IP | 3.12.144.146 |
Port | 80 |
Types/Protocols | HTTP, HTTPS, SOCKS4, SOCKS5 |
Host | ec2-3-12-144-146.us-east-2.compute.amazonaws.com |
Country |
![]() |
City | Columbus |
ISP | AMAZON-02 |
Date Added | 2025-01-07 16:08:11 |
Date Last Checked | 2025-04-06 02:20:14 |
Checks Total | 50 |
Checks Successful | 50 |
Checks Failed | 0 |
Checks Failed Consecutive | 0 |
Ø Uptime | 100.00% |
Last Successful Check | 2025-04-06 02:20:14 |
Last Failed Check | – |
Last Response Time | 0.25s |
Ø Response Time | 0.26s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 18.220.239.165 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 18.220.239.165 REMOTE_PORT = 51772 REQUEST_METHOD = GET REQUEST_URI = http://aranguren.org/azenv.php REQUEST_TIME_FLOAT = 1743898779.4998913 REQUEST_TIME = 1743898779 HTTP_HOST = aranguren.org HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* HTTP_PROXY-CONNECTION = Keep-Alive |
Stderr |
Toggle* Trying 3.12.144.146:80... * Connected to (nil) (3.12.144.146) port 80 (#0) > GET http://aranguren.org/azenv.php HTTP/1.1 > Host: aranguren.org > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:19:39 GMT < Server: squid/4.14 < Content-Length: 300 < Connection: keep-alive < Content-Type: text/html < { [300 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 50 |
Checks Successful | 50 |
Checks Failed | 0 |
Checks Failed Consecutive | 0 |
Ø Uptime | 100.00% |
Last Successful Check | 2025-04-06 02:20:14 |
Last Failed Check | – |
Last Response Time | 0.48s |
Ø Response Time | 0.50s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 18.220.239.165 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 18.220.239.165 REMOTE_PORT = 54439 REQUEST_METHOD = GET REQUEST_URI = /azenv.php REQUEST_TIME_FLOAT = 1743898788.9817665 REQUEST_TIME = 1743898788 HTTP_HOST = aranguren.org HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 3.12.144.146:80... * Connected to (nil) (3.12.144.146) port 80 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to aranguren.org:443 > CONNECT aranguren.org:443 HTTP/1.1 > Host: aranguren.org:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:19:48 GMT < Server: nginx < Content-Type: text/plain < Content-Length: 0 * Ignoring Content-Length in CONNECT 200 response < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [754 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=aranguren.org * start date: Apr 6 00:11:52 2024 GMT * expire date: Apr 6 00:11:52 2026 GMT * issuer: CN=Certyfikat SSL; O=home.pl S.A.; C=PL * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5555d11899f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: aranguren.org > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:19:48 GMT < server: squid/4.14 < content-length: 244 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 50 |
Checks Successful | 49 |
Checks Failed | 1 |
Checks Failed Consecutive | 0 |
Ø Uptime | 98.00% |
Last Successful Check | 2025-04-06 02:20:14 |
Last Failed Check | 2025-01-23 01:24:00 |
Last Response Time | 0.50s |
Ø Response Time | 0.55s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 18.220.239.165 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 18.220.239.165 REMOTE_PORT = 56157 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1743898798.486379 REQUEST_TIME = 1743898798 HTTP_HOST = www.jremi.com HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 3.12.144.146:80... * SOCKS4 communication to www.jremi.com:443 * SOCKS4 non-blocking resolve of www.jremi.com * SOCKS4 connect to IPv4 172.245.17.83 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (3.12.144.146) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [754 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 6 00:11:42 2024 GMT * expire date: Apr 6 00:11:42 2026 GMT * issuer: CN=Certyfikat SSL; O=home.pl S.A.; C=PL * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5599a3f629f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:19:58 GMT < server: squid/4.14 < content-length: 234 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 3.12.144.146:80... * SOCKS4 communication to wfuchs.de:443 * SOCKS4 non-blocking resolve of wfuchs.de * SOCKS4 connect to IPv4 162.55.27.236 (locally resolved) * SOCKS4: Failed receiving connect request ack: Failure when receiving data from the peer * Closing connection 0 curl: (97) SOCKS4: Failed receiving connect request ack: Failure when receiving data from the peer |
Checks Total | 50 |
Checks Successful | 47 |
Checks Failed | 3 |
Checks Failed Consecutive | 1 |
Ø Uptime | 94.00% |
Last Successful Check | 2025-04-05 06:54:32 |
Last Failed Check | 2025-04-06 02:20:14 |
Last Response Time | 1.29s |
Ø Response Time | 0.65s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 18.220.239.165 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 18.220.239.165 REMOTE_PORT = 59622 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1743828872.0212362 REQUEST_TIME = 1743828872 HTTP_HOST = www.jremi.com HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 3.12.144.146:80... * SOCKS5 connect to IPv4 172.245.17.83:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (3.12.144.146) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [846 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 5 04:54:21 2024 GMT * expire date: Apr 5 04:54:21 2026 GMT * issuer: CN=Waf defaut certificate(Attack Behavior reported to the police); OU=WAF; O=Waf; L=Shanghai; ST=Shanghai; C=CN * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x56169e8559f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sat, 05 Apr 2025 04:54:32 GMT < server: squid/4.10 < content-length: 235 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 3.12.144.146:80... * Unable to receive initial SOCKS5 response. * Closing connection 0 curl: (97) Unable to receive initial SOCKS5 response. |