IP | 72.210.221.223 |
Port | 4145 | Protocols | SOCKS4, SOCKS5 |
Host | ip72-210-221-223.ph.ph.cox.net |
Country | US |
ISP | ASN-CXA-ALL-CCI-22773-RDC |
Date Added | 2022-09-25 21:07:30 |
Date Last Checked | 2024-04-20 00:06:50 |
Checks Total | 324 |
Checks Successful | 217 |
Checks Failed | 107 |
Checks Failed Consecutive | 0 |
Ø Uptime | 66.98% |
Last Successful Check | 2024-04-20 00:06:50 |
Last Failed Check | 2024-04-13 00:12:08 |
Last Response Time | 1.29s |
Ø Response Time | 4.41s |
Anonymity Level | elite |
Retries | 0 |
Headers (in) |
Server Apache/2.4.38 (Debian) |
Output (success) |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <link href='https://fonts.googleapis.com/css?family=Sonsie+One' rel='stylesheet' type='text/css'> <style> body { font-family: 'Sonsie One', cursive; color:white; background-color:#000; } </style> <title>httpHeader.net</title> </head> <body> <h1>httpHeader.net</h1> <pre> HTTPS = on HTTP_HOST = httpheader.net HTTP_USER_AGENT = Mozilla/5.0 HTTP_ACCEPT = */* REMOTE_ADDR = 72.210.221.223 REQUEST_SCHEME = https REMOTE_PORT = 42927 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1713564409.1124 REQUEST_TIME = 1713564409<BR>SERVER = 20<BR> </pre> <a href="http://blogadmin.freshdesk.com/support/home">What is this website | <a href="http://blogadmin.freshdesk.com/support/home">Contact us</a> </body> </html> * Trying 72.210.221.223:4145... * SOCKS4 communication to httpheader.net:443 * SOCKS4 non-blocking resolve of httpheader.net * SOCKS4 connect to IPv4 51.79.85.190 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (72.210.221.223) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [155 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [10 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2902 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: OU=Domain Control Validated; OU=PositiveSSL; CN=httpheader.net * start date: Apr 18 22:04:39 2024 GMT * expire date: Apr 18 22:04:39 2025 GMT * issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/1.1 > Host: httpheader.net > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Fri, 19 Apr 2024 22:06:49 GMT < Server: Apache/2.4.38 (Debian) < Vary: Accept-Encoding < Content-Length: 996 < Content-Type: text/html; charset=UTF-8 < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Output (fail) |
Toggle* Trying 72.210.221.223:4145... * SOCKS4 communication to cooleasy.com:443 * SOCKS4 non-blocking resolve of cooleasy.com * SOCKS4 connect to IPv4 175.6.147.190 (locally resolved) * SOCKS4 request granted. * Connected to (nil) (72.210.221.223) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * SSL connection timeout * Closing connection 0 curl: (28) SSL connection timeout |
Last Error | SSL connection timeout |
Checks Total | 99 |
Checks Successful | 75 |
Checks Failed | 24 |
Checks Failed Consecutive | 0 |
Ø Uptime | 75.76% |
Last Successful Check | 2024-04-20 00:06:50 |
Last Failed Check | 2024-04-11 00:03:15 |
Last Response Time | 1.47s |
Ø Response Time | 3.93s |
Anonymity Level | elite |
Retries | 0 |
Headers (in) |
Server Apache/2.4.38 (Debian) |
Output (success) |
Toggle<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <link href='https://fonts.googleapis.com/css?family=Sonsie+One' rel='stylesheet' type='text/css'> <style> body { font-family: 'Sonsie One', cursive; color:white; background-color:#000; } </style> <title>httpHeader.net</title> </head> <body> <h1>httpHeader.net</h1> <pre> HTTPS = on HTTP_HOST = httpheader.net HTTP_USER_AGENT = Mozilla/5.0 HTTP_ACCEPT = */* REMOTE_ADDR = 72.210.221.223 REQUEST_SCHEME = https REMOTE_PORT = 37809 REQUEST_METHOD = GET REQUEST_URI = / REQUEST_TIME_FLOAT = 1713564410.5762 REQUEST_TIME = 1713564410<BR>SERVER = 20<BR> </pre> <a href="http://blogadmin.freshdesk.com/support/home">What is this website | <a href="http://blogadmin.freshdesk.com/support/home">Contact us</a> </body> </html> * Trying 72.210.221.223:4145... * SOCKS5 connect to IPv4 51.79.85.190:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (72.210.221.223) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [155 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [10 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [2902 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: OU=Domain Control Validated; OU=PositiveSSL; CN=httpheader.net * start date: Apr 18 22:04:39 2024 GMT * expire date: Apr 18 22:04:39 2025 GMT * issuer: C=US; ST=Texas; L=Dallas; O=None, LLC; OU=NA; CN=None; emailAddress=none * SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway. * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/1.1 > Host: httpheader.net > User-Agent: Mozilla/5.0 > Accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Mark bundle as not supporting multiuse < HTTP/1.1 200 OK < Date: Fri, 19 Apr 2024 22:06:50 GMT < Server: Apache/2.4.38 (Debian) < Vary: Accept-Encoding < Content-Length: 996 < Content-Type: text/html; charset=UTF-8 < * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection #0 to host (nil) left intact |
Output (fail) |
Toggle* Trying 72.210.221.223:4145... * SOCKS5 connect to IPv4 175.6.147.190:443 (locally resolved) * SOCKS5 request granted. * Connected to (nil) (72.210.221.223) port 4145 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * SSL connection timeout * Closing connection 0 curl: (28) SSL connection timeout |
Last Error | SSL connection timeout |