IP | 158.255.212.55 |
Port | 3256 | Protocols | HTTP, HTTPS |
Host | 55-212-255-158.static.edis.at |
Country |
![]() |
ISP | EDIS GmbH |
Date Added | 2022-09-26 08:53:01 |
Date Last Checked | 2023-06-08 00:01:29 |
Checks Total | 143 |
Checks Successful | 137 |
Checks Failed | 6 |
Checks Failed Consecutive | 0 |
Ø Uptime | 95.80% |
Last Successful Check | 2023-06-08 00:01:29 |
Last Failed Check | 2023-06-01 00:02:18 |
Last Response Time | 0.24s |
Ø Response Time | 1.31s |
Anonymity Level | transparent |
Via | 1.1 proxy.wakoopa.com (squid/4.7) |
Retries | 0 |
Headers |
via 1.1 proxy.wakoopa.com (squid/4.7) x-forwarded-for 85.214.115.35 |
Headers (in) |
Server Apache/2.4.10 (Debian) Via 1.1 proxy.wakoopa.com (squid/4.7) X-Cache MISS from proxy.wakoopa.com |
Output (success) |
Toggle<pre>CONTEXT_DOCUMENT_ROOT=/var/www/meow.org.uk/cgi-bin/ CONTEXT_PREFIX=/cgi-bin/ DOCUMENT_ROOT=/var/www/meow.org.uk/public_html/ GATEWAY_INTERFACE=CGI/1.1 HTTP_ACCEPT=*/* HTTP_CACHE_CONTROL=max-age=0 HTTP_CONNECTION=keep-alive HTTP_HOST=www.meow.org.uk HTTP_USER_AGENT=Mozilla/5.0 HTTP_VIA=1.1 proxy.wakoopa.com (squid/4.7) HTTP_X_FORWARDED_FOR=85.214.115.35 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin QUERY_STRING= REMOTE_ADDR=158.255.212.55 REMOTE_PORT=45506 REQUEST_METHOD=GET REQUEST_SCHEME=http REQUEST_URI=/cgi-bin/env.pl SCRIPT_FILENAME=/var/www/meow.org.uk/cgi-bin/env.pl SCRIPT_NAME=/cgi-bin/env.pl SERVER_ADDR=188.246.204.244 SERVER_ADMIN=webmaster@meow.org.uk SERVER_NAME=www.meow.org.uk SERVER_PORT=80 SERVER_PROTOCOL=HTTP/1.1 SERVER_SIGNATURE=<address>Apache/2.4.10 (Debian) Server at www.meow.org.uk Port 80</address> SERVER_SOFTWARE=Apache/2.4.10 (Debian) * Trying 158.255.212.55:3256... * Connected to (nil) (158.255.212.55) port 3256 (#0) > GET http://www.meow.org.uk/cgi-bin/env.pl HTTP/1.1 > Host: www.meow.org.uk > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Wed, 07 Jun 2023 22:01:28 GMT < Server: Apache/2.4.10 (Debian) < Vary: Accept-Encoding < Content-Type: text/html < X-Cache: MISS from proxy.wakoopa.com < Transfer-Encoding: chunked < Via: 1.1 proxy.wakoopa.com (squid/4.7) < Connection: keep-alive < { [908 bytes data] * Connection #0 to host (nil) left intact |
Output (fail) |
Toggle<!DOCTYPE html><html><head><meta content="initial-scale=1.0, maximum-scale=1.0, user-scalable=0" name="viewport" /><link rel="stylesheet" media="screen" href="/assets/mobile-8b7b318e954bf55c40d6f79f6211a3fd7903f2f3b1db37a99476e292f4db557b.css" /><script src="/assets/mobile-bb089bbe51242846b58b3bc4b765b2d71619491d984245c033e0a2f6bf73944f.js"></script><title>Persoonlijke pagina</title></head><body><div id="main"><div id="contents"><div class="content-block" data-test-id="general-text"><div class="row"><div class="col-xs-12"><h1>Onderzoek afgelopen</h1><p>Het onderzoek waar je aan deelneemt is afgelopen. We zien dat je nog de proxy instellingen hebt. Deze dien je uit te schakelen om weer normaal gebruik te kunnen maken van je internet. Als dat gelukt is, zou je dit scherm niet meer moeten zien.</p> </div></div></div><div class="content-block" data-test-id="uninstallation-instructions"><div class="row"><div class="col-xs-12"><h2>Maak je gebruik van een iPhone of iPad?</h2><ol> <li>Ga op uw toestel naar "Instellingen", klik op "Algemeen" en vervolgens op "Profielen". <ol> <li>Open het profiel dat u hebt geïnstalleerd voor het onderzoek en klik op "Verwijderen".</li> <li>Ga naar "Instellingen" en klik op "Wifi".</li> <li>Druk op het "i" icoontje (of de blauwe pijl) voor de netwerken waar u de proxy hebt geïnstalleerd.</li> <li>Scrol naar onderaan het scherm en klik onder "HTTP Proxy" op de "Uit" knop.</li> </ol></li> </ol> </div></div></div></div></div></body></html> * Trying 158.255.212.55:3256... * Connected to (nil) (158.255.212.55) port 3256 (#0) > GET http://www3.wind.ne.jp/hassii/env.cgi HTTP/1.1 > Host: www3.wind.ne.jp > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 302 Found < Server: squid/4.7 < Mime-Version: 1.0 < Date: Wed, 31 May 2023 22:02:17 GMT < Content-Type: text/html;charset=utf-8 < Content-Length: 0 < Location: https://wkp.io/mobile/research_ended/98ecca9cc8fb6bd6db2fb5e3b0aa3f76d99f679c < X-Squid-Error: 403 Access Denied < X-Cache: MISS from proxy.wakoopa.com < Via: 1.1 proxy.wakoopa.com (squid/4.7) < Connection: keep-alive < * Connection #0 to host (nil) left intact * Clear auth, redirects to port from 80 to 443 * Issue another request to this URL: 'https://wkp.io/mobile/research_ended/98ecca9cc8fb6bd6db2fb5e3b0aa3f76d99f679c' * Hostname 158.255.212.55 was found in DNS cache * Trying 158.255.212.55:3256... * Connected to (nil) (158.255.212.55) port 3256 (#1) * allocate connect buffer! * Establish HTTP proxy tunnel to wkp.io:443 > CONNECT wkp.io:443 HTTP/1.1 > Host: wkp.io:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection established < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [89 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [4939 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=wkp.io * start date: May 5 00:00:00 2023 GMT * expire date: Jun 2 23:59:59 2024 GMT * issuer: C=US; O=Amazon; CN=Amazon RSA 2048 M02 * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /mobile/research_ended/98ecca9cc8fb6bd6db2fb5e3b0aa3f76d99f679c HTTP/1.1 > Host: wkp.io > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Cache-Control: max-age=0, private, must-revalidate < Content-Type: */*; charset=utf-8 < Date: Wed, 31 May 2023 22:02:17 GMT < ETag: W/"770deff12920a0835abeac08f6bef73d" < Server: nginx + Phusion Passenger < Set-Cookie: _internal_api_server_session=N2JGTFlwYmkvZXBXYnBKbUNtNisyNGdkY08rZHUzM1BzYkpXaFlXQklTdWRCRGl5QXE5aHpQOGtKeWhqNlBPREM5STREbDNETk1iV1J5OHpyQXFSaWc9PS0tU1c1RmxQYlFxSjN6dnZ3VU5oU09CQT09--b46a868d9475b858e1e955d2d40fca17cc78777b; path=/; HttpOnly < Status: 200 OK < X-Content-Type-Options: nosniff < X-Frame-Options: SAMEORIGIN < X-Powered-By: Phusion Passenger < X-Request-Id: 0d54c084-5ba8-48b0-a602-14e906848899 < X-Runtime: 0.014859 < X-XSS-Protection: 1; mode=block < Content-Length: 1579 < Connection: keep-alive < { [1579 bytes data] * Connection #1 to host (nil) left intact |
Checks Total | 143 |
Checks Successful | 122 |
Checks Failed | 21 |
Checks Failed Consecutive | 0 |
Ø Uptime | 85.31% |
Last Successful Check | 2023-06-08 00:01:29 |
Last Failed Check | 2023-06-03 00:05:43 |
Last Response Time | 0.65s |
Ø Response Time | 0.87s |
Anonymity Level | elite |
Retries | 0 |
Headers (in) |
server nginx/1.10.3 (Ubuntu) |
Output (success) |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> </head> <body> <pre> HTTP_ACCEPT = */* HTTP_USER_AGENT = Mozilla/5.0 HTTP_HOST = www.jreming.com REMOTE_PORT = 46648 REMOTE_ADDR = 158.255.212.55 HTTPS = on REQUEST_SCHEME = https REQUEST_URI = / REQUEST_METHOD = GET REQUEST_TIME_FLOAT = 1686175289.4759 REQUEST_TIME = 1686175289 </pre> </body> </html> * Trying 158.255.212.55:3256... * Connected to (nil) (158.255.212.55) port 3256 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to www.jreming.com:443 > CONNECT www.jreming.com:443 HTTP/1.1 > Host: www.jreming.com:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection established < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [98 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [4570 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=*.jremi.com * start date: Sep 30 00:00:00 2022 GMT * expire date: Oct 3 23:59:59 2023 GMT * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5569a3376e80) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jreming.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 128)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < server: nginx/1.10.3 (Ubuntu) < date: Wed, 07 Jun 2023 22:01:29 GMT < content-type: text/html; charset=UTF-8 < { [547 bytes data] * Connection #0 to host (nil) left intact |
Output (fail) |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> </head> <body> <pre> PHP_FCGI_MAX_REQUESTS = 100000 HTTP_CONNECTION = close REQUEST_URI = /azenv.php REQUEST_METHOD = GET REMOTE_PORT = 39610 REQUEST_SCHEME = https REMOTE_ADDR = 2a03:f80:ed15:158:255:212:55:1 HTTP_HOST = www.proxy-listen.de HTTP_ACCEPT = */* HTTP_USER_AGENT = Mozilla/5.0 HTTPS = on HTTP2 = on HTTP_AUTHORIZATION = REQUEST_TIME_FLOAT = 1685743483.2086 REQUEST_TIME = 1685743483 </pre> </body> </html> * Trying 158.255.212.55:3256... * Connected to (nil) (158.255.212.55) port 3256 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to www.proxy-listen.de:443 > CONNECT www.proxy-listen.de:443 HTTP/1.1 > Host: www.proxy-listen.de:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection established < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [35 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2766 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_CHACHA20_POLY1305_SHA256 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=proxy-listen.de * start date: Mar 2 00:00:00 2023 GMT * expire date: Mar 2 23:59:59 2024 GMT * issuer: C=US; O=DigiCert Inc; OU=www.digicert.com; CN=Encryption Everywhere DV TLS CA - G1 * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55fc62aade80) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: www.proxy-listen.de > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < content-type: text/html; charset=utf-8 < date: Fri, 02 Jun 2023 22:04:43 GMT < server: Apache < { [664 bytes data] * Connection #0 to host (nil) left intact |