IP | 54.212.22.168 |
Port | 1080 |
Types/Protocols | HTTP, HTTPS, SOCKS4, SOCKS5 |
Host | ec2-54-212-22-168.us-west-2.compute.amazonaws.com |
Country |
![]() |
City | Boardman |
ISP | AMAZON-02 |
Date Added | 2025-01-07 15:06:50 |
Date Last Checked | 2025-04-06 02:33:18 |
Checks Total | 46 |
Checks Successful | 20 |
Checks Failed | 26 |
Checks Failed Consecutive | 0 |
Ø Uptime | 43.48% |
Last Successful Check | 2025-04-06 02:33:18 |
Last Failed Check | 2025-04-03 02:35:50 |
Last Response Time | 0.46s |
Ø Response Time | 0.99s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 35.90.41.246 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 35.90.41.246 REMOTE_PORT = 56716 REQUEST_METHOD = GET REQUEST_URI = http://pascal.hoez.free.fr/azenv.php REQUEST_TIME_FLOAT = 1743899562.6348195 REQUEST_TIME = 1743899562 HTTP_HOST = pascal.hoez.free.fr HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* HTTP_PROXY-CONNECTION = Keep-Alive |
Stderr |
Toggle* Trying 54.212.22.168:1080... * Connected to (nil) (54.212.22.168) port 1080 (#0) > GET http://pascal.hoez.free.fr/azenv.php HTTP/1.1 > Host: pascal.hoez.free.fr > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:32:42 GMT < Server: squid/4.10 < Content-Length: 310 < Connection: keep-alive < Content-Type: text/html < { [310 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Support Ticket</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <link href="style/default.css" rel="stylesheet" type="text/css"> <link rel=�shortcut icon� href=�favicon.ico� type=�image/x-icon�> <script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-27394594-1']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); </script> </head> <body> <h1>Support</h1> <p>Bitte benutzen Sie dieses Formular um uns eine Supportanfrage zu stellen.<br><b>Ihre IP Adresse wird mit der E-Mail �bermittelt.</b></p> <form action="sendmail.php" method="POST" accept-charset="utf-8"> <p>Ihr Name:<br><input type="text" name="name" size="25"> <p>Ihre E-Mailadresse:<br><input type="text" name="email" size = "25"></p> <p>Nachricht:<br><textarea cols="40" rows="10" name="message"></textarea></p> <p><input type="submit" value="Senden"></p> </form> <p> <a href="http://jigsaw.w3.org/css-validator/check/referer"> <img style="border:0;width:88px;height:31px" src="http://jigsaw.w3.org/css-validator/images/vcss" alt="Valid CSS!"></a> <a href="http://validator.w3.org/check?uri=referer"> <img style="border:0;width:88px;height:31px" src="http://www.w3.org/Icons/valid-html401" alt="Valid HTML 4.01 Strict"></a> </p> <!-- Copyright (c) 2009 - SupportAerie, released under GNU GPL licensing terms --> </body> </html> |
Stderr (fail) |
Toggle* Trying 54.212.22.168:1080... * Connected to (nil) (54.212.22.168) port 1080 (#0) > GET http://wfuchs.de/azenv.php HTTP/1.1 > Host: wfuchs.de > User-Agent: Mozilla/5.0 > Accept: */* > Proxy-Connection: Keep-Alive > * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Thu, 03 Apr 2025 00:35:11 GMT < Date: Thu, 03 Apr 2025 00:33:03 GMT < Server: nginx < Server: Apache < Host: wfuchs.de < Connection: Upgrade, close < Upgrade: h2,h2c < Last-Modified: Wed, 30 Nov 2011 16:11:35 GMT < Accept-Ranges: bytes < Content-Length: 1834 < Vary: Accept-Encoding,User-Agent < Cache-Control: max-age=60, private, proxy-revalidate < Content-Type: text/html < { [1834 bytes data] * Closing connection 0 |
Checks Total | 50 |
Checks Successful | 30 |
Checks Failed | 20 |
Checks Failed Consecutive | 2 |
Ø Uptime | 60.00% |
Last Successful Check | 2025-04-03 02:35:50 |
Last Failed Check | 2025-04-06 02:33:18 |
Last Response Time | 0.73s |
Ø Response Time | 2.80s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 52.36.163.33 |
Retries | 1 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 52.36.163.33 REMOTE_PORT = 63006 REQUEST_METHOD = GET REQUEST_URI = /ken/env.cgi REQUEST_TIME_FLOAT = 1743640524.7345636 REQUEST_TIME = 1743640524 HTTP_HOST = depts.washington.edu HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 54.212.22.168:1080... * Connected to (nil) (54.212.22.168) port 1080 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to depts.washington.edu:443 > CONNECT depts.washington.edu:443 HTTP/1.1 > Host: depts.washington.edu:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 OK < Date: Thu, 03 Apr 2025 00:35:24 GMT < Server: nginx < Content-Type: text/plain < Content-Length: 0 * Ignoring Content-Length in CONNECT 200 response < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [844 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 3 00:26:17 2024 GMT * expire date: Apr 3 00:26:17 2026 GMT * issuer: CN=Sectigo RSA Domain Validation Secure Server CA; O=Sectigo Limited; L=Salford; ST=Greater Manchester; C=GB * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x5557687af9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Thu, 03 Apr 2025 00:35:24 GMT < server: squid/6.0.0-20220501-re899e0c27 < content-length: 251 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle |
Stderr (fail) |
Toggle* Trying 54.212.22.168:1080... * Connected to (nil) (54.212.22.168) port 1080 (#0) * allocate connect buffer! * Establish HTTP proxy tunnel to depts.washington.edu:443 > CONNECT depts.washington.edu:443 HTTP/1.1 > Host: depts.washington.edu:443 > User-Agent: Mozilla/5.0 > Proxy-Connection: Keep-Alive > < HTTP/1.1 200 OK < Date: Sun, 06 Apr 2025 00:32:55 GMT < Date: Sun, 06 Apr 2025 00:31:08 GMT < Server: nginx < Server: Apache < Host: depts.washington.edu < Connection: Upgrade < Upgrade: h2 < Accept-Ranges: bytes < Content-Type: text/html < Content-Length: 2000 * Ignoring Content-Length in CONNECT 200 response < * Proxy replied 200 to CONNECT request * CONNECT phase completed! * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * (2144) (IN), , Unknown (60): { [5 bytes data] * error:0A00010B:SSL routines::wrong version number * Closing connection 0 curl: (35) error:0A00010B:SSL routines::wrong version number |
Checks Total | 34 |
Checks Successful | 18 |
Checks Failed | 16 |
Checks Failed Consecutive | 0 |
Ø Uptime | 52.94% |
Last Successful Check | 2025-04-06 02:33:18 |
Last Failed Check | 2025-04-05 06:25:05 |
Last Response Time | 0.73s |
Ø Response Time | 1.44s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 35.90.41.246 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 35.90.41.246 REMOTE_PORT = 56634 REQUEST_METHOD = GET REQUEST_URI = /azenv.php REQUEST_TIME_FLOAT = 1743899588.3085063 REQUEST_TIME = 1743899588 HTTP_HOST = wfuchs.de HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 54.212.22.168:1080... * SOCKS4 communication to wfuchs.de:443 * SOCKS4 non-blocking resolve of wfuchs.de * SOCKS4 connect to IPv4 162.55.27.236 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (54.212.22.168) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [749 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=wfuchs.de * start date: Apr 6 00:08:32 2024 GMT * expire date: Apr 6 00:08:32 2026 GMT * issuer: CN=Amazon RSA 2048 M01; O=Amazon; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x562dc681d9f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /azenv.php HTTP/2 > Host: wfuchs.de > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:33:08 GMT < server: squid/4.10 < content-length: 238 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<!DOCTYPE html <!-- UA webservers homepage This is for the faculty/staff/depts/courses/students system. --> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>UW Departments Web Server</title> <link href="styles.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="skipnav"> <a href="#contentbox">Skip Navigation</a> </div> <div id="wheader" class="colorPurple wNo patchNo"> <div id="autoMargin"> <div class="wlogoSmall"> <div class="logoAbsolute"><a id="wlogoLink" href="https://www.washington.edu/">W</a></div> <div><a href="https://www.washington.edu/">University of Washington</a></div> </div> <div id="wsearch"> <form name="uwglobalsearch" id="searchbox_001967960132951597331:04hcho0_drk" action="https://www.google.com/cse"> <div class="wfield"> <input type="hidden" name="cx" value="001967960132951597331:04hcho0_drk" /> <input type="hidden" name="cof" value="FORID:0" /> <input name="q" type="text" value="Search the UW" class="wTextInput" onclick="make_blank();" /> </div> <input type="submit" class="formbutton" name="sa" value="Go" /> </form> </div> <div id="wtext"> <ul> <li><a href="https://www.washington.edu/">UW Home</a></li> <li><span class="wborder"><a href="https://www.washington.edu/home/directories.html">Directories</a></span></li> <li><span class="wborder"><a href="https://www.washington.edu/visit/events.html">Calendar</a></span></li> <li><span class="wborder"><a href="https://www.washington.edu/maps/">Maps</a></span></li> <li><span class="wborder"><a href="https://myuw.washington.edu/">My UW</a></span></li> </ul> </div> </div> </div> <div id="content"> <div class="headart"> <img alt="Campus scene" src="scene-depts.jpg" height="240" width="400" /> <h1>UW Departments Web Server</h1> </div> <ul> |
Stderr (fail) |
Toggle* Trying 54.212.22.168:1080... * SOCKS4 communication to depts.washington.edu:443 * SOCKS4 non-blocking resolve of depts.washington.edu * SOCKS4 connect to IPv4 128.208.61.21 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (54.212.22.168) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [794 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 5 04:02:44 2024 GMT * expire date: Apr 5 04:02:44 2026 GMT * issuer: CN=Thawte TLS RSA CA G1; OU=www.digicert.com; O=DigiCert Inc; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55b56cee09f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sat, 05 Apr 2025 04:24:53 GMT < server: Apache < accept-ranges: bytes < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Checks Total | 50 |
Checks Successful | 14 |
Checks Failed | 36 |
Checks Failed Consecutive | 2 |
Ø Uptime | 28.00% |
Last Successful Check | 2025-04-03 02:35:50 |
Last Failed Check | 2025-04-06 02:33:18 |
Last Response Time | 6.54s |
Ø Response Time | 1.62s |
Anonymity Level | high anonymous |
Via | – |
Gateway | 52.36.163.33 |
Retries | 0 |
Headers | – |
Stdout |
ToggleREMOTE_ADDR = 52.36.163.33 REMOTE_PORT = 49519 REQUEST_METHOD = GET REQUEST_URI = /ken/env.cgi REQUEST_TIME_FLOAT = 1743640550.0084698 REQUEST_TIME = 1743640550 HTTP_HOST = depts.washington.edu HTTP_USER-AGENT = Mozilla/5.0 HTTP_ACCEPT = */* |
Stderr |
Toggle* Trying 54.212.22.168:1080... * SOCKS5 connect to IPv4 128.208.61.21:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (54.212.22.168) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [844 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 3 00:26:17 2024 GMT * expire date: Apr 3 00:26:17 2026 GMT * issuer: CN=Sectigo RSA Domain Validation Secure Server CA; O=Sectigo Limited; L=Salford; ST=Greater Manchester; C=GB * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55a91b9b49f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Thu, 03 Apr 2025 00:35:50 GMT < server: squid/6.0.0-20220501-re899e0c27 < content-length: 251 < content-type: text/html < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Stdout (fail) |
Toggle<!DOCTYPE html <!-- UA webservers homepage This is for the faculty/staff/depts/courses/students system. --> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>UW Departments Web Server</title> <link href="styles.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="skipnav"> <a href="#contentbox">Skip Navigation</a> </div> <div id="wheader" class="colorPurple wNo patchNo"> <div id="autoMargin"> <div class="wlogoSmall"> <div class="logoAbsolute"><a id="wlogoLink" href="https://www.washington.edu/">W</a></div> <div><a href="https://www.washington.edu/">University of Washington</a></div> </div> <div id="wsearch"> <form name="uwglobalsearch" id="searchbox_001967960132951597331:04hcho0_drk" action="https://www.google.com/cse"> <div class="wfield"> <input type="hidden" name="cx" value="001967960132951597331:04hcho0_drk" /> <input type="hidden" name="cof" value="FORID:0" /> <input name="q" type="text" value="Search the UW" class="wTextInput" onclick="make_blank();" /> </div> <input type="submit" class="formbutton" name="sa" value="Go" /> </form> </div> <div id="wtext"> <ul> <li><a href="https://www.washington.edu/">UW Home</a></li> <li><span class="wborder"><a href="https://www.washington.edu/home/directories.html">Directories</a></span></li> <li><span class="wborder"><a href="https://www.washington.edu/visit/events.html">Calendar</a></span></li> <li><span class="wborder"><a href="https://www.washington.edu/maps/">Maps</a></span></li> <li><span class="wborder"><a href="https://myuw.washington.edu/">My UW</a></span></li> </ul> </div> </div> </div> <div id="content"> <div class="headart"> <img alt="Campus scene" src="scene-depts.jpg" height="240" width="400" /> <h1>UW Departments Web Server</h1> </div> <ul> |
Stderr (fail) |
Toggle* Trying 54.212.22.168:1080... * SOCKS5 connect to IPv4 128.208.61.21:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (54.212.22.168) port 1080 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [122 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [15 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [824 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=depts.washington.edu * start date: Apr 6 00:16:42 2024 GMT * expire date: Apr 6 00:16:42 2026 GMT * issuer: CN=Usonia us-east1 ICA; OU=Cast; O=Google Inc; L=Mountain View; ST=California; C=US * SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55f5d84519f0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /ken/env.cgi HTTP/2 > Host: depts.washington.edu > user-agent: Mozilla/5.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 10)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < date: Sun, 06 Apr 2025 00:33:18 GMT < date: Sun, 06 Apr 2025 00:31:08 GMT < server: nginx < server: Apache < host: depts.washington.edu < accept-ranges: bytes < content-type: text/html < content-length: 2000 < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |