VPC.KR
VPC.KR Blog • Mar 15, 2026 • 10 MIN READ

How to Get a Korean IP: WireGuard and SOCKS5 Setup on Korean VPS

Step-by-step tutorial to route your traffic through a Korean IP using SOCKS5 over SSH (5 minutes) or WireGuard VPN (team-wide). Works on Windows, macOS, and Linux.

How to Get a Korean IP: WireGuard and SOCKS5 Setup on Korean VPS

Get a Korean IP in Under 10 Minutes

This guide walks through two methods to get a stable Korean IP address using a VPC.KR VPS: SOCKS5 proxy (simplest, no client software required) and WireGuard VPN (for team-wide Korean IP access). Both methods work on Linux, macOS, and Windows.

Prerequisites: A VPC.KR VPS with SSH access. That's it.

Method 1: SOCKS5 Proxy via SSH (5 Minutes)

SSH's built-in SOCKS5 proxy is the fastest way to route specific applications through your Korean VPS IP. No server-side configuration needed.

Step 1: Open a SOCKS5 tunnel

ssh -D 1080 -N -q root@YOUR_VPS_IP

This opens a SOCKS5 proxy on your local port 1080. Keep this terminal open.

Step 2: Configure your browser

Chrome/Edge: Settings → System → Open computer's proxy settings → Manual proxy → SOCKS5 host: 127.0.0.1, port: 1080

Firefox: Settings → Network Settings → Manual proxy → SOCKS5: 127.0.0.1:1080 → enable "Proxy DNS"

Step 3: Verify your Korean IP

Visit whatismyip.com — you should see your VPS's Korean IP address.

For persistent connection (background):

ssh -D 1080 -N -q -f root@YOUR_VPS_IP

Method 2: WireGuard VPN (Team-Wide Korean IP)

WireGuard is a modern, fast VPN protocol ideal for permanent Korean IP configurations for a team or multiple devices.

Server-side setup (run on your Korean VPS)

# Install WireGuard
apt update && apt install -y wireguard

# Generate server keys
wg genkey | tee /etc/wireguard/server_private.key | wg pubkey > /etc/wireguard/server_public.key

# Create config
cat > /etc/wireguard/wg0.conf << EOF
[Interface]
PrivateKey = $(cat /etc/wireguard/server_private.key)
Address = 10.0.0.1/24
ListenPort = 51820
PostUp = iptables -A FORWARD -i wg0 -j ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
PostDown = iptables -D FORWARD -i wg0 -j ACCEPT; iptables -t nat -D POSTROUTING -o eth0 -j MASQUERADE
EOF

# Enable IP forwarding
echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf && sysctl -p

# Start WireGuard
systemctl enable --now wg-quick@wg0

Client-side setup

# Generate client keys
wg genkey | tee client_private.key | wg pubkey > client_public.key

# Client config (wg0.conf)
[Interface]
PrivateKey = CLIENT_PRIVATE_KEY
Address = 10.0.0.2/32
DNS = 8.8.8.8

[Peer]
PublicKey = SERVER_PUBLIC_KEY
Endpoint = YOUR_VPS_IP:51820
AllowedIPs = 0.0.0.0/0
PersistentKeepalive = 25

Add the client's public key to your server's wg0.conf [Peer] section, then run wg-quick up wg0 on the client.

Which Method Should You Choose?

Use Case Recommended Method
Coupang/Naver account management, personal useSOCKS5 via SSH
Team-wide Korean IP (multiple people/devices)WireGuard
Running 24/7 server-side bots or agentsDirect VPS (no proxy needed)

Start with VPC.KR Mini — $5.80/month

The Mini plan (KT ISP, Korean native IP) is sufficient for both SOCKS5 proxy use and running as a WireGuard gateway. You get a dedicated Korean IP that doesn't change, reliable uptime, and enough bandwidth for team proxy use.

Get Your Korean VPS — $5.80/month →

Stay ahead of the curve

Get the latest cloud and AI trends in your inbox.