Lure and distract a dangerous creature with fresh fish, or just swim as fast as possible so as not to nibble on the jaws of stray predators.Ĭoping with pressure: Create a waterproof pressure-responsive Nanosuit or PRAWN suit and explore extreme depths and temperatures.
ACTIVE PROXY LIST TXT FULL
What brought you down? What infects marine life? Who built the mysterious structures scattered across the ocean? Can you find a way to escape the planet alive?ĭisrupt the Food Chain: The ocean is full of life: use the ecosystem to help yourself. Unravel the Mystery: What happened to this planet? There are many signs that something is wrong. Use your base to store resources, park and replenish oxygen as you explore the endless ocean. Choose layout and composition and manage body integrity as depth and pressure increase. Go deeper and deeper to find rarer resources to craft more advanced items.īuild an underwater habitat: Build a base under the sea. Fabricated diving equipment, flashlights, accommodation units and submarines. Collect resources from the ocean around you. Water is good for life: some are helpful, most are harmful.Ĭollect garbage, build and survive: After crashing into the Life Pod, time passes to find water, food, and the device design you need to research. Manage oxygen supplies as you explore kelp, plateaus, coral reefs, and winding cave systems. Subnautica's oceans range from sun-drenched shallow coral reefs to treacherous deep-sea trenches, lava fields and bioluminescent underwater rivers. A huge open-world full of wonders and dangers awaits you!ĭive into the vast underwater world: You've landed in an alien ocean world and the only way down is down. You can request access to the API from technical support.Subnautica is an underwater adventure game set on an alien ocean planet.
ACTIVE PROXY LIST TXT DOWNLOAD
If this is an important parameter for you, it is better to check it directly from the device where the proxy will be used.įor owners of paid subscription, you can download the proxy list in. The easiest way is to focus on the color of the strip: green is fast, and red is slow. You can see how fast a small text file was uploaded via proxy. The speed is indicated in milliseconds, but it is not a ping. High anonymity: The remote server does not know your IP, and it has no direct evidence that you are using a proxy.Average anonymity: The remote server knows that you are using a proxy and thinks that it knows your IP, but it is not yours (these are usually multi-network proxies that show the remote server the incoming interface as REMOTE_ADDR).Low anonymity: The remote server does not know your IP, but knows that you are using a proxy.No anonymity: The remote server knows your IP address and knows that you are using a proxy.This determines whether your real address will be hidden and whether or not the destination server will suspect that you're using a proxy.Īnonymity categories that are in our proxy list: Proxy anonymity is a very important parameter. Additional features include use of the UDP Protocol, the ability to make DNS requests through a proxy, and use of the BIND method to open the port for incoming connections. Socks 5: Includes all the features of version 4.They can be used to connect over TCP / IP protocol to any address and port. Socks 4: Proxies that support the SOCKS protocol version 4.Using specialized programs, they can be used for any protocol, like SOCKS proxy servers. HTTPS: Also called SSL-enabled proxy servers.You can use them to view websites and download files over HTTP. HTTP: regular proxies that support HTTP requests.The right column in the list shows how long ago the check was performed.Īll proxy servers in the list are checked and sorted according to various parameters.įor example, the type of proxy depends on how you will be able to use it. Please note that these are not our own proxies, so we can not be held responsible for their performance and stability, but only show their status at the time of verification. They are collected automatically by the "spider robot" from thousands of different sites on the internet, including closed forums and even some private proxy databases. Proxies from our list do not belong to us. For example, when mass action is required from multiple IP addresses simultaneously, such as parsing, increasing views, visits, removing limits on the number of requests from online services, etc. Proxies are needed when using a VPN is either impossible or inconvenient.