IP | 47.250.11.111 |
Port | 3128 |
Types/Protocols | HTTP, HTTPS, SOCKS4, SOCKS5 |
Country |
![]() |
City | Kuala Lumpur |
ISP | Alibaba US Technology Co., Ltd. |
Date Added | 2025-01-07 14:50:52 |
Date Last Checked | 2025-04-13 02:38:12 |
Checks Total | 54 |
Checks Successful | 26 |
Checks Failed | 28 |
Checks Failed Consecutive | 0 |
Ø Uptime | 48.15% |
Last Successful Check | 2025-04-13 02:38:12 |
Last Failed Check | 2025-04-05 06:17:42 |
Last Response Time | 2.42s |
Ø Response Time | 2.98s |
Anonymity Level | high anonymous |
Via | – |
Gateway | – |
Retries | 0 |
Headers | – |
Stdout |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <link href='https://fonts.googleapis.com/css?family=Sonsie+One' rel='stylesheet' type='text/css'> <style> body { font-family: 'Sonsie One', cursive; color:white; background-color:#000; } </style> <title>httpHeader.net</title> </head> <body> <h1>httpHeader.net</h1> <pre> HTTP_HOST = httpheader.net HTTP_USER_AGENT = Mozilla/5.0 HTTP_ACCEPT_ENCODING = REMOTE_ADDR = 47.250.11.111 REQUEST_SCHEME = http REMOTE_PORT = 47828 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1744504633.010 REQUEST_TIME = 1744504633<BR>SERVER = 20<BR> </pre> <a href="http://blogadmin.freshdesk.com/support/home">What is this website | <a href="http://blogadmin.freshdesk.com/support/home">Contact us</a> </body> </html> |
Stderr |
Toggle* Trying 47.250.11.111:3128... * Connected to (nil) (47.250.11.111) port 3128 (#0) > GET http://httpheader.net/ HTTP/1.1 > Host: httpheader.net > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Content-Type: text/html; charset=UTF-8 < Date: 2025-04-13T08:37:13+08:00 < Server: Apache/2.4.38 (Debian) < Vary: Accept-Encoding < Content-Length: 989 < { [989 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<html><head><title>Bienvenido | PRTG Network Monitor (SERVER)</title></head><body></body></html> |
Stderr (fail) |
Toggle* Trying 47.250.11.111:3128... * Connected to (nil) (47.250.11.111) port 3128 (#0) > GET http://aranguren.org/azenv.php HTTP/1.1 > Host: aranguren.org > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: web cache < Date: Sat, 05 Apr 2025 04:16:39 GMT < Content-Length: 97 < Content-Type: text/html; charset=utf-8 < { [97 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 42 |
Checks Successful | 13 |
Checks Failed | 29 |
Checks Failed Consecutive | 0 |
Ø Uptime | 30.95% |
Last Successful Check | 2025-04-13 02:38:12 |
Last Failed Check | 2025-04-08 02:21:47 |
Last Response Time | 5.61s |
Ø Response Time | 5.98s |
Anonymity Level | high anonymous |
Via | – |
Gateway | – |
Retries | 0 |
Headers | – |
Stdout |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> </head> <body> <pre> REQUEST_URI = /azenv.php REQUEST_METHOD = GET REMOTE_PORT = 34770 REQUEST_SCHEME = https REMOTE_ADDR = 47.250.11.111 HTTP_ACCEPT_ENCODING = HTTP_USER_AGENT = Mozilla/5.0 HTTP_HOST = wfuchs.de HTTPS = on REQUEST_TIME_FLOAT = 1744504648.010 REQUEST_TIME = 1744504648 </pre> </body> </html> |
Stderr |
Toggle* Trying 47.250.11.111:3128... * Connected to (nil) (47.250.11.111) port 3128 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to wfuchs.de:443 > CONNECT wfuchs.de:443 HTTP/1.1 > Host: wfuchs.de:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection established < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [21 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [1494 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [520 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=TD; O=EHXCIKBQ; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * start date: Apr 12 13:03:30 2025 GMT * expire date: Apr 12 13:03:30 2035 GMT * issuer: C=TD; O=EHXCIKBQ; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * SSL certificate verify result: self-signed certificate (18), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/1.1 > Host: wfuchs.de > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [122 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Cache-Control: max-age=60, private, proxy-revalidate < Connection: Upgrade < Content-Type: text/html; charset=UTF-8 < Date: 2025-04-13T08:37:28+08:00 < Server: Apache < Strict-Transport-Security: max-age=0 < Upgrade: h2 < Vary: Accept-Encoding,User-Agent < Content-Length: 555 < { [555 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<html><head><title>Busch-ControlTouch: Login</title></head><body></body></html> |
Stderr (fail) |
Toggle* Trying 47.250.11.111:3128... * Connected to (nil) (47.250.11.111) port 3128 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to www.jremi.com:443 > CONNECT www.jremi.com:443 HTTP/1.1 > Host: www.jremi.com:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection established < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [21 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [1494 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [520 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=CF; O=OLNKUQMR; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * start date: Apr 7 11:16:30 2025 GMT * expire date: Apr 7 11:16:30 2035 GMT * issuer: C=CF; O=OLNKUQMR; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * SSL certificate verify result: self-signed certificate (18), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/1.1 > Host: www.jremi.com > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [122 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: AstraSM < Date: Tue, 08 Apr 2025 00:21:03 GMT < Content-Length: 80 < Content-Type: text/html; charset=utf-8 < { [80 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 38 |
Checks Successful | 10 |
Checks Failed | 28 |
Checks Failed Consecutive | 0 |
Ø Uptime | 26.32% |
Last Successful Check | 2025-04-13 02:38:12 |
Last Failed Check | 2025-04-08 02:21:47 |
Last Response Time | 4.84s |
Ø Response Time | 5.06s |
Anonymity Level | high anonymous |
Via | – |
Gateway | – |
Retries | 0 |
Headers | – |
Stdout |
Toggle<html><head><title>Env.cgi</title></head><body> I am <B>uid=2001(ken) gid=15(users) groups=15(users)</B> on <B>depts03.u.washington.edu</B><br> Don't know who you are <h3><a name=env>My environment follows:</h3> <pre> _=*19704*/usr/bin/env CONTEXT_DOCUMENT_ROOT=/hw00/d01/ken/. CONTEXT_PREFIX=/ken DOCUMENT_ROOT=/www GATEWAY_INTERFACE=CGI/1.1 HTTP_ACCEPT_ENCODING= HTTP_CONNECTION=close HTTP_HOST=depts.washington.edu HTTP_USER_AGENT=Mozilla/5.0 PATH=/usr/local/bin:/usr/bin:/bin PWD=/nfs/bronfs/uwfs/hw00/d01/ken QUERY_STRING= REMOTE_ADDR=47.250.11.111 REMOTE_PORT=41334 REQUEST_METHOD=GET REQUEST_SCHEME=http REQUEST_URI=/ken/env.cgi SCRIPT_FILENAME=/hw00/d01/ken/env.cgi SCRIPT_NAME=/ken/env.cgi SERVER_ADDR=128.208.61.62 SERVER_ADMIN=help@uw.edu SERVER_NAME=depts.washington.edu SERVER_PORT=80 SERVER_PROTOCOL=HTTP/1.1 SERVER_SIGNATURE= SERVER_SOFTWARE=Apache SHLVL=1 A__z="*SHLVL </pre> <h3>Stuff on stdin follows</h3> <pre> </pre> End of stdin </body></html> |
Stderr |
Toggle* Trying 47.250.11.111:3128... * SOCKS4 communication to depts.washington.edu:443 * SOCKS4 non-blocking resolve of depts.washington.edu * SOCKS4 connect to IPv4 128.208.60.35 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (47.250.11.111) port 3128 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [21 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [1494 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [520 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=TD; O=EHXCIKBQ; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * start date: Apr 12 13:03:30 2025 GMT * expire date: Apr 12 13:03:30 2035 GMT * issuer: C=TD; O=EHXCIKBQ; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * SSL certificate verify result: self-signed certificate (18), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/1.1 > Host: depts.washington.edu > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [122 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Connection: Upgrade < Content-Type: text/html < Date: 2025-04-13T08:37:42+08:00 < Server: Apache < Upgrade: h2 < Vary: Accept-Encoding < Content-Length: 966 < { [966 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<html><head><title>Open eClass</title></head><body></body></html> |
Stderr (fail) |
Toggle* Trying 47.250.11.111:3128... * SOCKS4 communication to www.jremi.com:443 * SOCKS4 non-blocking resolve of www.jremi.com * SOCKS4 connect to IPv4 172.245.17.83 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (47.250.11.111) port 3128 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [21 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [1494 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [520 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=CF; O=OLNKUQMR; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * start date: Apr 7 11:16:30 2025 GMT * expire date: Apr 7 11:16:30 2035 GMT * issuer: C=CF; O=OLNKUQMR; CN=localhost; OU=VMware Engineering; DC=vsphere; DC=local * SSL certificate verify result: self-signed certificate (18), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/1.1 > Host: www.jremi.com > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [122 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Server: Cross Web Server < Date: Tue, 08 Apr 2025 00:21:17 GMT < Content-Length: 66 < Content-Type: text/html; charset=utf-8 < { [66 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 10 |
Checks Successful | 2 |
Checks Failed | 8 |
Checks Failed Consecutive | 7 |
Ø Uptime | 20.00% |
Last Successful Check | 2025-04-01 02:14:29 |
Last Failed Check | 2025-04-13 02:38:12 |
Last Response Time | 7.64s |
Ø Response Time | 7.64s |
Anonymity Level | high anonymous |
Via | – |
Gateway | – |
Retries | 0 |
Headers | – |
Stdout |
Toggle<html><head><title>Env.cgi</title></head><body> I am <B>uid=2001(ken) gid=15(users) groups=15(users)</B> on <B>depts03.u.washington.edu</B><br> Don't know who you are <h3><a name=env>My environment follows:</h3> <pre> _=*19704*/usr/bin/env CONTEXT_DOCUMENT_ROOT=/hw00/d01/ken/. CONTEXT_PREFIX=/ken DOCUMENT_ROOT=/www GATEWAY_INTERFACE=CGI/1.1 HTTP_ACCEPT_ENCODING= HTTP_CONNECTION=close HTTP_HOST=depts.washington.edu HTTP_USER_AGENT=Mozilla/5.0 PATH=/usr/local/bin:/usr/bin:/bin PWD=/nfs/bronfs/uwfs/hw00/d01/ken QUERY_STRING= REMOTE_ADDR=47.250.11.111 REMOTE_PORT=41334 REQUEST_METHOD=GET REQUEST_SCHEME=http REQUEST_URI=/ken/env.cgi SCRIPT_FILENAME=/hw00/d01/ken/env.cgi SCRIPT_NAME=/ken/env.cgi SERVER_ADDR=128.208.61.62 SERVER_ADMIN=help@uw.edu SERVER_NAME=depts.washington.edu SERVER_PORT=80 SERVER_PROTOCOL=HTTP/1.1 SERVER_SIGNATURE= SERVER_SOFTWARE=Apache SHLVL=1 A__z="*SHLVL </pre> <h3>Stuff on stdin follows</h3> <pre> </pre> End of stdin </body></html> |
Stderr |
Toggle* Trying 47.250.11.111:3128... * SOCKS5 connect to IPv4 128.208.61.21:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (47.250.11.111) port 3128 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [21 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [1468 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [520 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [36 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [36 bytes data] * SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=BN; O=RYQBKMLS; CN=localhost; OU=FAJAXIT; DC=ZLAOML; DC=local * start date: Mar 27 03:36:32 2025 GMT * expire date: Mar 27 03:36:32 2035 GMT * issuer: C=BN; O=RYQBKMLS; CN=localhost; OU=FAJAXIT; DC=ZLAOML; DC=local * SSL certificate verify result: self-signed certificate (18), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/1.1 > Host: depts.washington.edu > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [122 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Connection: Upgrade < Content-Type: text/html < Date: 2025-04-01T08:14:29+08:00 < Server: Apache < Upgrade: h2 < Vary: Accept-Encoding < Content-Length: 966 < { [966 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 47.250.11.111:3128... * After 15000ms connect time, move on! * connect to 47.250.11.111 port 3128 failed: Connection timed out * Connection timeout after 15001 ms * Closing connection 0 curl: (28) Connection timeout after 15001 ms |