IP | 68.71.247.130 |
Port | 4145 |
Types/Protocols | SOCKS4, SOCKS5 |
Country |
![]() |
ISP | PERFORMIVE |
Date Added | 2025-01-07 13:20:09 |
Date Last Checked | 2025-04-10 02:46:46 |
Checks Total | 52 |
Checks Successful | 52 |
Checks Failed | 0 |
Checks Failed Consecutive | 0 |
Ø Uptime | 100.00% |
Last Successful Check | 2025-04-10 02:46:46 |
Last Failed Check | – |
Last Response Time | 1.18s |
Ø Response Time | 2.57s |
Anonymity Level | high anonymous |
Via | – |
Gateway | – |
Retries | 0 |
Headers | – |
Stdout |
Toggle<html><head><title>Env.cgi</title></head><body> I am <B>uid=2001(ken) gid=15(users) groups=15(users)</B> on <B>depts01.u.washington.edu</B><br> Don't know who you are <h3><a name=env>My environment follows:</h3> <pre> _=*27067*/usr/bin/env CONTEXT_DOCUMENT_ROOT=/hw00/d01/ken/. CONTEXT_PREFIX=/ken DOCUMENT_ROOT=/www GATEWAY_INTERFACE=CGI/1.1 HTTPS=on HTTP_ACCEPT=*/* HTTP_HOST=depts.washington.edu HTTP_USER_AGENT=Mozilla/5.0 PATH=/usr/local/bin:/usr/bin:/bin PWD=/nfs/aesop1/hw00/d01/ken QUERY_STRING= REMOTE_ADDR=68.71.247.130 REMOTE_PORT=45554 REQUEST_METHOD=GET REQUEST_SCHEME=https REQUEST_URI=/ken/env.cgi SCRIPT_FILENAME=/hw00/d01/ken/env.cgi SCRIPT_NAME=/ken/env.cgi SERVER_ADDR=128.208.61.125 SERVER_ADMIN=help@uw.edu SERVER_NAME=depts.washington.edu SERVER_PORT=443 SERVER_PROTOCOL=HTTP/2.0 SERVER_SIGNATURE= SERVER_SOFTWARE=Apache SHLVL=1 SSL_CIPHER=ECDHE-RSA-AES256-GCM-SHA384 SSL_CIPHER_ALGKEYSIZE=256 SSL_CIPHER_EXPORT=false SSL_CIPHER_USEKEYSIZE=256 SSL_CLIENT_VERIFY=NONE SSL_COMPRESS_METHOD=NULL SSL_PROTOCOL=TLSv1.2 SSL_SECURE_RENEG=true SSL_SERVER_A_KEY=rsaEncryption SSL_SERVER_A_SIG=sha256WithRSAEncryption SSL_SERVER_I_DN=CN=R10,O=Let's Encrypt,C=US SSL_SERVER_I_DN_C=US SSL_SERVER_I_DN_CN=R10 SSL_SERVER_I_DN_O=Let's Encrypt SSL_SERVER_M_SERIAL=03471B068DA25813154CC58C53993DF1FCD7 SSL_SERVER_M_VERSION=3 SSL_SERVER_SAN_DNS_0=courses.washington.edu SSL_SERVER_SAN_DNS_1=depts.washington.edu SSL_SERVER_SAN_DNS_2=faculty.washington.edu SSL_SERVER_SAN_DNS_3=staff.washington.edu SSL_SERVER_SAN_DNS_4=www.courses.washington.edu SSL_SERVER_SAN_DNS_5=www.depts.washington.edu SSL_SERVER_SAN_DNS_6=www.faculty.washington.edu SSL_SERVER_SAN_DNS_7=www.staff.washington.edu SSL_SERVER_S_DN=CN=depts.washington.edu SSL_SERVER_S_DN_CN=depts.washington.edu SSL_SERVER_V_END=May 8 18:07:05 2025 GMT SSL_SERVER_V_START=Feb 7 18:07:06 2025 GMT SSL_SESSION_ID=773179abadb0eb354c25d2f994867063e5f0ccd06a311ed70341fd624cc72465 SSL_SESSION_RESUMED=Resumed SSL_VERSION_INTERFACE=mod_ssl/2.4.56 SSL_VERSION_LIBRARY=OpenSSL/1.0.2k-fips A__z="*SHLVL </pre> <h3>Stuff on stdin follows</h3> <pre> </pre> End of stdin </body></html> |
Stderr |
Toggle* Trying 68.71.247.130:4145... * SOCKS4 communication to depts.washington.edu:443 * SOCKS4 non-blocking resolve of depts.washington.edu * SOCKS4 connect to IPv4 128.208.60.35 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (68.71.247.130) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [155 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [10 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [3020 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 9 00:44:52 2025 GMT * expire date: Apr 9 00:44:52 2026 GMT * issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/1.1 > Host: depts.washington.edu > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 < vary: Accept-Encoding < content-type: text/html < date: Thu, 10 Apr 2025 00:46:35 GMT < server: Apache < set-cookie: _affinity=d01|Z/cU7; path=/; HttpOnly; Secure < transfer-encoding: chunked < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 52 |
Checks Successful | 48 |
Checks Failed | 4 |
Checks Failed Consecutive | 0 |
Ø Uptime | 92.31% |
Last Successful Check | 2025-04-10 02:46:46 |
Last Failed Check | 2025-03-30 03:45:34 |
Last Response Time | 1.50s |
Ø Response Time | 2.49s |
Anonymity Level | high anonymous |
Via | – |
Gateway | – |
Retries | 0 |
Headers | – |
Stdout |
Toggle<html><head><title>Env.cgi</title></head><body> I am <B>uid=2001(ken) gid=15(users) groups=15(users)</B> on <B>depts03.u.washington.edu</B><br> Don't know who you are <h3><a name=env>My environment follows:</h3> <pre> _=*748*/usr/bin/env CONTEXT_DOCUMENT_ROOT=/hw00/d01/ken/. CONTEXT_PREFIX=/ken DOCUMENT_ROOT=/www GATEWAY_INTERFACE=CGI/1.1 HTTPS=on HTTP_ACCEPT=*/* HTTP_HOST=depts.washington.edu HTTP_USER_AGENT=Mozilla/5.0 PATH=/usr/local/bin:/usr/bin:/bin PWD=/nfs/aesop1/hw00/d01/ken QUERY_STRING= REMOTE_ADDR=68.71.247.130 REMOTE_PORT=41978 REQUEST_METHOD=GET REQUEST_SCHEME=https REQUEST_URI=/ken/env.cgi SCRIPT_FILENAME=/hw00/d01/ken/env.cgi SCRIPT_NAME=/ken/env.cgi SERVER_ADDR=128.208.61.62 SERVER_ADMIN=help@uw.edu SERVER_NAME=depts.washington.edu SERVER_PORT=443 SERVER_PROTOCOL=HTTP/2.0 SERVER_SIGNATURE= SERVER_SOFTWARE=Apache SHLVL=1 SSL_CIPHER=ECDHE-RSA-AES256-GCM-SHA384 SSL_CIPHER_ALGKEYSIZE=256 SSL_CIPHER_EXPORT=false SSL_CIPHER_USEKEYSIZE=256 SSL_CLIENT_VERIFY=NONE SSL_COMPRESS_METHOD=NULL SSL_PROTOCOL=TLSv1.2 SSL_SECURE_RENEG=true SSL_SERVER_A_KEY=rsaEncryption SSL_SERVER_A_SIG=sha256WithRSAEncryption SSL_SERVER_I_DN=CN=R10,O=Let's Encrypt,C=US SSL_SERVER_I_DN_C=US SSL_SERVER_I_DN_CN=R10 SSL_SERVER_I_DN_O=Let's Encrypt SSL_SERVER_M_SERIAL=03471B068DA25813154CC58C53993DF1FCD7 SSL_SERVER_M_VERSION=3 SSL_SERVER_SAN_DNS_0=courses.washington.edu SSL_SERVER_SAN_DNS_1=depts.washington.edu SSL_SERVER_SAN_DNS_2=faculty.washington.edu SSL_SERVER_SAN_DNS_3=staff.washington.edu SSL_SERVER_SAN_DNS_4=www.courses.washington.edu SSL_SERVER_SAN_DNS_5=www.depts.washington.edu SSL_SERVER_SAN_DNS_6=www.faculty.washington.edu SSL_SERVER_SAN_DNS_7=www.staff.washington.edu SSL_SERVER_S_DN=CN=depts.washington.edu SSL_SERVER_S_DN_CN=depts.washington.edu SSL_SERVER_V_END=May 8 18:07:05 2025 GMT SSL_SERVER_V_START=Feb 7 18:07:06 2025 GMT SSL_SESSION_ID=7df78b2013fc06c342e81827d2e85ed88d40e49b16d7882d40313f9355b3e7d5 SSL_SESSION_RESUMED=Resumed SSL_VERSION_INTERFACE=mod_ssl/2.4.56 SSL_VERSION_LIBRARY=OpenSSL/1.0.2k-fips A__z="*SHLVL </pre> <h3>Stuff on stdin follows</h3> <pre> </pre> End of stdin </body></html> |
Stderr |
Toggle* Trying 68.71.247.130:4145... * SOCKS5 connect to IPv4 128.208.61.21:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (68.71.247.130) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [155 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [10 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [3020 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 9 00:44:52 2025 GMT * expire date: Apr 9 00:44:52 2026 GMT * issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/1.1 > Host: depts.washington.edu > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 < vary: Accept-Encoding < content-type: text/html < date: Thu, 10 Apr 2025 00:46:45 GMT < server: Apache < set-cookie: _affinity=d03|Z/cU+; path=/; HttpOnly; Secure < transfer-encoding: chunked < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 68.71.247.130:4145... * SOCKS5 connect to IPv4 162.55.27.236:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (68.71.247.130) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.0 (OUT), TLS header, Unknown (21): } [5 bytes data] * TLSv1.3 (OUT), TLS alert, decode error (562): } [2 bytes data] * error:0A000126:SSL routines::unexpected eof while reading * Closing connection 0 curl: (35) error:0A000126:SSL routines::unexpected eof while reading |