IP | 213.252.245.221 |
Port | 9066 |
Types/Protocols | SOCKS4, SOCKS5 |
Host | 32226-51552.bacloud.info |
Country |
![]() |
ISP | Informacines sistemos ir technologijos, UAB |
Date Added | 2025-02-02 14:23:59 |
Date Last Checked | 2025-04-08 01:03:26 |
Checks Total | 38 |
Checks Successful | 3 |
Checks Failed | 35 |
Checks Failed Consecutive | 19 |
Ø Uptime | 7.89% |
Last Successful Check | 2025-03-06 03:25:03 |
Last Failed Check | 2025-04-08 01:03:26 |
Last Response Time | 1.31s |
Ø Response Time | 4.84s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 89.58.26.216 |
Retries | 0 |
Headers | – |
Stdout |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> </head> <body> <pre> HTTP_ACCEPT = */* HTTP_USER_AGENT = Mozilla/5.0 HTTP_HOST = www.jremi.com REMOTE_PORT = 43040 REMOTE_ADDR = 89.58.26.216 HTTPS = on REQUEST_SCHEME = https REQUEST_URI = / REQUEST_METHOD = GET REQUEST_TIME_FLOAT = 1741227857.8602 REQUEST_TIME = 1741227857 </pre> </body> </html> |
Stderr |
Toggle* Trying 213.252.245.221:9066... * SOCKS4 communication to www.jremi.com:443 * SOCKS4 non-blocking resolve of www.jremi.com * SOCKS4 connect to IPv4 172.245.17.83 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (213.252.245.221) port 9066 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [98 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [4570 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=*.jremi.com * start date: Sep 13 00:00:00 2024 GMT * expire date: Oct 4 23:59:59 2025 GMT * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55f33e8cfeb0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 128)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < server: nginx/1.10.3 (Ubuntu) < date: Thu, 06 Mar 2025 02:24:17 GMT < content-type: text/html; charset=UTF-8 < { [543 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 213.252.245.221:9066... * connect to 213.252.245.221 port 9066 failed: Connection refused * Failed to connect to 213.252.245.221 port 9066 after 26 ms: Connection refused * Closing connection 0 curl: (7) Failed to connect to 213.252.245.221 port 9066 after 26 ms: Connection refused |
Checks Total | 38 |
Checks Successful | 1 |
Checks Failed | 37 |
Checks Failed Consecutive | 37 |
Ø Uptime | 2.63% |
Last Successful Check | 2025-02-02 14:23:59 |
Last Failed Check | 2025-04-08 01:03:26 |
Last Response Time | 4.18s |
Ø Response Time | 4.18s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 109.70.100.71 |
Retries | 0 |
Headers | – |
Stdout |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> </head> <body> <pre> REQUEST_URI = /azenv.php REQUEST_METHOD = GET REMOTE_PORT = 47512 REQUEST_SCHEME = https REMOTE_ADDR = 109.70.100.71 HTTP_HOST = wfuchs.de HTTP_ACCEPT = */* HTTP_USER_AGENT = Mozilla/5.0 HTTPS = on HTTP2 = on REQUEST_TIME_FLOAT = 1738502638.6984 REQUEST_TIME = 1738502638 </pre> </body> </html> |
Stderr |
Toggle* Trying 213.252.245.221:9066... * SOCKS5 connect to IPv4 162.55.27.236:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (213.252.245.221) port 9066 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2063 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [112 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=wfuchs.de * start date: Jan 20 23:03:33 2025 GMT * expire date: Apr 20 23:03:32 2025 GMT * issuer: C=US; O=Let's Encrypt; CN=E6 * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x555e840c0eb0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: wfuchs.de > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < strict-transport-security: max-age=0 < vary: Accept-Encoding,User-Agent < cache-control: max-age=60, private, proxy-revalidate < content-type: text/html; charset=UTF-8 < date: Sun, 02 Feb 2025 13:23:58 GMT < server: Apache < { [560 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 213.252.245.221:9066... * connect to 213.252.245.221 port 9066 failed: Connection refused * Failed to connect to 213.252.245.221 port 9066 after 27 ms: Connection refused * Closing connection 0 curl: (7) Failed to connect to 213.252.245.221 port 9066 after 27 ms: Connection refused |