IP | 13.234.24.116 |
Port | 80 |
Types/Protocols | HTTP, HTTPS, SOCKS4, SOCKS5 |
Host | ec2-13-234-24-116.ap-south-1.compute.amazonaws.com |
Country |
![]() |
City | Mumbai |
ISP | AMAZON-02 |
Date Added | 2025-01-07 13:25:50 |
Date Last Checked | 2025-04-06 02:51:34 |
Checks Total | 42 |
Checks Successful | 21 |
Checks Failed | 21 |
Checks Failed Consecutive | 5 |
Ø Uptime | 50.00% |
Last Successful Check | 2025-03-29 05:24:12 |
Last Failed Check | 2025-04-06 02:51:34 |
Last Response Time | 0.29s |
Ø Response Time | 0.89s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 3.109.211.45 |
Retries | 1 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 3.109.211.45 REMOTE_PORT = 62712 REQUEST_METHOD = GET REQUEST_URI = http://aranguren.org/azenv.php REQUEST_TIME_FLOAT = 1743222217.658735 REQUEST_TIME = 1743222217 HTTP_HOST = aranguren.org HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* HTTP_PROXY-CONNECTION = Keep-Alive |
Stderr |
Toggle* Trying 13.234.24.116:80... * Connected to (nil) (13.234.24.116) port 80 (#0) > GET http://aranguren.org/azenv.php HTTP/1.1 > Host: aranguren.org > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Sat, 29 Mar 2025 04:23:37 GMT < Server: squid/6.0.0-20220501-re899e0c27 < Content-Length: 297 < Connection: keep-alive < Content-Type: text/html < { [297 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html;charset=shift_jis" /> <title>�Q�n�C���^�[�l�b�g�F�����p�T�C�g</title> <link rel="stylesheet" href="http://www2.wind.ne.jp/style2.css" type="text/css" /> </head> <body> <div id="header"> <h1>www3.wind.ne.jp</h1> <h2><a href="https://gunma.wind.ne.jp/">�Q�n�C���^�[�l�b�g</a></h2> <p>�Q�n�C���^�[�l�b�g��<strong>FTP�p�X���[�h</strong>�ύX�p�T�C�g�ł��B<br /> �����p�̃z�[���y�[�W�A�h���X�iwww�̌��̐����j�����m�F�̏ゲ���p�������B</p> </div> <div id="container"> <table border="0"> <tr> <th class="menu"><a href="gunmanet/changepasswd/index.html"><img src="http://www2.wind.ne.jp/img/base_button4.gif" width="163" height="50" /></a></th> <td class="body">�����p����FTP�A�J�E���g�̃p�X���[�h���ύX�ł��܂��B</td> </tr> </table> </div> <div id="contents"> <h2>�Q�n�C���^�[�l�b�g �T�[�r�X�C���t�H���[�V����</h2> <ul> <li class="list_num01"><h3>���pSSL�Ń��[�U�̏������܂��B</h3> <img src="http://www2.wind.ne.jp/img/ssl_key.gif" alt="ssl_key" width="130" height="110" class="img-odd" /> SSL�Ƃ́A�C���^�[�l�b�g��ŏ����Í������đ���M���邵���݂̂��Ƃł��B<br /> �z�[���y�[�W��Ōl���Ȃǂ���͂���ۂɌ������܂���B<br /> ���Ђł�<strong>���pSSL</strong>���I�v�V�����T�[�r�X�Ƃ��Ă����Ă��܂��B<br /> �ڂ�����<a href="https://gunma.wind.ne.jp/wind/public/homepage/ssl.html" class="linkmark02">������</a>���������������B</li> <li class="list_num02"><h3>���X1,078�~(�ō�)�`�ŁA�Ǝ��h���C���̃z�[���y�[�W�J�݁B</h3> <img src="http://www2.wind.ne.jp/img/meishi.gif" alt ="hosting" width="250" height="140" class="img-even"> ���Ђ̖��O�∵���Ă��鏤�i��p���ăh���C�����擾����A���Ȃ���p�̃z�[���y�[�W���^�p�ł��܂��B<br /> ���[���A�h���X�������ĉ^�p����A�ϋɓI�ȃA�s�[���ɂ��I!<br /> <strong>�z�X�e�B���O�T�[�r�XWindoffice</strong>�ł��Ȃ��̂��X�⏤�i���C� |
Stderr (fail) |
Toggle* Trying 13.234.24.116:80... * Connected to (nil) (13.234.24.116) port 80 (#0) > GET http://www3.wind.ne.jp/hassii/env.cgi HTTP/1.1 > Host: www3.wind.ne.jp > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:50:09 GMT < Server: Apache < Last-Modified: Wed, 08 Mar 2023 03:05:38 GMT < ETag: "acde8e-c0a-6407fb82" < Accept-Ranges: bytes < Content-Length: 3082 < Connection: close < Content-Type: text/html < { [2000 bytes data] * Operation timed out after 60000 milliseconds with 2000 out of 3082 bytes received * Closing connection 0 curl: (28) Operation timed out after 60000 milliseconds with 2000 out of 3082 bytes received |
Checks Total | 46 |
Checks Successful | 25 |
Checks Failed | 21 |
Checks Failed Consecutive | 0 |
Ø Uptime | 54.35% |
Last Successful Check | 2025-04-06 02:51:34 |
Last Failed Check | 2025-04-01 02:01:24 |
Last Response Time | 0.58s |
Ø Response Time | 1.30s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 3.110.118.150 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 3.110.118.150 REMOTE_PORT = 63023 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1743900675.2917726 REQUEST_TIME = 1743900675 HTTP_HOST = www.jremi.com HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 13.234.24.116:80... * Connected to (nil) (13.234.24.116) port 80 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to www.jremi.com:443 > CONNECT www.jremi.com:443 HTTP/1.1 > Host: www.jremi.com:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:51:15 GMT < Server: nginx < Content-Type: text/plain < Content-Length: 0 * Ignoring Content-Length in CONNECT 200 response < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [744 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 6 00:03:34 2024 GMT * expire date: Apr 6 00:03:34 2026 GMT * issuer: CN=R11; O=Let's Encrypt; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5572d7fd99f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:51:15 GMT < server: squid/4.14 < content-length: 234 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 13.234.24.116:80... * Connected to (nil) (13.234.24.116) port 80 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to depts.washington.edu:443 > CONNECT depts.washington.edu:443 HTTP/1.1 > Host: depts.washington.edu:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 OK < Date: Tue, 01 Apr 2025 00:00:55 GMT < Server: nginx < Content-Type: text/plain < Content-Length: 0 * Ignoring Content-Length in CONNECT 200 response < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [789 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 1 00:00:08 2024 GMT * expire date: Apr 1 00:00:08 2026 GMT * issuer: CN=TrustID Server CA O1; OU=TrustID Server; O=IdenTrust; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5629280269f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * OpenSSL SSL_read: Connection reset by peer, errno 104 * Failed receiving HTTP2 data * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * OpenSSL SSL_write: Broken pipe, errno 32 * Failed sending HTTP2 data * Connection #0 to host (nil) left intact curl: (56) OpenSSL SSL_read: Connection reset by peer, errno 104 |
Checks Total | 50 |
Checks Successful | 24 |
Checks Failed | 26 |
Checks Failed Consecutive | 0 |
Ø Uptime | 48.00% |
Last Successful Check | 2025-04-06 02:51:34 |
Last Failed Check | 2025-04-05 05:46:05 |
Last Response Time | 0.60s |
Ø Response Time | 0.59s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 3.110.118.150 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 3.110.118.150 REMOTE_PORT = 63379 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1743900684.8880432 REQUEST_TIME = 1743900684 HTTP_HOST = www.jremi.com HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 13.234.24.116:80... * SOCKS4 communication to www.jremi.com:443 * SOCKS4 non-blocking resolve of www.jremi.com * SOCKS4 connect to IPv4 172.245.17.83 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (13.234.24.116) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [744 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 6 00:03:34 2024 GMT * expire date: Apr 6 00:03:34 2026 GMT * issuer: CN=R11; O=Let's Encrypt; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x559f816159f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:51:24 GMT < server: squid/4.14 < content-length: 234 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 13.234.24.116:80... * SOCKS4 communication to aranguren.org:443 * SOCKS4 non-blocking resolve of aranguren.org * SOCKS4 connect to IPv4 203.132.94.196 (locally resolved) * SOCKS4: Failed receiving connect request ack: Failure when receiving data from the peer * Closing connection 0 curl: (97) SOCKS4: Failed receiving connect request ack: Failure when receiving data from the peer |
Checks Total | 38 |
Checks Successful | 17 |
Checks Failed | 21 |
Checks Failed Consecutive | 3 |
Ø Uptime | 44.74% |
Last Successful Check | 2025-04-01 02:01:24 |
Last Failed Check | 2025-04-06 02:51:34 |
Last Response Time | 0.74s |
Ø Response Time | 0.78s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 13.200.235.218 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 13.200.235.218 REMOTE_PORT = 60725 REQUEST_METHOD = GET REQUEST_URI = /azenv.php REQUEST_TIME_FLOAT = 1743465684.2575777 REQUEST_TIME = 1743465684 HTTP_HOST = wfuchs.de HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 13.234.24.116:80... * SOCKS5 connect to IPv4 162.55.27.236:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (13.234.24.116) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [777 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=wfuchs.de * start date: Apr 1 00:00:08 2024 GMT * expire date: Apr 1 00:00:08 2026 GMT * issuer: CN=GlobalSign Atlas R3 DV TLS CA 2024 Q3; O=GlobalSign nv-sa; C=BE * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55bbcbc729f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: wfuchs.de > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Tue, 01 Apr 2025 00:01:24 GMT < server: squid/4.10 < content-length: 240 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<html><body><h1>408 Request Time-out</h1> Your browser didn't send a complete request in time. </body></html> |
Stderr (fail) |
Toggle* Trying 13.234.24.116:80... * SOCKS5 connect to IPv4 128.208.61.21:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (13.234.24.116) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [751 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 6 00:34:00 2024 GMT * expire date: Apr 6 00:34:00 2026 GMT * issuer: CN=R11; O=Let's Encrypt; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5568ec6169f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 408 < date: Sun, 06 Apr 2025 00:51:34 GMT < server: nginx < host: depts.washington.edu < content-length: 110 < cache-control: no-cache < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |