IP | 13.37.73.214 |
Port | 3128 |
Types/Protocols | HTTP, HTTPS, SOCKS4, SOCKS5 |
Host | ec2-13-37-73-214.eu-west-3.compute.amazonaws.com |
Country |
![]() |
City | Paris |
ISP | AMAZON-02 |
Date Added | 2025-01-07 15:22:24 |
Date Last Checked | 2025-04-06 02:28:04 |
Checks Total | 50 |
Checks Successful | 49 |
Checks Failed | 1 |
Checks Failed Consecutive | 0 |
Ø Uptime | 98.00% |
Last Successful Check | 2025-04-06 02:28:04 |
Last Failed Check | 2025-01-30 01:38:50 |
Last Response Time | 0.09s |
Ø Response Time | 0.08s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 13.38.65.43 |
Retries | 0 |
Headers | – |
Stdout |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <link href='http://fonts.googleapis.com/css?family=Sonsie+One' rel='stylesheet' type='text/css'> <style> body { font-family: 'Sonsie One', cursive; color:white; background-color:#000; } </style> <title>Proxyjudge.info</title> </head> <body> <h1>ProxyJudge.info</h1> <pre> HTTP_HOST = proxyjudge.info HTTP_USER_AGENT = Mozilla/5.0 HTTP_ACCEPT = */* REMOTE_ADDR = 13.38.65.43 REQUEST_SCHEME = http REMOTE_PORT = 61831 REQUEST_METHOD = GET REQUEST_URI = http://httpheader.net/ REQUEST_TIME_FLOAT = 1743899256.5049798 REQUEST_TIME = 1743899256 <BR>SERVER = 20<BR> </pre> <a href="http://blogadmin.freshdesk.com/support/home">What is proxyjudge.info</a> | <a href="http://blogadmin.freshdesk.com/support/home">Contact us</a> </body> </html> |
Stderr |
Toggle* Trying 13.37.73.214:3128... * Connected to (nil) (13.37.73.214) port 3128 (#0) > GET http://httpheader.net/ HTTP/1.1 > Host: httpheader.net > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:27:36 GMT < Server: Apache/2.4.38 (Debian) < Content-Type: text/html; charset=UTF-8 < Content-Length: 1000 < { [1000 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 13.37.73.214:3128... * After 15000ms connect time, move on! * connect to 13.37.73.214 port 3128 failed: Connection timed out * Connection timeout after 15000 ms * Closing connection 0 curl: (28) Connection timeout after 15000 ms |
Checks Total | 50 |
Checks Successful | 49 |
Checks Failed | 1 |
Checks Failed Consecutive | 0 |
Ø Uptime | 98.00% |
Last Successful Check | 2025-04-06 02:28:04 |
Last Failed Check | 2025-01-30 01:38:50 |
Last Response Time | 0.16s |
Ø Response Time | 0.15s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 13.38.65.43 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 13.38.65.43 REMOTE_PORT = 49848 REQUEST_METHOD = GET REQUEST_URI = /ken/env.cgi REQUEST_TIME_FLOAT = 1743899265.6655753 REQUEST_TIME = 1743899265 HTTP_HOST = depts.washington.edu HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 13.37.73.214:3128... * Connected to (nil) (13.37.73.214) port 3128 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to depts.washington.edu:443 > CONNECT depts.washington.edu:443 HTTP/1.1 > Host: depts.washington.edu:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:27:45 GMT < Server: nginx < Content-Type: text/plain < Content-Length: 0 * Ignoring Content-Length in CONNECT 200 response < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [792 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 6 00:18:15 2024 GMT * expire date: Apr 6 00:18:15 2026 GMT * issuer: CN=Virginia Military Certificate Authority; DC=vmi; DC=edu * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x558d1fe4b9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:27:45 GMT < server: squid/6.0.0-20220501-re899e0c27 < content-length: 250 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 13.37.73.214:3128... * After 15000ms connect time, move on! * connect to 13.37.73.214 port 3128 failed: Connection timed out * Connection timeout after 15001 ms * Closing connection 0 curl: (28) Connection timeout after 15001 ms |
Checks Total | 50 |
Checks Successful | 50 |
Checks Failed | 0 |
Checks Failed Consecutive | 0 |
Ø Uptime | 100.00% |
Last Successful Check | 2025-04-06 02:28:04 |
Last Failed Check | – |
Last Response Time | 0.16s |
Ø Response Time | 0.42s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 13.38.65.43 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 13.38.65.43 REMOTE_PORT = 59091 REQUEST_METHOD = GET REQUEST_URI = /azenv.php REQUEST_TIME_FLOAT = 1743899274.8254678 REQUEST_TIME = 1743899274 HTTP_HOST = aranguren.org HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 13.37.73.214:3128... * SOCKS4 communication to aranguren.org:443 * SOCKS4 non-blocking resolve of aranguren.org * SOCKS4 connect to IPv4 203.132.94.196 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (13.37.73.214) port 3128 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [785 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=aranguren.org * start date: Apr 6 00:18:06 2024 GMT * expire date: Apr 6 00:18:06 2026 GMT * issuer: CN=Virginia Military Certificate Authority; DC=vmi; DC=edu * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5639d65de9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: aranguren.org > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:27:54 GMT < server: squid/6.0.0-20220501-re899e0c27 < content-length: 241 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 50 |
Checks Successful | 49 |
Checks Failed | 1 |
Checks Failed Consecutive | 0 |
Ø Uptime | 98.00% |
Last Successful Check | 2025-04-06 02:28:04 |
Last Failed Check | 2025-02-01 03:38:48 |
Last Response Time | 0.23s |
Ø Response Time | 0.46s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 13.38.65.43 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 13.38.65.43 REMOTE_PORT = 51400 REQUEST_METHOD = GET REQUEST_URI = /ken/env.cgi REQUEST_TIME_FLOAT = 1743899284.0470076 REQUEST_TIME = 1743899284 HTTP_HOST = depts.washington.edu HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 13.37.73.214:3128... * SOCKS5 connect to IPv4 128.208.60.35:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (13.37.73.214) port 3128 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [792 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 6 00:18:15 2024 GMT * expire date: Apr 6 00:18:15 2026 GMT * issuer: CN=Virginia Military Certificate Authority; DC=vmi; DC=edu * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55873c1629f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:28:04 GMT < server: squid/6.0.0-20220501-re899e0c27 < content-length: 250 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 13.37.73.214:3128... * Unable to receive initial SOCKS5 response. * Closing connection 0 curl: (97) Unable to receive initial SOCKS5 response. |