MENU
GET LISTED
GET LISTED
SHOW ALLPOPULAR CATEGORIES

Price

$2

Logo of Proxy.sh
Ask Vendor A QuestionFind A Better App
Logo of Proxy.sh

Proxy.sh REVIEW

VPN Services

4 user reviews
USER SATISFACTION N/A
OUR SCORE 7.6

What is Proxy.sh?

Proxy.sh VPN is a Seychelles-based VPN service built and designed by a nonprofit organization whose members are comprised of anonymous individuals from different countries: Argentina, Belgium, Bulgaria, Germany, Laos, Philippines, Russia, Seychelles, Spain, Switzerland, and Thailand. Reliable and transparent, Proxy.sh VPN is designed for NGOs, activists, human rights advocates, and educational and scientific researchers.

Offering more than 300 servers in 57 countries, Proxy.sh VPN is strongly encrypted. It is using different encryption methods and protocols which include TOR, SoftEther, ECC, obfsproxy, and XOR.  Because of this, users are ensured that their other online activities are secured, as the VPN service allows them to encrypt their traffic data using its advanced encryption methods and protocols.

Connecting to the Proxy.sh VPN network is also simple and easy. It enables users to easily adjust and configure their account and network settings through the aid of its VPN application called Safejumper. By tapping on the interface of this application, they will also be able to automatically transfer or jump to the next server location of the VPN. Last but not the least, Proxy.sh incorporates transparency in its operation.

Overview of Proxy.sh Benefits

Proxy.sh VPN is simple to use. Users need to download and install first the custom VPN client or application that it is using called Safejumper. This application has an easy to use interface. Once Safejumper is installed, they will then be able to connect to the Proxy.sh VPN network easily. They will be able to effortlessly select the network location and protocol they want to connect to. The Safejumper icon will turn green when users are already connected to the VPN network. If they want to jump from one network location to another, they can also easily do that by simply tapping on the Safejumper interface.

Another interesting feature of Proxy.sh VPN is its utilization of multiple encryption methods and protocols. It is using advanced encryption protocols such as  OpenVPN-TCP (256 bit encryption), OpenVPN-UDP (256 bit encryption), PPTP (MPPE 128bit cipher) and L2TP (256 bit encryption).

In addition, Proxy.sh VPN offers proxy technologies that are using various encryption methods and protocols. These include TOR, SoftEther, ECC, obfsproxy, and XOR.  The VPN service also regularly researches and updates its encryption methods and protocols, enabling users to utilize up to date encryption. With this feature, they are ensured that their online activities are always kept private and their digital assets are secured.

Furthermore, Proxy.sh VPN, unlike other VPN services, doesn’t keep a record of connection logs from their users. Proxy.sh VPN records their email addresses of its users that they are using to pay for their subscription package and the specific type of package they are subscribed to.

Proxy.sh VPN also offers unique features that promote transparency. One of these features is its warrant canary. Warrant Canary is a method used by communication service providers to passively inform their users or subscribers that a court or the government has not issued them a secret court order or secret subpoena for the purpose of surveillance or secretly gathering information from their users.

A secret court order or subpoena can prohibit communication service providers to make statements to their users, disclosing any information related to such court order or subpoena. So, one way for them to communicate to their users that such secret court order or subpoena has already been served is through their warrant canary. Thus, a warrant canary is a sign or message posted to a website that communication service providers can use strategically to alert their users that the government will conduct a surveillance and will secretly obtain information about their users.

Proxy.sh provides a warrant canary on a daily basis. Hence, when this message or sign disappears on a certain day, and users can’t see it anymore,  it only means that the government has already issued a secret subpoena to Proxy.sh. This unique feature ensures users that their privacy shouldn’t be compromised in any way.

Moreover, Proxy.sh also has a transparency report which it uses to inform users on network updates or any viable information they need. Proxy.sh can also use its transparency report to inform them about the issuance of a court order or subpoena.

Overview of Proxy.sh Features

  • Simple To Use
  • OpenVPN made easy
  • Easy To Use Safejumper Application Interface
  • Transfer from one Network Location to another
  • Strong Encryption
  • Multiple Encryption Methods and Protocols
  • Researching and Updating of Encryption
  • 100% Non-Logging
  • Proxy Technologies Support
  • Transparently Operated
  • Warranty Canary on Daily Basis
  • Transparency Report
  • Worldwide Network
  • Unblock Everything
  • Unique Ethical Approach
  • For NGOs, activists, and researchers

Proxy.sh Position In Our Categories

Position of Proxy.sh in our main categories:

50

Proxy.sh is one of the top 50 VPN Services products

50

Proxy.sh is one of the 50
VPN Services products


If you are considering Proxy.sh it could also be sensible to investigate other subcategories of Best VPN Services listed in our database of SaaS software reviews.

There are popular and widely used solutions in each software group. But are they necessarily the best fit for your company’s unique requirements? A market-leading software solution may have thousands of customers, but does it offer what you need? For this reason, do not blindly shell out for popular systems. Read at least a few Proxy.sh reviews and think about the factors that you want in the software such as the fees, main functionality, available integrations etc. Then, select a few systems that fit your requirements. Try out the free trials of these platforms, read online opinions, get information from the seller, and do your homework meticulously. This exhaustive research is sure to aid you select the best software solution for your company’s unique wants.

How Much Does Proxy.sh Cost?

Proxy.sh VPN offers four SMB and enterprise pricing plans for users to choose from. Give the details a look, and choose the best plan for your organization:

Proxy.sh VPN Quick Plan

  • $2/72hr
  • 1Gbps Shared (30+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 2 countries available

Proxy.sh VPN Basic Plan

  • $5/mo. – billed monthly
  • $3.33/mo – billed annually
  • 1Gbps Shared (50+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 5 countries available

Proxy.sh VPN Solid Plan

  • $10/mo. – billed monthly
  • $7.50/mo – billed annually
  • 1Gbps Shared (300+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 57 countries available

Proxy.sh VPN Pro Plan

  • $20/mo. – billed monthly
  • $16.66/mo – billed annually
  • 50Gbps Premium Network (7 nodes)
  • Access to $10 network/features
  • Generous quota (250GB/mo)
  • Access to multi-hop technology
  • Early access to new features
  • Early access to Safejumper betas

User Satisfaction

We realize that when you make a decision to buy VPN Services it’s important not only to see how experts evaluate it in their reviews, but also to find out if the real people and companies that buy it are actually satisfied with the product. That’s why we’ve created our behavior-based Customer Satisfaction Algorithm™ that gathers customer reviews, comments and Proxy.sh reviews across a wide range of social media sites. The data is then presented in an easy to digest form showing how many people had positive and negative experience with Proxy.sh. With that information at hand you should be equipped to make an informed buying decision that you won’t regret.

POSITIVE SOCIAL MENTIONS

0

NEGATIVE SOCIAL MENTIONS

0

Video

Technical details

Devices Supported
  • Windows
  • Linux
  • Android
  • iPhone/iPad
  • Mac
  • Web-based
Language Support
  • English
  • Germany
  • India
  • Japan
  • Spain
  • France
  • Russia
  • Italy
  • Dutch
  • Portugal
  • Polish
  • Turkish
  • Swedish
Pricing Model
  • Monthly payment
  • Annual Subscription
Customer Types
  • Small Business
  • Large Enterprises
  • Medium Business
  • Freelancers
Deployment
  • Cloud Hosted
  • On Premise
  • Open API

What Support Does This Vendor Offer?

  • EMAIL
  • LIVE SUPPORT
  • TRAINING
  • TICKETS

Proxy.sh User Reviews


Clint 7 months ago
Verified
user



Melody 8 months ago
Verified
user



Camille 8 months ago
Verified
user



Bob 8 months ago
Verified
user


What are Proxy.sh pricing details?

Proxy.sh VPN offers four SMB and enterprise pricing plans for users to choose from. Give the details a look, and choose the best plan for your organization:

Proxy.sh VPN Quick Plan

  • $2/72hr
  • 1Gbps Shared (30+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 2 countries available

Proxy.sh VPN Basic Plan

  • $5/mo. – billed monthly
  • $3.33/mo – billed annually
  • 1Gbps Shared (50+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 5 countries available

Proxy.sh VPN Solid Plan

  • $10/mo. – billed monthly
  • $7.50/mo – billed annually
  • 1Gbps Shared (300+ nodes)
  • Unlimited Bandwidth
  • Safejumper & OpenVPN
  • SoftEther, CGIProxy
  • Extras (DNS, TOR, SOCKS, etc.)
  • 57 countries available

Proxy.sh VPN Pro Plan

  • $20/mo. – billed monthly
  • $16.66/mo – billed annually
  • 50Gbps Premium Network (7 nodes)
  • Access to $10 network/features
  • Generous quota (250GB/mo)
  • Access to multi-hop technology
  • Early access to new features
  • Early access to Safejumper betas

What integrations are available for Proxy.sh?

Proxy.sh VPN supports integration with Github. It also works with other VPN providers.

User reviews


User reviews in total: 4

2
2
0
0
0

Average Rating:

Write your own review of this product

Add a review

The most favorable review

Melody

8 months ago


Pros: I like that it gives me add-on options to my connection to enhance privacy. For example, I can use XOR scrambling to bypass restrictions on OpenVPN packets. I read the VPN also allows using Tor’s obfsproxy to hide your connection. They also hide your IP for billing and payments. I notice that’s a privacy gap in other VPN services.

Cons: It’s a good deal, I have no complaints whatsoever.

The least favorable review

Clint

7 months ago


Pros: I’m sure a lot of users will be happy to know this VPN permits torrents. The feeling of not being restricted by your provider is counterintuitive, but, truth be told, many “honest” VPNs can be annoyingly self-righteous. Be honest, VPNs aren’t only for security reasons, we need privacy because we’re hiding something.

Cons: I heard it does keep some of your logs.

Published 7 months ago
Verified
user
I’m sure a lot of users will be happy to know this VPN permits torrents. The feeling of not being restricted by your provider is counterintuitive, but, truth be told,...



What do you think about this review? Great Poor
Published 8 months ago
Verified
user
I like that it gives me add-on options to my connection to enhance privacy. For example, I can use XOR scrambling to bypass restrictions on OpenVPN packets. I read the...



What do you think about this review? Great Poor
Published 8 months ago
Verified
user
I got walked through during installation. The support rep was cool and patient even as I asked dumb newbie questions. They have a live chat that actually works! I know...



What do you think about this review? Great Poor
Published 8 months ago
Verified
user
You can utilize TOR’s Obfsprocy, OpenVPN ECC+XOR, L2TP/SoftEther and CGIProxy. Your connection can be modified in many ways that you deem fit to increase your privacy....



What do you think about this review? Great Poor

Thank you for submitting your review!

In order to ensure high-quality of our reviews we'll have to verify your email address. Please insert your email address below.

Thank you!

A verification email has been sent to the address you provided. Please click on the link in that email to finalize your review submission.

Page last modified

Share
Tweet
+1
Share