<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<link href='https://fonts.googleapis.com/css?family=Sonsie+One' rel='stylesheet' type='text/css'>
<style>
body
{
font-family: 'Sonsie One', cursive;
color:white;
background-color:#000;
}
</style>
<title>httpHeader.net</title>
</head>
<body>
<h1>httpHeader.net</h1>
<pre>
HTTPS = on
HTTP_USER_AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
HTTP_HOST = httpheader.net
HTTP_SURROGATE_CAPABILITY = contentkeeper-cache="Surrogate/1.0"
HTTP_CACHE_CONTROL = max-age=259200
HTTP_CONNECTION = keep-alive
REMOTE_ADDR = 198.59.191.249
REQUEST_SCHEME = https
REMOTE_PORT = 56556
REQUEST_METHOD = GET
REQUEST_URI = /
REQUEST_TIME_FLOAT = 1680300658.7256
REQUEST_TIME = 1680300658<BR>SERVER = 20<BR>
</pre>
<a href="http://blogadmin.freshdesk.com/support/home">What is this website | <a href="http://blogadmin.freshdesk.com/support/home">Contact us</a>
</body>
</html>
* Trying 198.59.191.234:8080...
* Connected to (nil) (198.59.191.234) port 8080 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to httpheader.net:443
> CONNECT httpheader.net:443 HTTP/1.1
> Host: httpheader.net:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
>
< HTTP/1.1 200 Connection established
<
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [89 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [2636 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [333 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: OU=Domain Control Validated; OU=PositiveSSL; CN=httpheader.net
* start date: Aug 5 00:00:00 2018 GMT
* expire date: Aug 4 23:59:59 2020 GMT
* issuer: C=AU; ST=ACT; L=Canberra; O=ContentKeeper Technologies; OU=ContentKeeper Web; CN=ContentKeeper Appliance CA (Carlsbad Municipal Schools); subjectAltName=ContentKeeper Appliance CA (Carlsbad Municipal Schools)
* SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET / HTTP/1.1
> Host: httpheader.net
> User-Agent: Mozilla/5.0
> Accept: */*
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Fri, 31 Mar 2023 22:10:58 GMT
< Server: Apache/2.4.38 (Debian)
< Vary: Accept-Encoding
< Content-Length: 1125
< Content-Type: text/html; charset=UTF-8
< Connection: keep-alive
<
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact