Details for Proxy 13.234.24.116:80

IP 13.234.24.116
Port 80
Types/Protocols HTTP, HTTPS, SOCKS4, SOCKS5
Host ec2-13-234-24-116.ap-south-1.compute.amazonaws.com
Country IN India (IN)
City Mumbai
ISP AMAZON-02
Date Added 2025-01-07 13:25:50
Date Last Checked 2025-04-06 02:51:34
HTTP
Checks Total 42
Checks Successful 21
Checks Failed 21
Checks Failed Consecutive 5
Ø Uptime 50.00%
Last Successful Check 2025-03-29 05:24:12
Last Failed Check 2025-04-06 02:51:34
Last Response Time 0.29s
Ø Response Time 0.89s
Anonymity Level high anonymous
Via
Gateway 3.109.211.45
Retries 1
Headers
Stdout
Toggle
REMOTE_ADDR = 3.109.211.45
REMOTE_PORT = 62712
REQUEST_METHOD = GET
REQUEST_URI = http://aranguren.org/azenv.php
REQUEST_TIME_FLOAT = 1743222217.658735
REQUEST_TIME = 1743222217
HTTP_HOST = aranguren.org
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
HTTP_PROXY-CONNECTION = Keep-Alive
Stderr
Toggle
*   Trying 13.234.24.116:80...
* Connected to (nil) (13.234.24.116) port 80 (#0)
> GET http://aranguren.org/azenv.php HTTP/1.1
> Host: aranguren.org
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sat, 29 Mar 2025 04:23:37 GMT
< Server: squid/6.0.0-20220501-re899e0c27
< Content-Length: 297
< Connection: keep-alive
< Content-Type: text/html
< 
{ [297 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html;charset=shift_jis" />
<title>�Q�n�C���^�[�l�b�g�F�����p�T�C�g</title>
<link rel="stylesheet" href="http://www2.wind.ne.jp/style2.css" type="text/css" />
</head>

<body>

<div id="header">
<h1>www3.wind.ne.jp</h1>
<h2><a href="https://gunma.wind.ne.jp/">�Q�n�C���^�[�l�b�g</a></h2>
<p>�Q�n�C���^�[�l�b�g��<strong>FTP�p�X���[�h</strong>�ύX�p�T�C�g�ł��B<br />
�����p�̃z�[���y�[�W�A�h���X�iwww�̌��̐����j�����m�F�̏ゲ���p�������B</p>
</div>

<div id="container">
<table border="0">
<tr>
<th class="menu"><a href="gunmanet/changepasswd/index.html"><img src="http://www2.wind.ne.jp/img/base_button4.gif" width="163" height="50" /></a></th>
<td class="body">�����p����FTP�A�J�E���g�̃p�X���[�h���ύX�ł��܂��B</td>
</tr>
</table>
</div>

<div id="contents">
<h2>�Q�n�C���^�[�l�b�g �T�[�r�X�C���t�H���[�V����</h2>
<ul>
<li class="list_num01"><h3>���pSSL�Ń��[�U�̏������܂��B</h3>
<img src="http://www2.wind.ne.jp/img/ssl_key.gif" alt="ssl_key" width="130" height="110" class="img-odd" />
SSL�Ƃ́A�C���^�[�l�b�g��ŏ����Í������đ���M���邵���݂̂��Ƃł��B<br />
�z�[���y�[�W��Ōl���Ȃǂ���͂���ۂɌ������܂���B<br />
���Ђł�<strong>���pSSL</strong>���I�v�V�����T�[�r�X�Ƃ��Ă��񋟂��Ă��܂��B<br />
�ڂ�����<a href="https://gunma.wind.ne.jp/wind/public/homepage/ssl.html" class="linkmark02">������</a>���������������B</li>
<li class="list_num02"><h3>���X1,078�~(�ō�)�`�ŁA�Ǝ��h���C���̃z�[���y�[�W�J�݁B</h3>
<img src="http://www2.wind.ne.jp/img/meishi.gif" alt ="hosting" width="250" height="140" class="img-even">
���Ђ̖��O�∵���Ă��鏤�i��p���ăh���C�����擾����΁A���Ȃ���p�̃z�[���y�[�W���^�p�ł��܂��B<br />
���[���A�h���X�������ĉ^�p����΁A�ϋɓI�ȃA�s�[���ɂ��I!<br />
<strong>�z�X�e�B���O�T�[�r�XWindoffice</strong>�ł��Ȃ��̂��X�⏤�i���C�
Stderr (fail)
Toggle
*   Trying 13.234.24.116:80...
* Connected to (nil) (13.234.24.116) port 80 (#0)
> GET http://www3.wind.ne.jp/hassii/env.cgi HTTP/1.1
> Host: www3.wind.ne.jp
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sun, 06 Apr 2025 00:50:09 GMT
< Server: Apache
< Last-Modified: Wed, 08 Mar 2023 03:05:38 GMT
< ETag: "acde8e-c0a-6407fb82"
< Accept-Ranges: bytes
< Content-Length: 3082
< Connection: close
< Content-Type: text/html
< 
{ [2000 bytes data]
* Operation timed out after 60000 milliseconds with 2000 out of 3082 bytes received
* Closing connection 0
curl: (28) Operation timed out after 60000 milliseconds with 2000 out of 3082 bytes received
HTTPS
Checks Total 46
Checks Successful 25
Checks Failed 21
Checks Failed Consecutive 0
Ø Uptime 54.35%
Last Successful Check 2025-04-06 02:51:34
Last Failed Check 2025-04-01 02:01:24
Last Response Time 0.58s
Ø Response Time 1.30s
Anonymity Level high anonymous
Via
Gateway 3.110.118.150
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 3.110.118.150
REMOTE_PORT = 63023
REQUEST_METHOD = GET
REQUEST_URI = /
REQUEST_TIME_FLOAT = 1743900675.2917726
REQUEST_TIME = 1743900675
HTTP_HOST = www.jremi.com
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 13.234.24.116:80...
* Connected to (nil) (13.234.24.116) port 80 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to www.jremi.com:443
> CONNECT www.jremi.com:443 HTTP/1.1
> Host: www.jremi.com:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.1 200 OK
< Date: Sun, 06 Apr 2025 00:51:15 GMT
< Server: nginx
< Content-Type: text/plain
< Content-Length: 0
* Ignoring Content-Length in CONNECT 200 response
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [744 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=www.jremi.com
*  start date: Apr  6 00:03:34 2024 GMT
*  expire date: Apr  6 00:03:34 2026 GMT
*  issuer: CN=R11; O=Let's Encrypt; C=US
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5572d7fd99f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET / HTTP/2
> Host: www.jremi.com
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Sun, 06 Apr 2025 00:51:15 GMT
< server: squid/4.14
< content-length: 234
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle

                            
Stderr (fail)
Toggle
*   Trying 13.234.24.116:80...
* Connected to (nil) (13.234.24.116) port 80 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to depts.washington.edu:443
> CONNECT depts.washington.edu:443 HTTP/1.1
> Host: depts.washington.edu:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.1 200 OK
< Date: Tue, 01 Apr 2025 00:00:55 GMT
< Server: nginx
< Content-Type: text/plain
< Content-Length: 0
* Ignoring Content-Length in CONNECT 200 response
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [789 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=depts.washington.edu
*  start date: Apr  1 00:00:08 2024 GMT
*  expire date: Apr  1 00:00:08 2026 GMT
*  issuer: CN=TrustID Server CA O1; OU=TrustID Server; O=IdenTrust; C=US
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5629280269f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /ken/env.cgi HTTP/2
> Host: depts.washington.edu
> user-agent: Mozilla/5.0
> accept: */*
> 
* OpenSSL SSL_read: Connection reset by peer, errno 104
* Failed receiving HTTP2 data
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* OpenSSL SSL_write: Broken pipe, errno 32
* Failed sending HTTP2 data
* Connection #0 to host (nil) left intact
curl: (56) OpenSSL SSL_read: Connection reset by peer, errno 104
SOCKS4
Checks Total 50
Checks Successful 24
Checks Failed 26
Checks Failed Consecutive 0
Ø Uptime 48.00%
Last Successful Check 2025-04-06 02:51:34
Last Failed Check 2025-04-05 05:46:05
Last Response Time 0.60s
Ø Response Time 0.59s
Anonymity Level high anonymous
Via
Gateway 3.110.118.150
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 3.110.118.150
REMOTE_PORT = 63379
REQUEST_METHOD = GET
REQUEST_URI = /
REQUEST_TIME_FLOAT = 1743900684.8880432
REQUEST_TIME = 1743900684
HTTP_HOST = www.jremi.com
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 13.234.24.116:80...
* SOCKS4 communication to www.jremi.com:443
* SOCKS4 non-blocking resolve of www.jremi.com
* SOCKS4 connect to IPv4 172.245.17.83 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (13.234.24.116) port 80 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [744 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=www.jremi.com
*  start date: Apr  6 00:03:34 2024 GMT
*  expire date: Apr  6 00:03:34 2026 GMT
*  issuer: CN=R11; O=Let's Encrypt; C=US
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x559f816159f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET / HTTP/2
> Host: www.jremi.com
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Sun, 06 Apr 2025 00:51:24 GMT
< server: squid/4.14
< content-length: 234
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle

                            
Stderr (fail)
Toggle
*   Trying 13.234.24.116:80...
* SOCKS4 communication to aranguren.org:443
* SOCKS4 non-blocking resolve of aranguren.org
* SOCKS4 connect to IPv4 203.132.94.196 (locally resolved)
* SOCKS4: Failed receiving connect request ack: Failure when receiving data from the peer
* Closing connection 0
curl: (97) SOCKS4: Failed receiving connect request ack: Failure when receiving data from the peer
SOCKS5
Checks Total 38
Checks Successful 17
Checks Failed 21
Checks Failed Consecutive 3
Ø Uptime 44.74%
Last Successful Check 2025-04-01 02:01:24
Last Failed Check 2025-04-06 02:51:34
Last Response Time 0.74s
Ø Response Time 0.78s
Anonymity Level high anonymous
Via
Gateway 13.200.235.218
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 13.200.235.218
REMOTE_PORT = 60725
REQUEST_METHOD = GET
REQUEST_URI = /azenv.php
REQUEST_TIME_FLOAT = 1743465684.2575777
REQUEST_TIME = 1743465684
HTTP_HOST = wfuchs.de
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 13.234.24.116:80...
* SOCKS5 connect to IPv4 162.55.27.236:443 (locally resolved)
* SOCKS5 request granted.
* Connected to (nil) (13.234.24.116) port 80 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [777 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=wfuchs.de
*  start date: Apr  1 00:00:08 2024 GMT
*  expire date: Apr  1 00:00:08 2026 GMT
*  issuer: CN=GlobalSign Atlas R3 DV TLS CA 2024 Q3; O=GlobalSign nv-sa; C=BE
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x55bbcbc729f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/2
> Host: wfuchs.de
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Tue, 01 Apr 2025 00:01:24 GMT
< server: squid/4.10
< content-length: 240
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle
<html><body><h1>408 Request Time-out</h1>
Your browser didn't send a complete request in time.
</body></html>
Stderr (fail)
Toggle
*   Trying 13.234.24.116:80...
* SOCKS5 connect to IPv4 128.208.61.21:443 (locally resolved)
* SOCKS5 request granted.
* Connected to (nil) (13.234.24.116) port 80 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [751 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=depts.washington.edu
*  start date: Apr  6 00:34:00 2024 GMT
*  expire date: Apr  6 00:34:00 2026 GMT
*  issuer: CN=R11; O=Let's Encrypt; C=US
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5568ec6169f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /ken/env.cgi HTTP/2
> Host: depts.washington.edu
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 408 
< date: Sun, 06 Apr 2025 00:51:34 GMT
< server: nginx
< host: depts.washington.edu
< content-length: 110
< cache-control: no-cache
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact