IP | 35.154.78.253 |
Port | 80 |
Types/Protocols | HTTP, HTTPS, SOCKS4, SOCKS5 |
Host | ec2-35-154-78-253.ap-south-1.compute.amazonaws.com |
Country |
![]() |
City | Mumbai |
ISP | AMAZON-02 |
Date Added | 2025-01-07 16:58:38 |
Date Last Checked | 2025-04-06 02:14:29 |
Checks Total | 42 |
Checks Successful | 20 |
Checks Failed | 22 |
Checks Failed Consecutive | 0 |
Ø Uptime | 47.62% |
Last Successful Check | 2025-04-06 02:14:29 |
Last Failed Check | 2025-04-05 07:07:38 |
Last Response Time | 0.30s |
Ø Response Time | 0.87s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 3.110.118.150 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 3.110.118.150 REMOTE_PORT = 61746 REQUEST_METHOD = GET REQUEST_URI = http://shinh.org/env.cgi REQUEST_TIME_FLOAT = 1743898428.0515192 REQUEST_TIME = 1743898428 HTTP_HOST = shinh.org HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* HTTP_PROXY-CONNECTION = Keep-Alive |
Stderr |
Toggle* Trying 35.154.78.253:80... * Connected to (nil) (35.154.78.253) port 80 (#0) > GET http://shinh.org/env.cgi HTTP/1.1 > Host: shinh.org > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:13:48 GMT < Server: squid/4.14 < Content-Length: 289 < Connection: keep-alive < Content-Type: text/html < { [289 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<H1>Could not connect</H1> |
Stderr (fail) |
Toggle* Trying 35.154.78.253:80... * Connected to (nil) (35.154.78.253) port 80 (#0) > GET http://www.jremi.com/ HTTP/1.1 > Host: www.jremi.com > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 501 Gateway error < Transfer-Encoding: chunked < Date: Sat, 05 Apr 2025 05:06:46 GMT < Server: nginx < Content-Type: text/html < { [37 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 50 |
Checks Successful | 30 |
Checks Failed | 20 |
Checks Failed Consecutive | 1 |
Ø Uptime | 60.00% |
Last Successful Check | 2025-04-05 07:07:38 |
Last Failed Check | 2025-04-06 02:14:29 |
Last Response Time | 4.79s |
Ø Response Time | 2.71s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 192.42.116.212 |
Retries | 0 |
Headers | – |
Stdout |
Toggle<html><head><title>Env.cgi</title></head><body> I am <B>uid=2001(ken) gid=15(users) groups=15(users)</B> on <B>depts03.u.washington.edu</B><br> Don't know who you are <h3><a name=env>My environment follows:</h3> <pre> _=*5403*/usr/bin/env CONTEXT_DOCUMENT_ROOT=/hw00/d01/ken/. CONTEXT_PREFIX=/ken DOCUMENT_ROOT=/www GATEWAY_INTERFACE=CGI/1.1 HTTPS=on HTTP_ACCEPT=*/* HTTP_HOST=depts.washington.edu HTTP_USER_AGENT=Mozilla/5.0 PATH=/usr/local/bin:/usr/bin:/bin PWD=/nfs/aesop1/hw00/d01/ken QUERY_STRING= REMOTE_ADDR=192.42.116.212 REMOTE_PORT=44836 REQUEST_METHOD=GET REQUEST_SCHEME=https REQUEST_URI=/ken/env.cgi SCRIPT_FILENAME=/hw00/d01/ken/env.cgi SCRIPT_NAME=/ken/env.cgi SERVER_ADDR=128.208.61.62 SERVER_ADMIN=help@uw.edu SERVER_NAME=depts.washington.edu SERVER_PORT=443 SERVER_PROTOCOL=HTTP/2.0 SERVER_SIGNATURE= SERVER_SOFTWARE=Apache SHLVL=1 SSL_CIPHER=ECDHE-RSA-AES256-GCM-SHA384 SSL_CIPHER_ALGKEYSIZE=256 SSL_CIPHER_EXPORT=false SSL_CIPHER_USEKEYSIZE=256 SSL_CLIENT_VERIFY=NONE SSL_COMPRESS_METHOD=NULL SSL_PROTOCOL=TLSv1.2 SSL_SECURE_RENEG=true SSL_SERVER_A_KEY=rsaEncryption SSL_SERVER_A_SIG=sha256WithRSAEncryption SSL_SERVER_I_DN=CN=R10,O=Let's Encrypt,C=US SSL_SERVER_I_DN_C=US SSL_SERVER_I_DN_CN=R10 SSL_SERVER_I_DN_O=Let's Encrypt SSL_SERVER_M_SERIAL=03471B068DA25813154CC58C53993DF1FCD7 SSL_SERVER_M_VERSION=3 SSL_SERVER_SAN_DNS_0=courses.washington.edu SSL_SERVER_SAN_DNS_1=depts.washington.edu SSL_SERVER_SAN_DNS_2=faculty.washington.edu SSL_SERVER_SAN_DNS_3=staff.washington.edu SSL_SERVER_SAN_DNS_4=www.courses.washington.edu SSL_SERVER_SAN_DNS_5=www.depts.washington.edu SSL_SERVER_SAN_DNS_6=www.faculty.washington.edu SSL_SERVER_SAN_DNS_7=www.staff.washington.edu SSL_SERVER_S_DN=CN=depts.washington.edu SSL_SERVER_S_DN_CN=depts.washington.edu SSL_SERVER_V_END=May 8 18:07:05 2025 GMT SSL_SERVER_V_START=Feb 7 18:07:06 2025 GMT SSL_SESSION_ID=01a2318f9f23cde3929e3ed4adb458b2f9b2871bc94c9e00d21d6b0029482cd9 SSL_SESSION_RESUMED=Resumed SSL_VERSION_INTERFACE=mod_ssl/2.4.56 SSL_VERSION_LIBRARY=OpenSSL/1.0.2k-fips A__z="*SHLVL </pre> <h3>Stuff on stdin follows</h3> <pre> </pre> End of stdin </body></html> |
Stderr |
Toggle* Trying 35.154.78.253:80... * Connected to (nil) (35.154.78.253) port 80 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to depts.washington.edu:443 > CONNECT depts.washington.edu:443 HTTP/1.1 > Host: depts.washington.edu:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection Established < Content-Type: text/plain < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2764 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Feb 7 18:07:06 2025 GMT * expire date: May 8 18:07:05 2025 GMT * issuer: C=US; O=Let's Encrypt; CN=R10 * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55d622b4b9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [265 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < vary: Accept-Encoding < content-type: text/html < date: Sat, 05 Apr 2025 05:07:08 GMT < server: Apache < set-cookie: _affinity=d03|Z/C6f; path=/; HttpOnly; Secure < { [219 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 35.154.78.253:80... * Connected to (nil) (35.154.78.253) port 80 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to aranguren.org:443 > CONNECT aranguren.org:443 HTTP/1.1 > Host: aranguren.org:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:14:00 GMT < Date: Sun, 06 Apr 2025 00:13:02 GMT < Server: nginx < Server: Apache < Host: aranguren.org < Connection: Upgrade, close < Upgrade: h2 < Content-Type: text/html; charset=UTF-8 < Content-Length: 2000 * Ignoring Content-Length in CONNECT 200 response < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * (2144) (IN), , Unknown (60): { [5 bytes data] * error:0A00010B:SSL routines::wrong version number * Closing connection 0 curl: (35) error:0A00010B:SSL routines::wrong version number |
Checks Total | 34 |
Checks Successful | 17 |
Checks Failed | 17 |
Checks Failed Consecutive | 2 |
Ø Uptime | 50.00% |
Last Successful Check | 2025-04-03 02:16:29 |
Last Failed Check | 2025-04-06 02:14:29 |
Last Response Time | 0.60s |
Ø Response Time | 0.83s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 3.109.211.45 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 3.109.211.45 REMOTE_PORT = 59779 REQUEST_METHOD = GET REQUEST_URI = /azenv.php REQUEST_TIME_FLOAT = 1743639380.1067328 REQUEST_TIME = 1743639380 HTTP_HOST = aranguren.org HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 35.154.78.253:80... * SOCKS4 communication to aranguren.org:443 * SOCKS4 non-blocking resolve of aranguren.org * SOCKS4 connect to IPv4 203.132.94.196 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (35.154.78.253) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [772 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=aranguren.org * start date: Apr 2 23:31:03 2024 GMT * expire date: Apr 2 23:31:03 2026 GMT * issuer: CN=DigiCert TLS RSA SHA256 2020 CA1; O=DigiCert Inc; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x557ee90299f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: aranguren.org > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Thu, 03 Apr 2025 00:16:20 GMT < server: squid/3.5.28 < content-length: 242 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 35.154.78.253:80... * SOCKS4 communication to www.jremi.com:443 * SOCKS4 non-blocking resolve of www.jremi.com * SOCKS4 connect to IPv4 172.245.17.83 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (35.154.78.253) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [744 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 6 00:03:34 2024 GMT * expire date: Apr 6 00:03:34 2026 GMT * issuer: CN=R11; O=Let's Encrypt; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x56489891f9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * OpenSSL SSL_read: Connection reset by peer, errno 104 * Failed receiving HTTP2 data * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * OpenSSL SSL_write: Broken pipe, errno 32 * Failed sending HTTP2 data * Connection #0 to host (nil) left intact curl: (56) OpenSSL SSL_read: Connection reset by peer, errno 104 |
Checks Total | 46 |
Checks Successful | 15 |
Checks Failed | 31 |
Checks Failed Consecutive | 2 |
Ø Uptime | 32.61% |
Last Successful Check | 2025-04-03 02:16:29 |
Last Failed Check | 2025-04-06 02:14:29 |
Last Response Time | 0.74s |
Ø Response Time | 0.81s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 3.109.211.45 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 3.109.211.45 REMOTE_PORT = 62097 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1743639389.8503842 REQUEST_TIME = 1743639389 HTTP_HOST = www.jremi.com HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 35.154.78.253:80... * SOCKS5 connect to IPv4 172.245.17.83:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (35.154.78.253) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [772 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 2 23:30:48 2024 GMT * expire date: Apr 2 23:30:48 2026 GMT * issuer: CN=DigiCert TLS RSA SHA256 2020 CA1; O=DigiCert Inc; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5573373cd9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Thu, 03 Apr 2025 00:16:29 GMT < server: squid/3.5.28 < content-length: 233 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<!DOCTYPE html <!-- UA webservers homepage This is for the faculty/staff/depts/courses/students system. --> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>UW Departments Web Server</title> <link href="styles.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="skipnav"> <a href="#contentbox">Skip Navigation</a> </div> <div id="wheader" class="colorPurple wNo patchNo"> <div id="autoMargin"> <div class="wlogoSmall"> <div class="logoAbsolute"><a id="wlogoLink" href="https://www.washington.edu/">W</a></div> <div><a href="https://www.washington.edu/">University of Washington</a></div> </div> <div id="wsearch"> <form name="uwglobalsearch" id="searchbox_001967960132951597331:04hcho0_drk" action="https://www.google.com/cse"> <div class="wfield"> <input type="hidden" name="cx" value="001967960132951597331:04hcho0_drk" /> <input type="hidden" name="cof" value="FORID:0" /> <input name="q" type="text" value="Search the UW" class="wTextInput" onclick="make_blank();" /> </div> <input type="submit" class="formbutton" name="sa" value="Go" /> </form> </div> <div id="wtext"> <ul> <li><a href="https://www.washington.edu/">UW Home</a></li> <li><span class="wborder"><a href="https://www.washington.edu/home/directories.html">Directories</a></span></li> <li><span class="wborder"><a href="https://www.washington.edu/visit/events.html">Calendar</a></span></li> <li><span class="wborder"><a href="https://www.washington.edu/maps/">Maps</a></span></li> <li><span class="wborder"><a href="https://myuw.washington.edu/">My UW</a></span></li> </ul> </div> </div> </div> <div id="content"> <div class="headart"> <img alt="Campus scene" src="scene-depts.jpg" height="240" width="400" /> <h1>UW Departments Web Server</h1> </div> <ul> |
Stderr (fail) |
Toggle* Trying 35.154.78.253:80... * SOCKS5 connect to IPv4 128.208.60.35:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (35.154.78.253) port 80 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [751 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 5 23:30:04 2024 GMT * expire date: Apr 5 23:30:04 2026 GMT * issuer: CN=R11; O=Let's Encrypt; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x556f56d999f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:14:29 GMT < date: Sun, 06 Apr 2025 00:11:48 GMT < server: nginx < server: Apache < host: depts.washington.edu < accept-ranges: bytes < content-type: text/html < content-length: 2000 < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |