Details for Proxy 158.255.212.55:3256

IP 158.255.212.55
Port 3256
Protocols HTTP, HTTPS
Host 55-212-255-158.static.edis.at
Country Austria (AT) AT
ISP EDIS GmbH
Date Added 2022-09-26 08:53:01
Date Last Checked 2023-09-26 00:02:45
HTTP
Checks Total 205
Checks Successful 194
Checks Failed 11
Checks Failed Consecutive 0
Ø Uptime 94.63%
Last Successful Check 2023-09-26 00:02:45
Last Failed Check 2023-09-24 00:03:24
Last Response Time 0.56s
Ø Response Time 1.08s
Anonymity Level transparent
Via 1.1 proxy.wakoopa.com (squid/4.7)
Retries 0
Headers
via              1.1 proxy.wakoopa.com (squid/4.7)
x-forwarded-for  85.214.115.35
Headers (in)
Server   Apache
Via      1.1 proxy.wakoopa.com (squid/4.7)
X-Cache  MISS from proxy.wakoopa.com
Output (success)
Toggle
DOCUMENT_ROOT=/usr/local/apache/htdocs
HTTP_ACCEPT=*/*
HTTP_CACHE_CONTROL=max-age=259200
HTTP_CONNECTION=keep-alive
HTTP_HOST=www3.wind.ne.jp
HTTP_USER_AGENT=Mozilla/5.0
HTTP_VIA=1.1 proxy.wakoopa.com (squid/4.7)
HTTP_X_FORWARDED_FOR=85.214.115.35
PATH=/bin:/usr/bin
REMOTE_ADDR=158.255.212.55
REMOTE_PORT=49288
SCRIPT_FILENAME=/usr/local/apache/htdocs/hassii/env.cgi
SERVER_ADDR=218.45.48.130
SERVER_ADMIN=webmaster@www3.wind.ne.jp
SERVER_NAME=www3.wind.ne.jp
SERVER_PORT=80
SERVER_SIGNATURE=
SERVER_SOFTWARE=Apache
GATEWAY_INTERFACE=CGI/1.1
SERVER_PROTOCOL=HTTP/1.1
REQUEST_METHOD=GET
QUERY_STRING=
REQUEST_URI=/hassii/env.cgi
SCRIPT_NAME=/hassii/env.cgi

*   Trying 158.255.212.55:3256...
* Connected to (nil) (158.255.212.55) port 3256 (#0)
> GET http://www3.wind.ne.jp/hassii/env.cgi HTTP/1.1
> Host: www3.wind.ne.jp
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Mon, 25 Sep 2023 22:02:45 GMT
< Server: Apache
< Content-Type: text/plain
< X-Cache: MISS from proxy.wakoopa.com
< Transfer-Encoding: chunked
< Via: 1.1 proxy.wakoopa.com (squid/4.7)
< Connection: keep-alive
< 
{ [669 bytes data]
* Connection #0 to host (nil) left intact
Output (fail)
Toggle

                                        
*   Trying 158.255.212.55:3256...
* Connected to (nil) (158.255.212.55) port 3256 (#0)
> GET http://depts.washington.edu/ken/env.cgi HTTP/1.1
> Host: depts.washington.edu
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Recv failure: Connection reset by peer
* Closing connection 0
curl: (56) Recv failure: Connection reset by peer
Last Error Recv failure: Connection reset by peer
HTTPS
Checks Total 205
Checks Successful 175
Checks Failed 30
Checks Failed Consecutive 0
Ø Uptime 85.37%
Last Successful Check 2023-09-26 00:02:45
Last Failed Check 2023-09-24 00:03:24
Last Response Time 0.20s
Ø Response Time 0.87s
Anonymity Level elite
Retries 0
Headers (in)
server                     Apache
strict-transport-security  max-age=0
Output (success)
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>AZ Environment variables 1.04</title>
</head>
<body>
<pre>
REQUEST_URI = /azenv.php
REQUEST_METHOD = GET
REMOTE_PORT = 46544
REQUEST_SCHEME = https
REMOTE_ADDR = 158.255.212.55
HTTP_HOST = wfuchs.de
HTTP_ACCEPT = */*
HTTP_USER_AGENT = Mozilla/5.0
HTTPS = on
HTTP2 = on
REQUEST_TIME_FLOAT = 1695679365.4429
REQUEST_TIME = 1695679365
</pre>
</body>
</html>

*   Trying 158.255.212.55:3256...
* Connected to (nil) (158.255.212.55) port 3256 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to wfuchs.de:443
> CONNECT wfuchs.de:443 HTTP/1.1
> Host: wfuchs.de:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.1 200 Connection established
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [19 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [3801 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [110 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=wfuchs.de
*  start date: Aug  1 21:59:42 2023 GMT
*  expire date: Oct 30 21:59:41 2023 GMT
*  issuer: C=US; O=Let's Encrypt; CN=R3
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x561dc5814e90)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/2
> Host: wfuchs.de
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< strict-transport-security: max-age=0
< vary: Accept-Encoding,User-Agent
< cache-control: max-age=60, private, proxy-revalidate
< content-type: text/html; charset=UTF-8
< date: Mon, 25 Sep 2023 22:02:45 GMT
< server: Apache
< 
{ [561 bytes data]
* Connection #0 to host (nil) left intact
Output (fail)
Toggle

                                        
*   Trying 158.255.212.55:3256...
* Connected to (nil) (158.255.212.55) port 3256 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to depts.washington.edu:443
> CONNECT depts.washington.edu:443 HTTP/1.1
> Host: depts.washington.edu:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
* Recv failure: Connection reset by peer
* Received HTTP code 0 from proxy after CONNECT
* CONNECT phase completed!
* Closing connection 0
curl: (56) Recv failure: Connection reset by peer
Last Error Recv failure: Connection reset by peer