Details for Proxy 125.141.200.7:80

IP 125.141.200.7
Port 80
Protocols HTTPS
Host
Country Korea, Republic of (KR) KR
City -
Region -
ISP AS4766 Korea Telecom
Date Added 2018-01-03 10:59:06
Date Last Checked 2018-01-23 18:59:21
HTTPS
Checks Total 23
Checks Successful 22
Checks Failed 1
Checks Failed Consecutive 0
Ø Uptime 95.65%
Last Successful Check 2018-01-23 18:59:21
Last Failed Check 2018-01-12 20:12:10
Last Response Time 3.16s
Ø Response Time 3.07s
Anonymity Level Elite
Via -
Gateway -
Retries 0
Headers -
Output (success)
{"headers":{"Host":"proxydb.net","User-Agent":"curl\/7.57.0"},"id":"ProxyDB","ip":"125.141.200.7"}
*   Trying 125.141.200.7...
* TCP_NODELAY set
* Connected to 125.141.200.7 (125.141.200.7) port 80 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to proxydb.net:443
> CONNECT proxydb.net:443 HTTP/1.1
> Host: proxydb.net:443
> User-Agent: curl/7.57.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.0 200 Connection established
< Proxy-agent: Eric's Proxy Server1.0
< Content-Type: application/tunnel
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: none
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* CONNECT phase completed!
* CONNECT phase completed!
* TLSv1.2 (IN), TLS handshake, Server hello (2):
{ [94 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [1387 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [589 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
{ [1 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* Server certificate:
*  subject: C=AU; ST=Some-State; O=Internet Widgits Pty Ltd
*  start date: Oct 25 08:55:48 2017 GMT
*  expire date: Jul 20 08:55:48 2020 GMT
*  issuer: C=AU; ST=Some-State; O=Internet Widgits Pty Ltd
*  SSL certificate verify result: self signed certificate (18), continuing anyway.
> GET /judge HTTP/1.1
> Host: proxydb.net
> User-Agent: curl/7.57.0
> 
< HTTP/1.1 200 OK
< Content-Type: application/json;charset=UTF-8
< Date: Tue, 23 Jan 2018 17:59:18 GMT
< Content-Length: 98
< 
{ [98 bytes data]
* Connection #0 to host 125.141.200.7 left intact
Output (fail)

                                
*   Trying 125.141.200.7...
* TCP_NODELAY set
* Connected to 125.141.200.7 (125.141.200.7) port 80 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to proxydb.net:443
> CONNECT proxydb.net:443 HTTP/1.1
> Host: proxydb.net:443
> User-Agent: curl/7.57.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.0 200 Connection established
< Proxy-agent: Eric's Proxy Server1.0
< Content-Type: application/tunnel
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: none
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* CONNECT phase completed!
* CONNECT phase completed!
* OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to proxydb.net:443 
* Closing connection 0
curl: (35) OpenSSL SSL_connect: SSL_ERROR_SYSCALL in connection to proxydb.net:443