Details for Proxy 67.201.33.10:25283

IP 67.201.33.10
Port 25283
Types/Protocols SOCKS4, SOCKS5
Host pppeoldf2.practicetechnologies.cw.zerolag.com
Country US United States (US)
ISP PERFORMIVE
Date Added 2025-01-07 14:00:39
Date Last Checked 2025-04-06 02:38:50
SOCKS4
Checks Total 50
Checks Successful 49
Checks Failed 1
Checks Failed Consecutive 0
Ø Uptime 98.00%
Last Successful Check 2025-04-06 02:38:50
Last Failed Check 2025-02-13 02:03:42
Last Response Time 1.48s
Ø Response Time 2.04s
Anonymity Level high anonymous
Via
Gateway
Retries 0
Headers
Stdout
Toggle
<html><head><title>Env.cgi</title></head><body>
I am <B>uid=2001(ken) gid=15(users) groups=15(users)</B> on <B>depts02.u.washington.edu</B><br>
Don't know who you are

<h3><a name=env>My environment follows:</h3>
<pre>
_=*14395*/usr/bin/env
CONTEXT_DOCUMENT_ROOT=/hw00/d01/ken/.
CONTEXT_PREFIX=/ken
DOCUMENT_ROOT=/www
GATEWAY_INTERFACE=CGI/1.1
HTTPS=on
HTTP_ACCEPT=*/*
HTTP_HOST=depts.washington.edu
HTTP_USER_AGENT=Mozilla/5.0
PATH=/usr/local/bin:/usr/bin:/bin
PWD=/nfs/aesop1/hw00/d01/ken
QUERY_STRING=
REMOTE_ADDR=67.201.33.10
REMOTE_PORT=58454
REQUEST_METHOD=GET
REQUEST_SCHEME=https
REQUEST_URI=/ken/env.cgi
SCRIPT_FILENAME=/hw00/d01/ken/env.cgi
SCRIPT_NAME=/ken/env.cgi
SERVER_ADDR=128.208.61.183
SERVER_ADMIN=help@uw.edu
SERVER_NAME=depts.washington.edu
SERVER_PORT=443
SERVER_PROTOCOL=HTTP/2.0
SERVER_SIGNATURE=
SERVER_SOFTWARE=Apache
SHLVL=1
SSL_CIPHER=ECDHE-RSA-AES256-GCM-SHA384
SSL_CIPHER_ALGKEYSIZE=256
SSL_CIPHER_EXPORT=false
SSL_CIPHER_USEKEYSIZE=256
SSL_CLIENT_VERIFY=NONE
SSL_COMPRESS_METHOD=NULL
SSL_PROTOCOL=TLSv1.2
SSL_SECURE_RENEG=true
SSL_SERVER_A_KEY=rsaEncryption
SSL_SERVER_A_SIG=sha256WithRSAEncryption
SSL_SERVER_I_DN=CN=R10,O=Let's Encrypt,C=US
SSL_SERVER_I_DN_C=US
SSL_SERVER_I_DN_CN=R10
SSL_SERVER_I_DN_O=Let's Encrypt
SSL_SERVER_M_SERIAL=03471B068DA25813154CC58C53993DF1FCD7
SSL_SERVER_M_VERSION=3
SSL_SERVER_SAN_DNS_0=courses.washington.edu
SSL_SERVER_SAN_DNS_1=depts.washington.edu
SSL_SERVER_SAN_DNS_2=faculty.washington.edu
SSL_SERVER_SAN_DNS_3=staff.washington.edu
SSL_SERVER_SAN_DNS_4=www.courses.washington.edu
SSL_SERVER_SAN_DNS_5=www.depts.washington.edu
SSL_SERVER_SAN_DNS_6=www.faculty.washington.edu
SSL_SERVER_SAN_DNS_7=www.staff.washington.edu
SSL_SERVER_S_DN=CN=depts.washington.edu
SSL_SERVER_S_DN_CN=depts.washington.edu
SSL_SERVER_V_END=May  8 18:07:05 2025 GMT
SSL_SERVER_V_START=Feb  7 18:07:06 2025 GMT
SSL_SESSION_ID=2f9eab8054c863557a54da379352d8ffb8ef326d0ca6169aaf00be7f2c5a8198
SSL_SESSION_RESUMED=Resumed
SSL_VERSION_INTERFACE=mod_ssl/2.4.56
SSL_VERSION_LIBRARY=OpenSSL/1.0.2k-fips
A__z="*SHLVL
</pre>
<h3>Stuff on stdin follows</h3>
<pre>
</pre>
End of stdin
</body></html>
Stderr
Toggle
*   Trying 67.201.33.10:25283...
* SOCKS4 communication to depts.washington.edu:443
* SOCKS4 non-blocking resolve of depts.washington.edu
* SOCKS4 connect to IPv4 128.208.60.35 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (67.201.33.10) port 25283 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [88 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [155 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [10 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [3020 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
*  subject: CN=depts.washington.edu
*  start date: Apr  4 22:42:02 2025 GMT
*  expire date: Apr  4 22:42:02 2026 GMT
*  issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none
*  SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /ken/env.cgi HTTP/1.1
> Host: depts.washington.edu
> User-Agent: Mozilla/5.0
> Accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 
< vary: Accept-Encoding
< content-type: text/html
< date: Sun, 06 Apr 2025 00:38:36 GMT
< server: Apache
< set-cookie: _affinity=d02|Z/HND; path=/; HttpOnly; Secure
< transfer-encoding: chunked
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact
Stdout (fail)
Toggle

                            
Stderr (fail)
Toggle
*   Trying 67.201.33.10:25283...
* SOCKS4 communication to aranguren.org:443
* SOCKS4 non-blocking resolve of aranguren.org
* SOCKS4 connect to IPv4 203.132.94.196 (locally resolved)
* SOCKS4 request granted.
* Connected to (nil) (67.201.33.10) port 25283 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.0 (OUT), TLS header, Unknown (21):
} [5 bytes data]
* TLSv1.3 (OUT), TLS alert, decode error (562):
} [2 bytes data]
* error:0A000126:SSL routines::unexpected eof while reading
* Closing connection 0
curl: (35) error:0A000126:SSL routines::unexpected eof while reading
SOCKS5
Checks Total 50
Checks Successful 50
Checks Failed 0
Checks Failed Consecutive 0
Ø Uptime 100.00%
Last Successful Check 2025-04-06 02:38:50
Last Failed Check
Last Response Time 4.10s
Ø Response Time 1.90s
Anonymity Level high anonymous
Via
Gateway
Retries 0
Headers
Stdout
Toggle
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>AZ Environment variables 1.04</title>
</head>
<body>
<a href="https://aranguren.org/electromotivevacanc.php"><!-- allocation-resident --></a>
<script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- azenv ad experiment -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-1166407168291315"
     data-ad-slot="2609280301"
     data-ad-format="auto"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script>
<pre>
REQUEST_URI = /azenv.php
REQUEST_METHOD = GET
REMOTE_PORT = 37903
REQUEST_SCHEME = https
REMOTE_ADDR = 67.201.33.10
HTTP_ACCEPT = */*
HTTP_USER_AGENT = Mozilla/5.0
HTTP_HOST = aranguren.org
HTTPS = on
REQUEST_TIME_FLOAT = 1743899929.9158
REQUEST_TIME = 1743899929
</pre>
<script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- azenv ad experiment -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-1166407168291315"
     data-ad-slot="2609280301"
     data-ad-format="auto"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script>
</body>
</html>
Stderr
Toggle
*   Trying 67.201.33.10:25283...
* SOCKS5 connect to IPv4 203.132.94.196:443 (locally resolved)
* SOCKS5 request granted.
* Connected to (nil) (67.201.33.10) port 25283 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [88 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [155 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [10 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [2975 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server did not agree to a protocol
* Server certificate:
*  subject: CN=aranguren.org
*  start date: Apr  5 00:17:19 2025 GMT
*  expire date: Apr  5 00:17:19 2026 GMT
*  issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none
*  SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /azenv.php HTTP/1.1
> Host: aranguren.org
> User-Agent: Mozilla/5.0
> Accept: */*
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [57 bytes data]
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sun, 06 Apr 2025 00:38:49 GMT
< Server: Apache
< x-frame-options: SAMEORIGIN
< x-xss-protection: 1; mode=block
< X-Content-Type-Options: nosniff
< Connection: Upgrade
< Vary: Accept-Encoding
< Transfer-Encoding: chunked
< Content-Type: text/html; charset=UTF-8
< 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host (nil) left intact