Details for Proxy 110.34.3.229:3128

IP 110.34.3.229
Port 3128
Protocols HTTPS
Country Nepal (NP) NP
ISP Subisu Cablenet Pvt Ltd, Baluwatar, Kathmandu, Nepal
Date Added 2023-11-27 03:29:47
Date Last Checked 2023-11-30 01:24:08
HTTPS
Checks Total 3
Checks Successful 2
Checks Failed 1
Checks Failed Consecutive 0
Ø Uptime 66.67%
Last Successful Check 2023-11-30 01:24:08
Last Failed Check 2023-11-28 01:32:02
Last Response Time 3.32s
Ø Response Time 4.08s
Anonymity Level elite
Retries 0
Headers (in)
Proxy-agent  Apache/2.4.54 (Win64) OpenSSL/1.1.1o
Server       Apache/2.4.38 (Debian)
Output (success)
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
    <head>
    <link href='https://fonts.googleapis.com/css?family=Sonsie+One' rel='stylesheet' type='text/css'>
    <style>
body
{
font-family: 'Sonsie One', cursive;
    color:white;
    background-color:#000;
}
</style>
        <title>httpHeader.net</title>
    </head>
    <body>
    <h1>httpHeader.net</h1>
        <pre>
            
HTTPS = on
HTTP_HOST = httpheader.net
HTTP_USER_AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
REMOTE_ADDR = 110.34.3.229
REQUEST_SCHEME = https
REMOTE_PORT = 62009
REQUEST_METHOD = GET
REQUEST_URI = /
REQUEST_TIME_FLOAT = 1701303847.8108
REQUEST_TIME = 1701303847<BR>SERVER = 20<BR>
        </pre>
        <a href="http://blogadmin.freshdesk.com/support/home">What is this website  | <a href="http://blogadmin.freshdesk.com/support/home">Contact us</a>
    </body>
</html>

*   Trying 110.34.3.229:3128...
* Connected to (nil) (110.34.3.229) port 3128 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to httpheader.net:443
> CONNECT httpheader.net:443 HTTP/1.1
> Host: httpheader.net:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.0 200 Connection Established
< Proxy-agent: Apache/2.4.54 (Win64) OpenSSL/1.1.1o
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [21 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4720 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: OU=Domain Control Validated; OU=PositiveSSL; CN=httpheader.net
*  start date: Aug  5 00:00:00 2018 GMT
*  expire date: Aug  4 23:59:59 2020 GMT
*  issuer: C=GB; ST=Greater Manchester; L=Salford; O=COMODO CA Limited; CN=COMODO RSA Domain Validation Secure Server CA
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET / HTTP/1.1
> Host: httpheader.net
> User-Agent: Mozilla/5.0
> Accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [265 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [265 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Thu, 30 Nov 2023 00:24:07 GMT
< Server: Apache/2.4.38 (Debian)
< Vary: Accept-Encoding
< Content-Length: 994
< Content-Type: text/html; charset=UTF-8
< 
{ [994 bytes data]
* Connection #0 to host (nil) left intact
Output (fail)
Toggle

                                        
*   Trying 110.34.3.229:3128...
* connect to 110.34.3.229 port 3128 failed: Connection refused
* Failed to connect to 110.34.3.229 port 3128 after 287 ms: Connection refused
* Closing connection 0
curl: (7) Failed to connect to 110.34.3.229 port 3128 after 287 ms: Connection refused
Last Error Failed to connect to 110.34.3.229 port 3128 after 287 ms: Connection refused