Details for Proxy 47.237.92.86:4916

IP 47.237.92.86
Port 4916
Types/Protocols HTTP, HTTPS, SOCKS4
Country SG Singapore (SG)
ISP Alibaba US Technology Co., Ltd.
Date Added 2025-01-09 14:42:58
Date Last Checked 2025-04-13 00:33:34
HTTP
Checks Total 54
Checks Successful 33
Checks Failed 21
Checks Failed Consecutive 3
Ø Uptime 61.11%
Last Successful Check 2025-04-08 04:25:29
Last Failed Check 2025-04-13 00:33:34
Last Response Time 2.55s
Ø Response Time 2.81s
Anonymity Level high anonymous
Via
Gateway
Retries 0
Headers
Stdout
Toggle
<HTML><BODY>CONTENT_LENGTH = 0 <BR>
DOCUMENT_ROOT = /var/www/ <BR>
GATEWAY_INTERFACE = CGI/1.1 <BR>
HTTP_HOST = shinh.org <BR>
HTTP_USER_AGENT = Mozilla/5.0
REDIRECT_STATUS = 200 <BR>
REMOTE_ADDR = 47.237.92.86 <BR>
REMOTE_PORT = 49780 <BR>
REQUEST_METHOD = GET <BR>
REQUEST_URI = /env.cgi <BR>
SCRIPT_FILENAME = /var/www/env.cgi <BR>
SCRIPT_NAME = /env.cgi <BR>
SERVER_ADDR = 0.0.0.0 <BR>
SERVER_NAME = shinh.org <BR>
SERVER_PORT = 80 <BR>
SERVER_PROTOCOL = HTTP/1.1 <BR>
SERVER_SOFTWARE = lighttpd/1.4.29 <BR>
</BODY></HTML>

Stderr
Toggle
*   Trying 47.237.92.86:4916...
* Connected to (nil) (47.237.92.86) port 4916 (#0)
> GET http://shinh.org/env.cgi HTTP/1.1
> Host: shinh.org
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Content-Type: text/html
< Date: 2025-04-08T10:25:00+08:00
< Server: lighttpd/1.4.29
< Content-Length: 529
< 
{ [529 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle
<html><head><title>SECURUS CRIMSON | NVR</title></head><body></body></html>
Stderr (fail)
Toggle
*   Trying 47.237.92.86:4916...
* Connected to (nil) (47.237.92.86) port 4916 (#0)
> GET http://www.jremi.com/ HTTP/1.1
> Host: www.jremi.com
> User-Agent: Mozilla/5.0
> Accept: */*
> Proxy-Connection: Keep-Alive
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: Apache/2.4.25 (Debian)
< Date: Sat, 12 Apr 2025 22:33:06 GMT
< Content-Length: 76
< Content-Type: text/html; charset=utf-8
< 
{ [76 bytes data]
* Connection #0 to host (nil) left intact
HTTPS
Checks Total 54
Checks Successful 23
Checks Failed 31
Checks Failed Consecutive 0
Ø Uptime 42.59%
Last Successful Check 2025-04-13 00:33:34
Last Failed Check 2025-04-12 11:38:48
Last Response Time 5.85s
Ø Response Time 5.98s
Anonymity Level high anonymous
Via
Gateway
Retries 0
Headers
Stdout
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>AZ Environment variables 1.04</title>
</head>
<body>
<pre>
REQUEST_URI = /azenv.php
REQUEST_METHOD = GET
REMOTE_PORT = 44734
REQUEST_SCHEME = https
REMOTE_ADDR = 47.237.92.86
HTTP_ACCEPT_ENCODING = 
HTTP_USER_AGENT = Mozilla/5.0
HTTP_HOST = wfuchs.de
HTTPS = on
REQUEST_TIME_FLOAT  = 1744497200.010
REQUEST_TIME = 1744497200
</pre>
</body>
</html>
Stderr
Toggle
*   Trying 47.237.92.86:4916...
* Connected to (nil) (47.237.92.86) port 4916 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to wfuchs.de:443
> CONNECT wfuchs.de:443 HTTP/1.1
> Host: wfuchs.de:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.1 200 Connection established
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [21 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [1468 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [520 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [36 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [36 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: C=PY; O=AWWFIDJN; CN=localhost; OU=GPIQKAV; DC=HVWTNS; DC=local
*  start date: Apr 12 01:02:42 2025 GMT
*  expire date: Apr 12 01:02:42 2035 GMT
*  issuer: C=PY; O=AWWFIDJN; CN=localhost; OU=GPIQKAV; DC=HVWTNS; DC=local
*  SSL certificate verify result: self-signed certificate (18), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/1.1
> Host: wfuchs.de
> User-Agent: Mozilla/5.0
> Accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Cache-Control: max-age=60, private, proxy-revalidate
< Connection: Upgrade
< Content-Type: text/html; charset=UTF-8
< Date: 2025-04-13T06:33:20+08:00
< Server: Apache
< Strict-Transport-Security: max-age=0
< Upgrade: h2
< Vary: Accept-Encoding,User-Agent
< Content-Length: 554
< 
{ [554 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle
<html><head><title>Router (build 4912:4913M) - Info</title></head><body></body></html>
Stderr (fail)
Toggle
*   Trying 47.237.92.86:4916...
* Connected to (nil) (47.237.92.86) port 4916 (#0)
* allocate connect buffer!
* Establish HTTP proxy tunnel to www.jremi.com:443
> CONNECT www.jremi.com:443 HTTP/1.1
> Host: www.jremi.com:443
> User-Agent: Mozilla/5.0
> Proxy-Connection: Keep-Alive
> 
< HTTP/1.1 200 Connection established
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [21 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [1468 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [520 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [36 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [36 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: C=PY; O=AWWFIDJN; CN=localhost; OU=GPIQKAV; DC=HVWTNS; DC=local
*  start date: Apr 12 01:02:42 2025 GMT
*  expire date: Apr 12 01:02:42 2035 GMT
*  issuer: C=PY; O=AWWFIDJN; CN=localhost; OU=GPIQKAV; DC=HVWTNS; DC=local
*  SSL certificate verify result: self-signed certificate (18), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET / HTTP/1.1
> Host: www.jremi.com
> User-Agent: Mozilla/5.0
> Accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: istio-envoy
< Date: Sat, 12 Apr 2025 09:38:04 GMT
< Content-Length: 87
< Content-Type: text/html; charset=utf-8
< 
{ [87 bytes data]
* Connection #0 to host (nil) left intact
SOCKS4
Checks Total 30
Checks Successful 15
Checks Failed 15
Checks Failed Consecutive 0
Ø Uptime 50.00%
Last Successful Check 2025-04-13 00:33:34
Last Failed Check 2025-04-03 00:32:47
Last Response Time 4.78s
Ø Response Time 4.83s
Anonymity Level high anonymous
Via
Gateway
Retries 0
Headers
Stdout
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>AZ Environment variables 1.04</title>
</head>
<body>
<pre>
REQUEST_URI = /azenv.php
REQUEST_METHOD = GET
REMOTE_PORT = 13466
REQUEST_SCHEME = https
REMOTE_ADDR = 47.237.92.86
HTTP_ACCEPT_ENCODING = 
HTTP_USER_AGENT = Mozilla/5.0
HTTP_HOST = wfuchs.de
HTTPS = on
REQUEST_TIME_FLOAT  = 1744497214.010
REQUEST_TIME = 1744497214
</pre>
</body>
</html>
Stderr
Toggle
*   Trying 47.237.92.86:4916...
* SOCKS4 communication to wfuchs.de:443
* SOCKS4 non-blocking resolve of wfuchs.de
* SOCKS4 connect to IPv4 162.55.27.236 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (47.237.92.86) port 4916 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [21 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [1468 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [520 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [36 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [36 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: C=PY; O=AWWFIDJN; CN=localhost; OU=GPIQKAV; DC=HVWTNS; DC=local
*  start date: Apr 12 01:02:42 2025 GMT
*  expire date: Apr 12 01:02:42 2035 GMT
*  issuer: C=PY; O=AWWFIDJN; CN=localhost; OU=GPIQKAV; DC=HVWTNS; DC=local
*  SSL certificate verify result: self-signed certificate (18), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/1.1
> Host: wfuchs.de
> User-Agent: Mozilla/5.0
> Accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Cache-Control: max-age=60, private, proxy-revalidate
< Connection: Upgrade
< Content-Type: text/html; charset=UTF-8
< Date: 2025-04-13T06:33:34+08:00
< Server: Apache
< Strict-Transport-Security: max-age=0
< Upgrade: h2
< Vary: Accept-Encoding,User-Agent
< Content-Length: 554
< 
{ [554 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle
<html><head><title>TS564</title></head><body></body></html>
Stderr (fail)
Toggle
*   Trying 47.237.92.86:4916...
* SOCKS4 communication to www.jremi.com:443
* SOCKS4 non-blocking resolve of www.jremi.com
* SOCKS4 connect to IPv4 172.245.17.83 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (47.237.92.86) port 4916 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [21 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [1468 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [520 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [36 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [36 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: C=AF; O=QHFDEJGU; CN=localhost; OU=BFUDPJG; DC=CQRBPN; DC=local
*  start date: Apr  2 12:15:43 2025 GMT
*  expire date: Apr  2 12:15:43 2035 GMT
*  issuer: C=AF; O=QHFDEJGU; CN=localhost; OU=BFUDPJG; DC=CQRBPN; DC=local
*  SSL certificate verify result: self-signed certificate (18), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET / HTTP/1.1
> Host: www.jremi.com
> User-Agent: Mozilla/5.0
> Accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: xxxx
< Date: Wed, 02 Apr 2025 22:32:46 GMT
< Content-Length: 60
< Content-Type: text/html; charset=utf-8
< 
{ [60 bytes data]
* Connection #0 to host (nil) left intact