需求描述
从网络上,采集了10多万个HTTP/HTTPS/SOCKS4/SOCKS5的普通代理,有时候,其中一些的IP归属的地区,还是蛮不错的,想要用它作为落地IP
网络链路,客户端v – 服务端v – 普通socks5
服务器的配置
参考
出站配置 https://www.v2fly.org/config/outbounds.html
协议配置 https://www.v2fly.org/config/protocols/socks.html
完成
服务端的配置文件
{ "log": { "access": "./access.log", "error": "./error.log", "loglevel": "info" }, "inbound": { "port": 18125, "protocol": "vmess", "settings": { "clients": [ { "id": "9299c14f-b3e0-e937-2ec8-5992a8cc3211", "level": 1, "alterId": 4 } ] } }, "outbound": { "protocol": "socks", "settings": { "servers": [ { "address": "117.27.*.153", "port": 1080, "users": [] } ] } }, "routing": { "strategy": "rules", "settings": { "rules": [ { "type": "field", "ip": [ "0.0.0.0/8", "10.0.0.0/8", "100.64.0.0/10", "127.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12", "192.0.0.0/24", "192.0.2.0/24", "192.168.0.0/16", "198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "::1/128", "fc00::/7", "fe80::/10" ], "outboundTag": "blocked" } ] } } } # 其中117.27.*.153为socks5的IP,1080为socks5的端口。
客户端配置
{ "inbound": { "listen": "127.0.0.1", "port": 10808, "protocol": "socks", "settings": { "auth": "noauth", "udp": false, "ip": "127.0.0.1" } }, "outbound": { "protocol": "vmess", "settings": { "vnext": [ { "address": "183.23.78.5", "port": 18888, "users": [ { "id": "9299c14f-b3e0-e937-2ec8-5992a8cc3211", "level": 1, "alterId": 4 } ] } ] } } } # 其中183.23.78.5为SERVER的IP,18888为SERVER的端口。
附录1
发现一个有趣的现象,有人直接把socks5暴露在国内的IP上,实际落地IP是在海外,相当于,其已经打通了一个管道。比如,福建电信的socks5://117.27.*.153:1080就是这样的情况,使用它的时候,它实际的IP是在美国的甲骨文机房IP-221.141.*.130,你们城里人真会玩!
赞助