Details for Proxy 3.139.242.184:3128

IP 3.139.242.184
Port 3128
Types/Protocols HTTP, HTTPS, SOCKS4, SOCKS5
Host ec2-3-139-242-184.us-east-2.compute.amazonaws.com
Country US United States (US)
City Columbus
ISP AMAZON-02
Date Added 2025-01-07 14:25:03
Date Last Checked 2025-04-06 02:40:33
HTTP
Checks Total 50
Checks Successful 50
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-06 02:40:33
Last Failed Check
Last Response Time 0.25s
Ø Response Time 0.26s
Anonymity Level high anonymous
Via
Gateway 18.220.239.165
Retries 0
Headers
Stdout
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>AZ Environment variables 1.04</title>
<meta name="keywords" content="proxyjudge, proxy judge, azenv proxy judge, azenv.php" />
</head>
<body>
<h1>PHP Proxy Judge</h1>
<pre>
HTTP_ACCEPT = */*
HTTP_USER_AGENT = Mozilla/5.0
HTTP_HOST = azenv.net
REMOTE_USER = root
REMOTE_PORT = 62350
REMOTE_ADDR = 18.220.239.165
REQUEST_SCHEME = http
REQUEST_URI = http://azenv.net/
REQUEST_METHOD = GET
REQUEST_TIME_FLOAT = 1743900004.7462692
REQUEST_TIME = 1743900004
</pre>
</body>
</html>
Stderr
Toggle
*   Trying 3.139.242.184:3128...
* Connected to (nil) (3.139.242.184) port 3128 (#0)
> GET http://azenv.net/ HTTP/1.1
> Host: azenv.net
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sun, 06 Apr 2025 00:40:04 GMT
< Server: nginx/1.18.0 (Ubuntu)
< Content-Type: text/html; charset=UTF-8
< Connection: close
< Cache-Control: no-cache, no-store, must-revalidate
< Pragma: no-cache
< Expires: 0
< Content-Length: 681
< 
{ [681 bytes data]
* Closing connection 0
HTTPS
Checks Total 50
Checks Successful 50
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-06 02:40:33
Last Failed Check
Last Response Time 0.49s
Ø Response Time 0.51s
Anonymity Level high anonymous
Via
Gateway 18.220.239.165
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 18.220.239.165
REMOTE_PORT = 57890
REQUEST_METHOD = GET
REQUEST_URI = /azenv.php
REQUEST_TIME_FLOAT = 1743900014.2351427
REQUEST_TIME = 1743900014
HTTP_HOST = wfuchs.de
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 3.139.242.184:3128...
* Connected to (nil) (3.139.242.184) port 3128 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to wfuchs.de:443
> CONNECT wfuchs.de:443 HTTP/1.1
> Host: wfuchs.de:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.1 200 OK
< Date: Sun, 06 Apr 2025 00:40:13 GMT
< Server: nginx
< Content-Type: text/plain
< Content-Length: 0
* Ignoring Content-Length in CONNECT 200 response
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [783 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=wfuchs.de
*  start date: Apr  6 00:16:31 2024 GMT
*  expire date: Apr  6 00:16:31 2026 GMT
*  issuer: CN=Thawte TLS RSA CA G1; OU=www.digicert.com; O=DigiCert Inc; C=US
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x56408e9bc9f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/2
> Host: wfuchs.de
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Sun, 06 Apr 2025 00:40:14 GMT
< server: squid/4.10
< content-length: 240
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
SOCKS4
Checks Total 50
Checks Successful 50
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-06 02:40:33
Last Failed Check
Last Response Time 0.77s
Ø Response Time 0.54s
Anonymity Level high anonymous
Via
Gateway 18.220.239.165
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 18.220.239.165
REMOTE_PORT = 53804
REQUEST_METHOD = GET
REQUEST_URI = /
REQUEST_TIME_FLOAT = 1743900023.776758
REQUEST_TIME = 1743900023
HTTP_HOST = www.jremi.com
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 3.139.242.184:3128...
* SOCKS4 communication to www.jremi.com:443
* SOCKS4 non-blocking resolve of www.jremi.com
* SOCKS4 connect to IPv4 172.245.17.83 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (3.139.242.184) port 3128 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [754 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=www.jremi.com
*  start date: Apr  6 00:11:42 2024 GMT
*  expire date: Apr  6 00:11:42 2026 GMT
*  issuer: CN=Certyfikat SSL; O=home.pl S.A.; C=PL
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x55bd92cf29f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET / HTTP/2
> Host: www.jremi.com
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Sun, 06 Apr 2025 00:40:23 GMT
< server: squid/4.10
< content-length: 234
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
SOCKS5
Checks Total 50
Checks Successful 37
Checks Failed 13
Checks Failed Consecutive 0
Ø Uptime 74.00%
Last Successful Check 2025-04-06 02:40:33
Last Failed Check 2025-04-01 02:10:26
Last Response Time 0.60s
Ø Response Time 0.62s
Anonymity Level high anonymous
Via
Gateway 18.220.239.165
Retries 0
Headers
Stdout
Toggle
REMOTE_ADDR = 18.220.239.165
REMOTE_PORT = 62491
REQUEST_METHOD = GET
REQUEST_URI = /azenv.php
REQUEST_TIME_FLOAT = 1743900033.6089182
REQUEST_TIME = 1743900033
HTTP_HOST = wfuchs.de
HTTP_USER-AGENT = Mozilla/5.0
HTTP_ACCEPT = */*
Stderr
Toggle
*   Trying 3.139.242.184:3128...
* SOCKS5 connect to IPv4 162.55.27.236:443 (locally resolved)
* SOCKS5 request granted.
* Connected to (nil) (3.139.242.184) port 3128 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [783 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=wfuchs.de
*  start date: Apr  6 00:16:31 2024 GMT
*  expire date: Apr  6 00:16:31 2026 GMT
*  issuer: CN=Thawte TLS RSA CA G1; OU=www.digicert.com; O=DigiCert Inc; C=US
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x560fb6ad69f0)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/2
> Host: wfuchs.de
> user-agent: Mozilla/5.0
> accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 10)!
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< date: Sun, 06 Apr 2025 00:40:33 GMT
< server: squid/4.10
< content-length: 240
< content-type: text/html
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle

                            
Stderr (fail)
Toggle
*   Trying 3.139.242.184:3128...
* SOCKS5 connect to IPv4 172.245.17.83:443 (locally resolved)
* Failed to receive SOCKS5 connect request ack.
* Closing connection 0
curl: (97) Failed to receive SOCKS5 connect request ack.