IP | 104.37.135.145 |
Port | 4145 | Protocols | SOCKS4, SOCKS5 |
Country |
![]() |
ISP | PERFORMIVE |
Date Added | 2022-10-20 17:21:11 |
Date Last Checked | 2024-07-27 00:07:29 |
Checks Total | 357 |
Checks Successful | 288 |
Checks Failed | 69 |
Checks Failed Consecutive | 0 |
Ø Uptime | 80.67% |
Last Successful Check | 2024-07-27 00:07:29 |
Last Failed Check | 2024-05-18 00:08:24 |
Last Response Time | 3.07s |
Ø Response Time | 8.98s |
Anonymity Level | elite |
Retries | 0 |
Headers (in) |
Server Mojolicious (Perl) |
Output (success) |
Toggle<!doctype html> <html> <head> <meta charset="utf-8"> <title>Proxy Judge</title> </head> <body> <h1>Proxy Judge</h1> <pre> REMOTE_ADDR: 104.37.135.145 HTTP_HOST: proxydb.net HTTP_USER_AGENT: Mozilla/5.0 HTTP_ACCEPT: */* </pre> </body> </html> * Trying 104.37.135.145:4145... * SOCKS4 communication to proxydb.net:443 * SOCKS4 non-blocking resolve of proxydb.net * SOCKS4 connect to IPv4 85.214.115.35 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (104.37.135.145) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [155 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [10 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2838 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=proxydb.net * start date: Jul 25 22:05:53 2024 GMT * expire date: Jul 25 22:05:53 2025 GMT * issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /judge HTTP/1.1 > Host: proxydb.net > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Content-Length: 298 < Content-Type: text/html;charset=UTF-8 < Date: Fri, 26 Jul 2024 22:07:02 GMT < Server: Mojolicious (Perl) < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Output (fail) |
Toggle<html><body><h1>503 Service Unavailable</h1> No server is available to handle this request. </body></html> * Trying 104.37.135.145:4145... * SOCKS4 communication to depts.washington.edu:443 * SOCKS4 non-blocking resolve of depts.washington.edu * SOCKS4 connect to IPv4 128.208.60.35 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (104.37.135.145) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [155 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [10 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [3020 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=depts.washington.edu * start date: May 16 22:05:12 2024 GMT * expire date: May 16 22:05:12 2025 GMT * issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/1.1 > Host: depts.washington.edu > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 503 Service Unavailable < content-length: 107 < cache-control: no-cache < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 356 |
Checks Successful | 289 |
Checks Failed | 67 |
Checks Failed Consecutive | 0 |
Ø Uptime | 81.18% |
Last Successful Check | 2024-07-27 00:07:29 |
Last Failed Check | 2024-04-13 00:06:41 |
Last Response Time | 6.21s |
Ø Response Time | 9.22s |
Anonymity Level | elite |
Retries | 0 |
Headers (in) |
Server nginx/1.10.3 (Ubuntu) |
Output (success) |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> </head> <body> <pre> HTTP_ACCEPT = */* HTTP_USER_AGENT = Mozilla/5.0 HTTP_HOST = www.jremi.com REMOTE_PORT = 41617 REMOTE_ADDR = 104.37.135.145 HTTPS = on REQUEST_SCHEME = https REQUEST_URI = / REQUEST_METHOD = GET REQUEST_TIME_FLOAT = 1722031637.3532 REQUEST_TIME = 1722031637 </pre> </body> </html> * Trying 104.37.135.145:4145... * SOCKS5 connect to IPv4 172.245.17.83:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (104.37.135.145) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [155 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [10 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2830 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=*.jremi.com * start date: Jul 25 22:07:15 2024 GMT * expire date: Jul 25 22:07:15 2025 GMT * issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/1.1 > Host: www.jremi.com > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: nginx/1.10.3 (Ubuntu) < Date: Fri, 26 Jul 2024 22:07:17 GMT < Content-Type: text/html; charset=UTF-8 < Transfer-Encoding: chunked < Connection: keep-alive < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Output (fail) |
Toggle* Trying 104.37.135.145:4145... * After 15000ms connect time, move on! * connect to 104.37.135.145 port 4145 failed: Connection timed out * Connection timeout after 15001 ms * Closing connection 0 curl: (28) Connection timeout after 15001 ms |
Last Error | Connection timeout after 15001 ms |