IP | 54.212.162.236 |
Port | 1080 |
Types/Protocols | HTTP, HTTPS, SOCKS4, SOCKS5 |
Host | ec2-54-212-162-236.us-west-2.compute.amazonaws.com |
Country |
![]() |
City | Boardman |
ISP | AMAZON-02 |
Date Added | 2025-01-07 19:48:19 |
Date Last Checked | 2025-04-08 02:55:58 |
Checks Total | 19 |
Checks Successful | 10 |
Checks Failed | 9 |
Checks Failed Consecutive | 4 |
Ø Uptime | 52.63% |
Last Successful Check | 2025-04-01 02:49:11 |
Last Failed Check | 2025-04-08 02:55:58 |
Last Response Time | 1.78s |
Ø Response Time | 1.66s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 45.83.21.193 |
Retries | 0 |
Headers | – |
Stdout |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> <meta name="keywords" content="proxyjudge, proxy judge, azenv proxy judge, azenv.php" /> </head> <body> <h1>PHP Proxy Judge</h1> <pre> HTTP_CONNECTION = close HTTP_HOST = proxyjudge.us REMOTE_PORT = 59138 REMOTE_ADDR = 45.83.21.193 REQUEST_SCHEME = http REQUEST_URI = / REQUEST_METHOD = GET REQUEST_TIME_FLOAT = 1743468517.2882 REQUEST_TIME = 1743468517 </pre> </body> </html> |
Stderr |
Toggle* Trying 54.212.162.236:1080... * Connected to (nil) (54.212.162.236) port 1080 (#0) > GET http://proxyjudge.us/ HTTP/1.1 > Host: proxyjudge.us > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Transfer-Encoding: chunked < Date: Tue, 01 Apr 2025 00:48:37 GMT < Server: nginx < Content-Type: text/html; charset=UTF-8 < Connection: close < Cache-Control: no-cache, no-store, must-revalidate < Pragma: no-cache < Expires: 0 < { [647 bytes data] * Closing connection 0 |
Stdout (fail) |
Toggle<H1>Could not connect</H1> |
Stderr (fail) |
Toggle* Trying 54.212.162.236:1080... * Connected to (nil) (54.212.162.236) port 1080 (#0) > GET http://aranguren.org/azenv.php HTTP/1.1 > Host: aranguren.org > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 501 Gateway error < Transfer-Encoding: chunked < Date: Tue, 08 Apr 2025 00:55:18 GMT < Server: nginx < Content-Type: text/html < { [37 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 51 |
Checks Successful | 37 |
Checks Failed | 14 |
Checks Failed Consecutive | 0 |
Ø Uptime | 72.55% |
Last Successful Check | 2025-04-08 02:55:58 |
Last Failed Check | 2025-04-03 02:03:44 |
Last Response Time | 5.96s |
Ø Response Time | 3.61s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 45.84.107.101 |
Retries | 0 |
Headers | – |
Stdout |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>AZ Environment variables 1.04</title> </head> <body> <pre> HTTP_ACCEPT = */* HTTP_USER_AGENT = Mozilla/5.0 HTTP_HOST = www.jremi.com REMOTE_PORT = 36048 REMOTE_ADDR = 45.84.107.101 HTTPS = on REQUEST_SCHEME = https REQUEST_URI = / REQUEST_METHOD = GET REQUEST_TIME_FLOAT = 1744073738.2597 REQUEST_TIME = 1744073738 </pre> </body> </html> |
Stderr |
Toggle* Trying 54.212.162.236:1080... * Connected to (nil) (54.212.162.236) port 1080 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to www.jremi.com:443 > CONNECT www.jremi.com:443 HTTP/1.1 > Host: www.jremi.com:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 Connection Established < Content-Type: text/plain < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [98 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [4570 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=*.jremi.com * start date: Sep 13 00:00:00 2024 GMT * expire date: Oct 4 23:59:59 2025 GMT * issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x562aec4989f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 128)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < server: nginx/1.10.3 (Ubuntu) < date: Tue, 08 Apr 2025 00:55:38 GMT < content-type: text/html; charset=UTF-8 < { [544 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 54.212.162.236:1080... * Connected to (nil) (54.212.162.236) port 1080 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to depts.washington.edu:443 > CONNECT depts.washington.edu:443 HTTP/1.1 > Host: depts.washington.edu:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 501 Gateway error < Date: Thu, 03 Apr 2025 00:03:16 GMT < Server: nginx < Content-Type: text/html < Content-Length: 26 < * Received HTTP code 501 from proxy after CONNECT * CONNECT phase completed! * Closing connection 0 curl: (56) Received HTTP code 501 from proxy after CONNECT |
Checks Total | 35 |
Checks Successful | 10 |
Checks Failed | 25 |
Checks Failed Consecutive | 0 |
Ø Uptime | 28.57% |
Last Successful Check | 2025-04-08 02:55:58 |
Last Failed Check | 2025-04-05 07:37:31 |
Last Response Time | 0.73s |
Ø Response Time | 1.49s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 35.90.41.246 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 35.90.41.246 REMOTE_PORT = 53851 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1744073748.2633092 REQUEST_TIME = 1744073748 HTTP_HOST = www.jremi.com HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 54.212.162.236:1080... * SOCKS4 communication to www.jremi.com:443 * SOCKS4 non-blocking resolve of www.jremi.com * SOCKS4 connect to IPv4 172.245.17.83 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (54.212.162.236) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [768 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 8 00:04:37 2024 GMT * expire date: Apr 8 00:04:37 2026 GMT * issuer: CN=ZeroSSL RSA Domain Secure Site CA; O=ZeroSSL; C=AT * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x557bc22469f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Tue, 08 Apr 2025 00:55:48 GMT < server: squid/3.5.28 < content-length: 233 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Support Ticket</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <link href="style/default.css" rel="stylesheet" type="text/css"> <link rel=�shortcut icon� href=�favicon.ico� type=�image/x-icon�> <script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-27394594-1']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); </script> </head> <body> <h1>Support</h1> <p>Bitte benutzen Sie dieses Formular um uns eine Supportanfrage zu stellen.<br><b>Ihre IP Adresse wird mit der E-Mail �bermittelt.</b></p> <form action="sendmail.php" method="POST" accept-charset="utf-8"> <p>Ihr Name:<br><input type="text" name="name" size="25"> <p>Ihre E-Mailadresse:<br><input type="text" name="email" size = "25"></p> <p>Nachricht:<br><textarea cols="40" rows="10" name="message"></textarea></p> <p><input type="submit" value="Senden"></p> </form> <p> <a href="http://jigsaw.w3.org/css-validator/check/referer"> <img style="border:0;width:88px;height:31px" src="http://jigsaw.w3.org/css-validator/images/vcss" alt="Valid CSS!"></a> <a href="http://validator.w3.org/check?uri=referer"> <img style="border:0;width:88px;height:31px" src="http://www.w3.org/Icons/valid-html401" alt="Valid HTML 4.01 Strict"></a> </p> <!-- Copyright (c) 2009 - SupportAerie, released under GNU GPL licensing terms --> </body> </html> |
Stderr (fail) |
Toggle* Trying 54.212.162.236:1080... * SOCKS4 communication to wfuchs.de:443 * SOCKS4 non-blocking resolve of wfuchs.de * SOCKS4 connect to IPv4 162.55.27.236 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (54.212.162.236) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [749 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=wfuchs.de * start date: Apr 5 05:02:07 2024 GMT * expire date: Apr 5 05:02:07 2026 GMT * issuer: CN=Amazon RSA 2048 M02; O=Amazon; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x557d86a0e9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: wfuchs.de > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sat, 05 Apr 2025 05:37:20 GMT < server: Apache < last-modified: Wed, 30 Nov 2011 16:11:35 GMT < accept-ranges: bytes < content-length: 1834 < vary: Accept-Encoding,User-Agent < cache-control: max-age=60, private, proxy-revalidate < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 51 |
Checks Successful | 24 |
Checks Failed | 27 |
Checks Failed Consecutive | 0 |
Ø Uptime | 47.06% |
Last Successful Check | 2025-04-08 02:55:58 |
Last Failed Check | 2025-03-29 07:13:13 |
Last Response Time | 0.95s |
Ø Response Time | 1.42s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 35.90.41.246 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 35.90.41.246 REMOTE_PORT = 61134 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1744073758.205243 REQUEST_TIME = 1744073758 HTTP_HOST = www.jremi.com HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 54.212.162.236:1080... * SOCKS5 connect to IPv4 172.245.17.83:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (54.212.162.236) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [768 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=www.jremi.com * start date: Apr 8 00:04:37 2024 GMT * expire date: Apr 8 00:04:37 2026 GMT * issuer: CN=ZeroSSL RSA Domain Secure Site CA; O=ZeroSSL; C=AT * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55922bc479f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: www.jremi.com > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Tue, 08 Apr 2025 00:55:58 GMT < server: squid/3.5.28 < content-length: 232 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<H1>Could not connect</H1> |
Stderr (fail) |
Toggle* Trying 54.212.162.236:1080... * SOCKS5 connect to IPv4 128.208.60.35:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (54.212.162.236) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [775 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Mar 29 05:20:02 2024 GMT * expire date: Mar 29 05:20:02 2026 GMT * issuer: CN=ZeroSSL RSA Domain Secure Site CA; O=ZeroSSL; C=AT * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5563380069f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 501 < date: Sat, 29 Mar 2025 06:13:08 GMT < server: nginx < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |