82 lines
3.5 KiB
Plaintext
82 lines
3.5 KiB
Plaintext
% Total % Received % Xferd Average Speed Time Time Time Current
|
|
Dload Upload Total Spent Left Speed
|
|
|
|
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 168.0.0.2:443...
|
|
* Connected to 168.0.0.2 (168.0.0.2) port 443
|
|
* ALPN: curl offers h2,http/1.1
|
|
} [5 bytes data]
|
|
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
|
|
} [512 bytes data]
|
|
* TLSv1.3 (IN), TLS handshake, Server hello (2):
|
|
{ [108 bytes data]
|
|
|
|
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* TLSv1.2 (IN), TLS handshake, Certificate (11):
|
|
{ [5659 bytes data]
|
|
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
|
|
{ [300 bytes data]
|
|
* TLSv1.2 (IN), TLS handshake, Request CERT (13):
|
|
{ [420 bytes data]
|
|
* TLSv1.2 (IN), TLS handshake, Server finished (14):
|
|
{ [4 bytes data]
|
|
* TLSv1.2 (OUT), TLS handshake, Certificate (11):
|
|
} [7 bytes data]
|
|
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
|
|
} [37 bytes data]
|
|
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
|
|
} [1 bytes data]
|
|
* TLSv1.2 (OUT), TLS handshake, Finished (20):
|
|
} [16 bytes data]
|
|
* TLSv1.2 (IN), TLS handshake, Finished (20):
|
|
{ [16 bytes data]
|
|
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / x25519 / RSASSA-PSS
|
|
* ALPN: server accepted http/1.1
|
|
* Server certificate:
|
|
* subject: CN=ixc.netguibor.com.br
|
|
* start date: Jul 25 00:00:00 2024 GMT
|
|
* expire date: Aug 1 23:59:59 2025 GMT
|
|
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
|
|
* SSL certificate verify result: self-signed certificate in certificate chain (19), continuing anyway.
|
|
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
|
|
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha384WithRSAEncryption
|
|
* Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha384WithRSAEncryption
|
|
* Certificate level 3: Public key type RSA (2048/112 Bits/secBits), signed using sha1WithRSAEncryption
|
|
* using HTTP/1.x
|
|
} [5 bytes data]
|
|
> HEAD / HTTP/1.1
|
|
> Host: 168.0.0.2
|
|
> User-Agent: curl/8.9.1
|
|
> Accept: */*
|
|
>
|
|
* Request completely sent off
|
|
{ [5 bytes data]
|
|
< HTTP/1.1 200 OK
|
|
< Server: nginx
|
|
< Date: Fri, 14 Feb 2025 19:20:39 GMT
|
|
< Content-Type: text/html; charset=ISO-8859-1
|
|
< Connection: keep-alive
|
|
< Set-Cookie: PHPSESSID=02hoee5o39m1ia78okburjgr56; path=/
|
|
< Set-Cookie: ixc_cli=d880aeebae5c4f346d379f3944ea2497; expires=Sat, 14-Feb-2026 19:20:39 GMT; Max-Age=31536000; path=/
|
|
< Expires: Fri, 14 Feb 2025 18:20:39 GMT
|
|
< Last-Modified: Fri, 14 Feb 2025 19:20:39 GMT
|
|
< Cache-Control: no-cache, must-revalidate
|
|
< Pragma: no-cache
|
|
< X-Content-Type-Options: nosniff
|
|
< X-Frame-Options: SAMEORIGIN
|
|
< X-XSS-Protection: 1; mode=block
|
|
<
|
|
|
|
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
|
|
* Connection #0 to host 168.0.0.2 left intact
|
|
HTTP/1.1 200 OK
|
|
Server: nginx
|
|
Date: Fri, 14 Feb 2025 19:20:39 GMT
|
|
Content-Type: text/html; charset=ISO-8859-1
|
|
Connection: keep-alive
|
|
Set-Cookie: PHPSESSID=02hoee5o39m1ia78okburjgr56; path=/
|
|
Set-Cookie: ixc_cli=d880aeebae5c4f346d379f3944ea2497; expires=Sat, 14-Feb-2026 19:20:39 GMT; Max-Age=31536000; path=/
|
|
Expires: Fri, 14 Feb 2025 18:20:39 GMT
|
|
Last-Modified: Fri, 14 Feb 2025 19:20:39 GMT
|
|
Cache-Control: no-cache, must-revalidate
|
|
Pragma: no-cache
|
|
X-Content-Type-Options: nosniff
|
|
X-Frame-Options: SAMEORIGIN
|
|
X-XSS-Protection: 1; mode=block
|
|
|