Details for Proxy 54.179.39.14:3128

IP 54.179.39.14
Port 3128
Types/Protocols HTTP, HTTPS, SOCKS4, SOCKS5
Host ec2-54-179-39-14.ap-southeast-1.compute.amazonaws.com
Country SG Singapore (SG)
City Singapore
ISP AMAZON-02
Date Added 2025-01-07 13:09:38
Date Last Checked 2025-04-10 02:53:53
HTTP
Checks Total 52
Checks Successful 52
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-10 02:53:53
Last Failed Check
Last Response Time 0.52s
Ø Response Time 0.69s
Anonymity Level high anonymous
Via
Gateway 18.140.233.10
Retries 0
Headers
Stdout
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
    <head>
    <link href='http://fonts.googleapis.com/css?family=Sonsie+One' rel='stylesheet' type='text/css'>
    <style>
body
{
font-family: 'Sonsie One', cursive;
    color:white;
    background-color:#000;
}
</style>
        <title>Proxyjudge.info</title>
    </head>
    <body>
    <h1>ProxyJudge.info</h1>
        <pre>

HTTP_HOST = proxyjudge.info
HTTP_USER_AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
REMOTE_ADDR = 18.140.233.10
REQUEST_SCHEME = http
REMOTE_PORT = 60429
REQUEST_METHOD = GET
REQUEST_URI = http://httpheader.net/
REQUEST_TIME_FLOAT = 1744246402.8265493
REQUEST_TIME = 1744246402        <BR>SERVER = 20<BR>
</pre>
        <a href="http://blogadmin.freshdesk.com/support/home">What is proxyjudge.info</a> | <a href="http://blogadmin.freshdesk.com/support/home">Contact us</a>
    </body>
</html>
Stderr
Toggle
*   Trying 54.179.39.14:3128...
* Connected to (nil) (54.179.39.14) port 3128 (#0)
> GET http://httpheader.net/ HTTP/1.1
> Host: httpheader.net
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Thu, 10 Apr 2025 00:53:22 GMT
< Server: Apache/2.4.38 (Debian)
< Content-Type: text/html; charset=UTF-8
< Content-Length: 1002
< 
{ [1002 bytes data]
* Connection #0 to host (nil) left intact
HTTPS
Checks Total 52
Checks Successful 52
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-10 02:53:53
Last Failed Check
Last Response Time 1.06s
Ø Response Time 1.40s
Anonymity Level high anonymous
Via
Gateway 18.140.233.10
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 18.140.233.10
REMOTE_PORT = 55559
REQUEST_METHOD = GET
REQUEST_URI = /azenv.php
REQUEST_TIME_FLOAT = 1744246412.8767698
REQUEST_TIME = 1744246412
HTTP_HOST = aranguren.org
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 54.179.39.14:3128...
* Connected to (nil) (54.179.39.14) port 3128 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to aranguren.org:443
> CONNECT aranguren.org:443 HTTP/1.1
> Host: aranguren.org:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.1 200 OK
< Date: Thu, 10 Apr 2025 00:53:32 GMT
< Server: nginx
< Content-Type: text/plain
< Content-Length: 0
* Ignoring Content-Length in CONNECT 200 response
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [837 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=aranguren.org
*  start date: Apr 10 00:44:57 2024 GMT
*  expire date: Apr 10 00:44:57 2026 GMT
*  issuer: CN=Sectigo RSA Domain Validation Secure Server CA; O=Sectigo Limited; L=Salford; ST=Greater Manchester; C=GB
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5647b127b9f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/2
> Host: aranguren.org
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Thu, 10 Apr 2025 00:53:32 GMT
< server: squid/4.10
< content-length: 243
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
SOCKS4
Checks Total 52
Checks Successful 52
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-10 02:53:53
Last Failed Check
Last Response Time 1.07s
Ø Response Time 1.33s
Anonymity Level high anonymous
Via
Gateway 18.140.233.10
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 18.140.233.10
REMOTE_PORT = 63437
REQUEST_METHOD = GET
REQUEST_URI = /ken/env.cgi
REQUEST_TIME_FLOAT = 1744246422.945322
REQUEST_TIME = 1744246422
HTTP_HOST = depts.washington.edu
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 54.179.39.14:3128...
* SOCKS4 communication to depts.washington.edu:443
* SOCKS4 non-blocking resolve of depts.washington.edu
* SOCKS4 connect to IPv4 128.208.61.21 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (54.179.39.14) port 3128 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [844 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=depts.washington.edu
*  start date: Apr 10 00:53:42 2024 GMT
*  expire date: Apr 10 00:53:42 2026 GMT
*  issuer: CN=Sectigo RSA Domain Validation Secure Server CA; O=Sectigo Limited; L=Salford; ST=Greater Manchester; C=GB
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x55f9b51899f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /ken/env.cgi HTTP/2
> Host: depts.washington.edu
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Thu, 10 Apr 2025 00:53:42 GMT
< server: squid/4.10
< content-length: 251
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
SOCKS5
Checks Total 52
Checks Successful 52
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-10 02:53:53
Last Failed Check
Last Response Time 1.32s
Ø Response Time 1.57s
Anonymity Level high anonymous
Via
Gateway 18.140.233.10
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 18.140.233.10
REMOTE_PORT = 52483
REQUEST_METHOD = GET
REQUEST_URI = /azenv.php
REQUEST_TIME_FLOAT = 1744246433.2713034
REQUEST_TIME = 1744246433
HTTP_HOST = wfuchs.de
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 54.179.39.14:3128...
* SOCKS5 connect to IPv4 162.55.27.236:443 (locally resolved)
* SOCKS5 request granted.
* Connected to (nil) (54.179.39.14) port 3128 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [833 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=wfuchs.de
*  start date: Apr 10 00:44:46 2024 GMT
*  expire date: Apr 10 00:44:46 2026 GMT
*  issuer: CN=Sectigo RSA Domain Validation Secure Server CA; O=Sectigo Limited; L=Salford; ST=Greater Manchester; C=GB
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x55d83b92b9f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/2
> Host: wfuchs.de
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Thu, 10 Apr 2025 00:53:53 GMT
< server: squid/4.10
< content-length: 239
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact