🛡️ Mullvad's Hidden Proxy Network — 523 SOCKS5 Servers You're Not Using

:shield: Auto-Updated Daily — Every Active Mullvad SOCKS5 Proxy Server in One List

Double-hop your traffic through Mullvad’s internal proxy network. Different exit IP per app. Fewer CAPTCHAs. Zero extra cost.

Every Mullvad WireGuard server secretly runs a proxy on port 1080. Think of it as a second door — your VPN connects to one country, but you can send your browser out through a completely different one. Same subscription, no extra cost. The GitHub list below auto-scrapes all 523 active proxy servers daily, so you’re never working with stale data.


📡 The Live Server List — 523 Proxies, Auto-Updated Every 24hrs

This GitHub repo runs a daily scrape via GitHub Actions and pushes the current list of every active Mullvad SOCKS5 server — country, city, IPv4, IPv6, speed rating, multihop port, provider, and hostname.

:link: Raw list (bookmark this): mullvad-socks-list.txt

:link: GitHub repo: maximko/mullvad-socks-list

What each column means:

Column What It Tells You
flag / country / city Physical server location
socks5 Internal proxy IP (this is what you enter in your app)
ipv4 / ipv6 The public exit IPs websites will see
speed Server capacity rating
multihop Port number for multihop routing
owned Whether Mullvad owns the hardware (vs rented)
provider Hosting company (M247, DataPacket, xtom, etc.)
hostname Server identifier (e.g., us-nyc-wg-301)

:light_bulb: Bookmark the raw .txt link — it always serves the latest snapshot. No manual checking needed.

⚠️ Before You Start — This Only Works Inside Mullvad

You must be connected to Mullvad VPN first. These proxies live on Mullvad’s internal network (10.124.x.x) — they’re not public. Without an active Mullvad connection, they simply don’t exist to your device.

What’s actually happening when you use this:

  1. You connect to Mullvad VPN — use WireGuard, not OpenVPN (WireGuard unlocks ALL proxy locations, OpenVPN limits you to only the server you’re connected to)
  2. You tell a specific app (browser, torrent client, whatever) to route through a proxy on a different Mullvad server
  3. Your traffic now takes two hops: your device → VPN server → SOCKS5 proxy exit → destination

Why bother? Four reasons:

  • Different exit IP per app — browser exits US, torrent client exits Switzerland, same VPN connection
  • Fewer CAPTCHAs — the proxy gives you one consistent IP instead of Mullvad’s shared rotating pool, so websites trust you more
  • Passive leak protection — forget to start Mullvad? The proxy is unreachable, so your browser just stops loading. Nothing leaks.
  • Free multihop — your ISP sees country A, the destination sees country B, nobody sees you

No Mullvad subscription? This list won’t help you. It’s an internal feature, not a free proxy dump.

🔧 Setup — Firefox, Chrome, and System-Wide

Firefox (easiest — 60 seconds):

  1. Settings → search “network” → click Settings
  2. Select Manual proxy configuration
  3. Leave HTTP and HTTPS proxy fields empty
  4. SOCKS Host: pick any server IP from the list (e.g., 10.124.0.36 for Sydney)
  5. Port: 1080
  6. Check SOCKS v5
  7. Check Proxy DNS when using SOCKS v5 (prevents DNS leaks, but disables Mullvad’s DNS content blockers)

Chrome / Brave / Edge (one extra step — needs terminal):

These browsers don’t have a built-in proxy settings page like Firefox. You launch them from your terminal with a special flag:

chrome --proxy-server="socks5://10.124.0.36:1080" --host-resolver-rules="MAP * ~NOTFOUND , EXCLUDE 10.64.0.1"

Replace 10.124.0.36 with any server IP from the list. The second flag (--host-resolver-rules) stops Chrome from leaking your DNS outside the proxy — skip it and websites can still see your real location.

macOS System-Wide:

System Preferences → Network → active connection → Advanced → Proxies → check “SOCKS Proxy” → enter the server IP and port 1080.

:high_voltage: Verify it’s working: Go to Mullvad Connection Check → expand the top-left box → look for “SOCKS through”. See it? You’re double-hopped.

⚡ Power Tools — Skip the Manual Config

Don’t want to type IPs and port numbers? These tools do it for you:

Tool What It Does Link
Mullvad Browser Extension One-click location switching inside Firefox. Pick country/city from a dropdown — zero manual config. Firefox Add-on
mullvad-proxy (browser ext) Open-source unofficial Firefox extension. Full server list, works with WireGuard. GitHub
APT37/mullvad-socks Rust CLI — filter proxies by country, city, weight, online status. Made for scripting and automation. GitHub
mullvad-proxy (Docker) Containerized Mullvad exposing HTTP + SOCKS5 to your network. Per-app VPN without system-wide routing. GitHub
PAC Script Randomizer Every browser request exits through a different random proxy. Rotating IPs per request. Guide by K4YT3X
Mullvad Browser Firefox fork by Mullvad + Tor Project. Anti-fingerprinting hardened. SOCKS5 extension built in. mullvad.net/browser

:light_bulb: Fastest path: Mullvad Browser Extension on Firefox → connect to WireGuard → click extension → pick exit country. 30 seconds, done.


:high_voltage: Quick Hits

Want Do
:bullseye: Full server list Raw .txt (auto-updated daily)
:wrench: One-click setup Mullvad Browser Extension on Firefox
:spouting_whale: Docker proxy bernardko/mullvad-proxy — HTTP + SOCKS5 exposed to network
:game_die: Random IP per request PAC script guide
:white_check_mark: Verify it works Mullvad Connection Check — look for “SOCKS through”

523 proxies. Daily updates. Double-hop your traffic for free — Mullvad just doesn’t advertise it.

11 Likes

Thank you for the share @premiumvpnshield very useful stuffs

Thanks, It works great! keep sharing cool things like this lol