wifi — they all see the open web just fine.

It is your right to extend that access to the agents you run.

/// freeproxy — a tool for the user-side of the agent web

Pool the connections you already have. Rotate them through a private mesh.

STEP 01 — install

Add nodes from anywhere you have internet.

Run the agent on a laptop, a phone, a Raspberry Pi at home, a spare VPS. Every node joins your private mesh over a Tailscale-style WireGuard tunnel. No port forwarding, no firewall surgery.

[home]─┐ ├─→ rota [phone]┘
STEP 02 — rotate

Requests are dispatched across nodes per a policy you control.

Round-robin. Sticky-by-domain. Geo-pin. Exclude work-vpn from social media. The rota engine handles failover, health checks, and retries — your agent just sees a single proxy endpoint.

round-robin ─── geo-pin sticky ─── least-loaded manual ─── deny-list
healthy node high latency offline / standby live ↻ updates every 2s
STEP 03 — connect

Point your agent at a single endpoint.

HTTP/SOCKS5 proxy on localhost:7777, or speak MCP directly. Works with Claude Desktop, Cursor, Cline, custom Python — anything that can use a proxy or call a tool.

claude ─→ mcp ─→ rota ─→ web cursor ─┘ python ─┘
STEP 04 — observe

Inspect every hop. Revoke any node, instantly.

The dashboard shows live traffic per node, per agent, per domain. Block, throttle, or rotate any node on demand. Your network — your rules. Logs stay local; nothing phones home.

[•] home-fiber 200 OK [•] phone-5g 302 → cdn [!] work-vpn blocked /reddit

Nine guarantees. One binary.

/01

Open source. Self-hostable.

Apache 2.0. Audit the binary, fork the protocol, run the whole stack on your own metal. No mandatory cloud.

/02

Free as in freedom.

Not a freemium tier waiting to be metered. The right framing is civic, not commercial: your access, extended.

/03

Use the access you already pay for.

Your home fiber. The phone plan you stopped using. The cafe wifi. Existing connections become a resource for your agents.

/04

Bypass blocks aimed at AI providers.

Most provider-side 403s are reputation, not policy. Routing through your own residential IPs makes your agent look like… you.

/05

First-class MCP integration.

Native Model Context Protocol server. Tools for fetch, crawl, authed_session, and explicit choose_node for policy-aware agents.

/06

Tailscale + Cloudflare-style mesh.

WireGuard under the hood. NAT-traversed. End-to-end encrypted. Builds on the patterns that already work for private networks.

/07

Your traffic stays yours.

No central proxy. No shared exit pool. No telemetry. Logs are local-first; export only if you say so.

/08

Multi-device by design.

One control plane, many trust zones. Tag nodes home, work, school, mobile and route by tag.

/09

Agent-first, not browser-first.

Designed for headless workloads: long-lived sessions, structured retries, deterministic IP selection, programmable from the agent side.

A dashboard that treats your nodes like infrastructure, not contacts.

freeproxy.local /dashboard ~admin
Overview

5 nodes online · 3 agents connected · last incident 14d ago

REQUESTS / 24H
14,802
↑ 12.4% vs yesterday
SUCCESS RATE
98.7%
↑ 0.3 pp
AVG LATENCY
184ms
↑ 22ms
EGRESS / 24H
4.21 gb
↑ 280 mb
NODELOCATIONSTATUSP95 LATENCYLOADRPS
home-fiber SF, US · 1Gb healthy 142 ms
23/s
phone-5g SF, US · T-Mo healthy 98 ms
11/s
cafe-wifi Berlin, DE degraded 412 ms
2/s
work-vpn NYC, US healthy 71 ms
14/s
school-eduroam Boston, US offline
0/s
This is a live mock. Open the full prototype to add nodes, route requests, and inspect live traffic. open dashboard

Speak MCP natively — or any HTTP/SOCKS5 client works.

/// example
{
  "mcpServers": {
    "freeproxy": {
      "command": "freeproxy",
      "args": ["mcp", "--policy=sticky-by-domain"],
      "env": {
        "FP_KEY": "fp_live_••••••••••••"
      }
    }
  }
}
// exposes tools: fetch, crawl, choose_node,
//                authed_session, list_nodes

One config. Five tools. Zero lock-in.

Drop the snippet into Claude Desktop, Cursor, Cline, or any MCP-aware client. Your agent gains a verb-level model of your network — not just a proxy URL.

  • fetch — single request with rota policyauto retry, auto rotate on 429/403
  • crawl — multi-page, multi-noderespects robots.txt, rate-limits per-domain
  • authed_session — sticky cookie jarpinned to one node for login flows
  • choose_node — explicit selectionby tag, geo, latency, or name
  • list_nodes — introspect the rotaso the agent knows what's available

Take back the open web,
one node at a time.

$ brew install freeproxy && freeproxy up
open dashboard ★ star on github docker · linux/amd64 · linux/arm64 · darwin · windows · ios (testflight) · android
// freeproxy v0.4.2 — built where the wifi works ©2026 — released to the commons