Do a search for "proxy chains", however I don't know if that will help much, since its going through different proxies, instead of cycling through them.
Another thing you could do is, look into Metasploit, and see if there is any vulnerabilities for the type of ftp server you are trying to attack.