Выход с warp в рунет

Оказывается с этим проблемы.

Вчера заметил, что через раз запускаются сайты mail.ru, ozon.ru, vk.com, gosuslugi.ru, 4pda.to
Но всегда стабильно avito.ru, yandex.ru, 2ip.ru

Сегодня доступ вообще отсутствует даже нестабильный.
Еще обнаружил, что нет подключения к моему домашнему прову на внешний IP.

К забугру - проблем никаких.

Это известная тема ? режут warp еще и на выход в рунет на каких-то точках выхода или на магистралах ? куда маршрут ведет без этой резалки - работает, на остальное -нет ?

Если делать трейс через warp, то обрывается обычно где-то на забугорных сетях.
Иногда входящий пакет SYN доходит до домашнего провайдера, но дальше глухо.
При последующих попытках подключения все глухо.
udp не ходит

Да.

Я обнаруживал только проблемы с тем, что российские сайты боятся ip-адреса CF и выдают предупреждения. Из последнего маразма яндекс-учебник стал говорить, что с американского адреса не пустит. Американский адрес в Москве? Пришлось в awg выкидывать из allowedips его сидры по ip4/ip6
Ну а в самом WARP достаточно было добавить education.yandex.ru в разделение туннелей.

Тот же ВК у меня на ВАРПе выдает: у вас большие запросы и проверку на бота.

Ужас, конечно, как всего за год Рунет изменился: нужен метод обхода для западных сайтов, ведь наши заблокировали много иностранного, и одновременно с иностранных IP и DNS проблемы уже при открытии отечественных сайтов/сервисов. Замуровали демоны со всех сторон.

У меня не фирменная прога на компе, а wireguard с VPSки

если так, как пишут выше, это вполне может быть постоянно срабатывающий триггер “наказания плохого мальчика” за обращения к некоторым IP. но посколькую юзеров много, его все время дергают
но после “отдыха” он опять встает

я не заметил проблем с доступом к перечисленным ру- сайтам через warp

может где-то в системе/браузере заблокированы капчи?

Большинство РУ сайтов, в т.ч. яндекс считают все IP Cloudflare как американские, независимо от их гео. Поэтому много сайтов отказывается работать при заходе с IP WARP, даже если он будет с гео РФ

забавно, что с яндексом это случилось буквально две недели назад, до этого всех пускал и выпускал. Ну вот что они вдруг оскотинились? Давит на них кто? Или выслуживаются перед хозяином?

Политика сайтов абсолютно хаотичная: если ломануться прямо на mos.ru, то тебе расскажут, что адрес твой 104.x опасный, плохой, с вирусами внутри и прочую чушь. А большинство поддоменов открываются, не пикнув.

Проверил через usque:
Смог зайти на некоторые сайты, админки netcraze роутеров знакомых которые дома держат, на некоторые не смог.
В основном не смог зайти на те которые подключены через Ростелеком
Все провайдеры Московские, и Ростелеком Москва.
Попробовал ещё разные РУ сайты, все открылись спокойно

Нет? Как минимум уже год яндекс считает все айпи варпа как Вашингтон США, а тот же сайт победы или аэрофлота говорит, что доступ с вашего айпи ограничен. Это уже точно как минимум год, если не дольше

Нет, curl тоже не пашет или пашет с большим скрипом
И это не капчи никакие, все заканчивается на tcp handshake.

Может быть так:
tcp handshake
tls client hello
ack от сервера на размер hello
умерли

Потом

вообще ноль ответа

потом

все работает

потом

goto начало

MTU тут ни при чем, я его делал 1280 и ничего не менялось. кламп на MCC есть, MSS корректный - проверял.
И самое главное - забугорное все работает

У меня на рт Поволжье все ок с варп + сайты из списка

Через офф приложение Cloudflare WARP не открываются госуслуги. Остальное пока норм

А у варпа какой colo и loc?

Посмотрите здесь https://engage.cloudflareclient.com/cdn-cgi/trace

colo=AMS
loc=NL

кстати именно так блокируются сайты на DME варпе из этой темы
https://ntc.party/t/блокировки-на-российских-серверах-cloudflare-cdndnswarp/22551

последнее что там приходит это ack после клиент-хелло

colo=WAW
loc=PL

gosuslugi.ru

curl -v https://gosuslugi.ru --interface wg0

* Host gosuslugi.ru:443 was resolved.

* IPv6: (none)

* IPv4: 213.59.253.7, 213.59.254.7

* Trying 213.59.253.7:443…

* socket successfully bound to interface ‘wg0’

* ALPN: curl offers h2,http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* SSL Trust Anchors:

* CAfile: /opt/etc/ssl/certs/ca-certificates.crt

* CApath: /etc/ssl/certs

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):

* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):

* TLSv1.3 (IN), TLS handshake, Certificate (11):

* TLSv1.3 (IN), TLS handshake, CERT verify (15):

* TLSv1.3 (IN), TLS handshake, Finished (20):

* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.3 (OUT), TLS handshake, Finished (20):

* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS

* ALPN: server did not agree on a protocol. Uses default.

* Server certificate:

* subject: CN=*.gosuslugi.ru

* start date: Nov 11 11:42:01 2025 GMT

* expire date: Dec 12 14:20:04 2026 GMT

* issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign GCC R3 DV TLS CA 2020

* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* Certificate level 2: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* subjectAltName: “gosuslugi.ru” matches cert’s “gosuslugi.ru

* SSL certificate verified via OpenSSL.

* Established connection to gosuslugi.ru (213.59.253.7 port 443) from 172.16.0.2 port 58516

* using HTTP/1.x

> GET / HTTP/1.1

> Host: gosuslugi.ru

> User-Agent: curl/8.18.0

> Accept: */*

>

* Request completely sent off

< HTTP/1.1 200 OK

< Server: nginx

< Date: Sat, 07 Mar 2026 13:23:32 GMT

< Content-Type: text/html

< Content-Length: 9376

< Connection: keep-alive

< Keep-Alive: timeout=10

< Last-Modified: Tue, 11 Mar 2025 14:42:48 GMT

< ETag: “67d04be8-24a0”

< Expires: Sat, 07 Mar 2026 13:23:31 GMT

< Cache-Control: no-cache

< Accept-Ranges: bytes

< Strict-Transport-Security: max-age=16070400

<

Портал государственных услуг Российской Федерации

<link rel=“preload” href=“https://gu-st.ru/portal-st/lib-assets/fonts/Lato-Regular.woff2” as=“font”

type=“font/woff2” crossorigin=“”>

<link rel=“preload” href=“https://gu-st.ru/portal-st/lib-assets/fonts/Lato-Bold.woff2” as=“font” type=“font/woff2”

crossorigin=“”>

<meta name=“viewport”

content=“width=device-width, height=device-height, initial-scale=1, maximum-scale=1.0, user-scalable=no”>

@font-facefont-facefont-facefont-facefont-facefont-facefont-facefont-face{font-family:Lato;src:url(‘https://gu-st.ru/portal-st/lib-assets/fonts/Lato-Regular.woff2’) format(‘woff2’),url(‘https://gu-st.ru/portal-st/lib-assets/fonts/Lato-Regular.woff’) format(‘woff’);font-weight:400;font-style:normal;@font-faceont-disp@font-facefont-faceay:swap}@font-face{font-family:Lato-Bold;src:url(“https://gu-st.ru/portal-st/lib-assets/fonts/Lato-Bold.woff2”) format(“woff2”),url(“https://gu-st.ru/portal-st/lib-assets/fonts/Lato-Bold.woff”) format(“woff”);font-we@keyframeso@keyframesont-displayt-disp@keyframesayght:60@keyframes;font-style:normal;@keyframesont-display:swap}@keyframes pulse{from{transform:scale3d(.6,.6,.6);opacity:.4}to{transform:scale3d(1.1,1.1,1.1);opacity:0}}body{background:#fafcff;margin:0}main{margin-top:77px;display:flex;justify-content:center;padding:0 17px}.logo{display:flex;justify-content:center;margin-top:21px}.shadow-block{width:calc(100vw - 34px)}.content{padding:24px;display:flex;flex-direction:column;text-align:center;justify-content:center;background:#fff;box-shadow:0 1px 4px #e3ebfc,0 24px 48px rgba(230,235,245,.4);border-radius:12px}.title{margin:0;font-family:Lato-Bold,Arial,sans-serif;font-size:20px;line-height:28px;color:#0b1f33}.sub-title{margin-top:16px;font-family:Lato,Arial,sans-serif;font-size:16px;line-height:24px;color:#66727f}br{margin:0}.loader{margin-top:16px;display:flex;justify-content:center}.dot-flashing{width:16px;height:16px;background:#c5d3f1;position:relative;border-radius:50%;animation:dotFlashing 1s infinite alternate;animation-delay:.5s}.dot-flashing:after,.dot-flashing:before{content:‘’;width:16px;height:16px;position:absolute;border-radius:50%}.dot-flashing:after{background:#c5d3f1;right:-32px;animation:dotFlashing 1s infinite alternate;animation-delay:1.2s}.dot-flashing:before{background:#c5d3f1;left:-32px;animation:dot@keyframesla@keyframeshing 1s infinite@keyframesal@keyfram@media5sernate;a@media5imation-delay:0@media5}@keyframes dotFl@media@mediahing{0%,25%,50%{bac@mediaground:#e0e9fc}@media5%{background:#99b1@mediaize6}100%{background:#99b1e6}}@media a@mediaizel and (min-width:768px){.shadow-b@mediaock{width:640px}.title{font-@mediaize:24px;lin@media-height:32px}.su@media-title{font-size:18px;line-height:24px}}@media all and (min-width:1140px){.shadow-block{width:597px}}

<path

d=“M71.7494 16.384H68.3074C68.1923 16.384 68.1086 16.2723 68.14 16.1606C68.7154 14.202 69.3152 11.985 69.7302 9.52718C70.1557 6.98553 70.3789 4.64289 70.473 2.55161C70.4765 2.45735 70.5532 2.38403 70.6474 2.38403H80.8765C80.9729 2.38403 81.051 2.46219 81.051 2.5586V16.2095C81.051 16.3059 80.9729 16.384 80.8765 16.384H77.5249C77.4284 16.384 77.3503 16.3059 77.3503 16.2095V5.66583H73.9858C73.8621 7.22183 73.6536 8.89377 73.3117 10.6583C72.9142 12.7252 72.4434 14.6 71.9133 16.2653C71.8924 16.3352 71.8226 16.384 71.7494 16.384Z”

fill=“#EE2F53” />

<path

d=“M0 2.5586C0 2.46219 0.0781548 2.38403 0.174564 2.38403H10.0567C10.1801 2.38403 10.2636 2.51116 10.2157 2.62608L8.9919 5.55922C8.95958 5.63669 8.88566 5.67194 8.81548 5.66496C8.80973 5.66554 8.8039 5.66583 8.798 5.66583H3.70075V16.2095C3.70075 16.3059 3.62259 16.384 3.52618 16.384H0.174564C0.0781548 16.384 0 16.3059 0 16.2095V2.5586Z”

fill=“#0066B3” />

<path

d=“M99.3222 2.5586C99.3222 2.46219 99.4004 2.38403 99.4968 2.38403H109.379C109.502 2.38403 109.586 2.51116 109.538 2.62608L108.314 5.55922C108.282 5.63669 108.208 5.67194 108.138 5.66496C108.132 5.66554 108.126 5.66583 108.12 5.66583H103.023V16.2095C103.023 16.3059 102.945 16.384 102.848 16.384H99.4968C99.4004 16.384 99.3222 16.3059 99.3222 16.2095V2.5586Z”

fill=“#EE2F53” />

<path

d=“M39.9967 2.38403C39.8756 2.38403 39.7914 2.5032 39.833 2.61571L44.9253 16.3863C44.2067 17.8971 43.4084 19.4873 42.4953 21.2599C42.4355 21.3759 42.5188 21.5162 42.6496 21.5162H46.2722C46.338 21.5162 46.3987 21.4785 46.4284 21.4199C49.109 15.9651 51.0816 11.1297 53.7785 2.61471C53.8153 2.50214 53.732 2.38403 53.6134 2.38403H50.2486C50.1705 2.38403 50.1015 2.4372 50.0802 2.51213C49.0418 6.15238 48.0845 9.0017 46.9748 11.7477L43.5539 2.49722C43.5288 2.42924 43.4634 2.38403 43.3903 2.38403H39.9967Z”

fill=“#EE2F53” />

<path

d=“M83.3189 2.38403C83.1978 2.38403 83.1136 2.5032 83.1552 2.61571L88.2475 16.3863C87.529 17.8971 86.7306 19.4873 85.8175 21.2599C85.7577 21.3759 85.841 21.5162 85.9718 21.5162H89.5944C89.6602 21.5162 89.7209 21.4785 89.7506 21.4199C92.4312 15.9651 94.4038 11.1297 97.1008 2.61471C97.1375 2.50214 97.0542 2.38403 96.9356 2.38403H93.5708C93.4927 2.38403 93.4237 2.4372 93.4024 2.51213C92.364 6.15238 91.4067 9.0017 90.297 11.7477L86.8761 2.49722C86.851 2.42924 86.7856 2.38403 86.7125 2.38403H83.3189Z”

fill=“#EE2F53” />

<path

d=“M65.5505 13.0804C65.5332 13.0355 65.4986 12.9976 65.4535 12.9769C65.4085 12.9562 65.3565 12.9562 65.3115 12.97C64.5078 13.2667 63.0008 13.5081 61.9511 13.5081C59.6542 13.5081 58.5594 12.8906 58.5594 9.38232C58.5594 6.57773 58.8955 5.2565 61.9511 5.2565C62.8172 5.2565 63.6209 5.38069 64.6429 5.67736C64.726 5.70151 64.8161 5.66356 64.8542 5.58767C65.2353 4.87359 65.696 4.00082 66.2157 2.93141C66.24 2.88312 66.24 2.82792 66.2192 2.77963C66.1984 2.73133 66.1568 2.69339 66.1048 2.67614C64.7607 2.24838 63.1567 2 61.712 2C56.9 2 54.7556 4.25954 54.7556 9.33058C54.7556 14.4741 56.9 16.7681 61.712 16.7681C62.9176 16.7681 65.2942 16.5163 66.4409 16.0609C66.531 16.023 66.5795 15.9195 66.5448 15.8298L65.5505 13.0804Z”

fill=“#EE2F53” />

<path

d=“M37.395 13.0804C37.3776 13.0355 37.343 12.9976 37.298 12.9769C37.2529 12.9562 37.201 12.9562 37.1559 12.97C36.3522 13.2667 34.8452 13.5081 33.7955 13.5081C31.4986 13.5081 30.4039 12.8906 30.4039 9.38232C30.4039 6.57773 30.7399 5.2565 33.7955 5.2565C34.6616 5.2565 35.4653 5.38069 36.4873 5.67736C36.5704 5.70151 36.6605 5.66356 36.6986 5.58767C37.0797 4.87359 37.5405 4.00082 38.0601 2.93141C38.0844 2.88312 38.0844 2.82792 38.0636 2.77963C38.0428 2.73133 38.0012 2.69339 37.9493 2.67614C36.6051 2.24838 35.0011 2 33.5564 2C28.7444 2 26.6 4.25954 26.6 9.33058C26.6 14.4741 28.7444 16.7681 33.5564 16.7681C34.762 16.7681 37.1386 16.5163 38.2853 16.0609C38.3754 16.023 38.4239 15.9195 38.3892 15.8298L37.395 13.0804Z”

fill=“#0066B3” />

<path

d=“M17.5806 2C12.8762 2 11.0444 4.0549 11.0444 9.32997C11.0444 14.6853 12.8762 16.7681 17.5806 16.7681C22.3227 16.7681 24.1716 14.6853 24.1716 9.32997C24.1716 4.0549 22.3227 2 17.5806 2ZM17.5806 13.6945C15.4373 13.6945 14.7696 13.1014 14.7696 9.3823C14.7696 5.42251 15.4989 5.07014 17.5806 5.07014C19.7034 5.07014 20.4464 5.42251 20.4464 9.3823C20.4464 13.1014 19.7651 13.6945 17.5806 13.6945Z”

fill=“#0066B3” />

<path

d=“M123.41 2.38403H120.061C119.963 2.38403 119.886 2.46067 119.886 2.55822V13.1068C119.16 13.3088 118.435 13.4063 117.618 13.4063C115.587 13.4063 114.998 12.835 114.921 10.4522V2.55822C114.921 2.46067 114.844 2.38403 114.746 2.38403H111.397C111.299 2.38403 111.222 2.46067 111.222 2.55822V2.57912C111.222 2.57912 111.222 10.5184 111.226 10.5288C111.306 15.0123 112.932 16.7681 116.948 16.7681C119.293 16.7681 121.91 16.1724 123.463 15.5802C123.536 15.5558 123.581 15.4861 123.581 15.4095V2.57912V2.55822C123.585 2.46067 123.508 2.38403 123.41 2.38403Z”

fill=“#EE2F53” />

Госуслуги сейчас откроются

Портал работает в прежнем режиме.

Подождите пару секунд

\* Connection #0 to host gosuslugi.ru:443 left intact
ozon.ru

curl -v https://ozon.ru --interface wg0

* Host ozon.ru:443 was resolved.

* IPv6: (none)

* IPv4: 185.73.193.68, 185.73.194.82

* Trying 185.73.193.68:443…

* socket successfully bound to interface ‘wg0’

* ALPN: curl offers h2,http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* SSL Trust Anchors:

* CAfile: /opt/etc/ssl/certs/ca-certificates.crt

* CApath: /etc/ssl/certs

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):

* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):

* TLSv1.3 (IN), TLS handshake, Certificate (11):

* TLSv1.3 (IN), TLS handshake, CERT verify (15):

* TLSv1.3 (IN), TLS handshake, Finished (20):

* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.3 (OUT), TLS handshake, Finished (20):

* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519MLKEM768 / RSASSA-PSS

* ALPN: server accepted h2

* Server certificate:

* subject: C=RU; ST=Moscow; L=Moscow; O=INTERNET SOLUTIONS LLC; CN=*.ozon.ru

* start date: Oct 3 14:46:02 2025 GMT

* expire date: Nov 4 14:46:01 2026 GMT

* issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign RSA OV SSL CA 2018

* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* Certificate level 2: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* subjectAltName: “ozon.ru” matches cert’s “ozon.ru

* SSL certificate verified via OpenSSL.

* Established connection to ozon.ru (185.73.193.68 port 443) from 172.16.0.2 port 50904

* using HTTP/2

* [HTTP/2] [1] OPENED stream for https://ozon.ru/

* [HTTP/2] [1] [:method: GET]

* [HTTP/2] [1] [:scheme: https]

* [HTTP/2] [1] [:authority: ozon.ru]

* [HTTP/2] [1] [:path: /]

* [HTTP/2] [1] [user-agent: curl/8.18.0]

* [HTTP/2] [1] [accept: */*]

> GET / HTTP/2

> Host: ozon.ru

> User-Agent: curl/8.18.0

> Accept: */*

>

* Request completely sent off

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):

< HTTP/2 307

< server: nginx

< date: Sat, 07 Mar 2026 13:24:59 GMT

< content-type: text/html

< content-length: 164

< location: https://ozon.ru/?\__rr=1

< set-cookie: __Secure-ETC=8d5a6bf9c7e3a31d0196dfd87a07a80f; expires=Sun, 07-Mar-27 13:24:59 GMT; path=/; SameSite=None; domain=.ozon.ru; HttpOnly; Secure

< expires: Thu, 01 Jan 1970 00:00:01 GMT

< cache-control: no-cache

< strict-transport-security: max-age=31536000; includeSubDomains;

< alt-svc: h3=“:443”; ma=86400

<

307 Temporary Redirect

307 Temporary Redirect


nginx

* Connection #0 to host ozon.ru:443 left intact

mail.ru

curl -v https://mail.ru --interface wg0

* Host mail.ru:443 was resolved.

* IPv6: (none)

* IPv4: 90.156.232.4, 89.221.239.1, 185.180.201.1

* Trying 90.156.232.4:443…

* socket successfully bound to interface ‘wg0’

* ALPN: curl offers h2,http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* SSL Trust Anchors:

* CAfile: /opt/etc/ssl/certs/ca-certificates.crt

* CApath: /etc/ssl/certs

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.2 (IN), TLS handshake, Certificate (11):

* TLSv1.2 (IN), TLS handshake, Server key exchange (12):

* TLSv1.2 (IN), TLS handshake, Server finished (14):

* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):

* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.2 (OUT), TLS handshake, Finished (20):

* TLSv1.2 (IN), TLS handshake, Finished (20):

* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 / x25519 / RSASSA-PSS

* ALPN: server accepted h2

* Server certificate:

* subject: C=RU; ST=Moscow; L=Moscow; O=VK LLC; CN=*.mail.ru

* start date: Oct 21 12:52:03 2025 GMT

* expire date: Nov 22 12:52:02 2026 GMT

* issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign RSA OV SSL CA 2018

* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* Certificate level 2: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption

* subjectAltName: “mail.ru” matches cert’s “mail.ru

* SSL certificate verified via OpenSSL.

* Established connection to mail.ru (90.156.232.4 port 443) from 172.16.0.2 port 60506

* using HTTP/2

* [HTTP/2] [1] OPENED stream for https://mail.ru/

* [HTTP/2] [1] [:method: GET]

* [HTTP/2] [1] [:scheme: https]

* [HTTP/2] [1] [:authority: mail.ru]

* [HTTP/2] [1] [:path: /]

* [HTTP/2] [1] [user-agent: curl/8.18.0]

* [HTTP/2] [1] [accept: */*]

> GET / HTTP/2

> Host: mail.ru

> User-Agent: curl/8.18.0

> Accept: */*

>

* Request completely sent off

< HTTP/2 302

< server: nginx/1.26.2

< date: Sat, 07 Mar 2026 13:25:42 GMT

< content-type: text/html

< set-cookie: act=50fe3b7c10de4d80aca925c3df802d9e; path=/; domain=.mail.ru; Secure; HttpOnly; SameSite=None

< set-cookie: oid=tQDSZ6hW6zscsPCprgc5; Path=/; Domain=mail.ru; Max-Age=315360000

< set-cookie: act=787a714c4000457b8bedf64926877fcb; path=/; domain=.mail.ru; Secure; HttpOnly; SameSite=None

< set-cookie: autologin=no; expires=Sun, 08 Mar 2026 01:25:42 GMT; path=/; domain=.mail.ru; Secure; HttpOnly; SameSite=None

< location: https://login.vk.ru/?act=autologin&app_id=7539952&redirect_uri=https%3A%2F%2Faccount.mail.ru%2Flogin%3Fautologin_exp%3Dv22%26autologin_project%3Dhome%26page%3Dhttps%253A%252F%252Fmail.ru%252F%253Fautologin%253D1772889942&state=787a714c4000457b8bedf64926877fcb&uuid=7508eec0-6a96-4de4-ab85-f305c13ae9f6&service_group=oid_tQDSZ6hW6zscsPCprgc5

< set-cookie: mrcu=2C5469AC27567DB58DF6B9E11C68; expires=Tue, 04 Mar 2036 13:25:42 GMT; path=/; domain=.mail.ru; Secure; HttpOnly; SameSite=None

< x-mru-request-id: 03bbf92f-1077-4957-b81c-37e8a49be59f:f911a483

< cache-control: no-cache,no-store,must-revalidate

< pragma: no-cache

< expires: Fri, 07 Mar 2025 13:25:42 GMT

< x-frame-options: SAMEORIGIN

< x-envoy-upstream-service-time: 7

< x-xss-protection: 1; mode=block; report=https://cspreport.mail.ru/xxssprotection

< x-content-type-options: nosniff

< x-host: 30.lf.home-release.kc.mrucl.ru

< x-etime: 0.007

< content-security-policy: base-uri ‘self’; connect-src https://*.adlooxtracking.com https://*.adlooxtracking.ru https://*.adsafeprotected.com https://*.cold-video.dzeninfra.ru https://*.doubleverify.com https://*.dzen.ru https://*.extcdn.dzeninfra.ru https://*.gstatic.com https://*.hot-video.dzeninfra.ru https://*.imgsmail.ru https://*.mail.ru https://*.moatads.com https://*.mradx.net https://*.mycdn.me https://*.odkl.ru https://*.ok.ru https://*.okcdn.ru https://api.rustore.ru https://*.serving-sys.com https://*.serving-sys.ru https://*.vk.com https://*.vk.ru https://*.vkuser.net https://*.vkuserphoto.ru https://*.weborama-tech.ru https://*.weborama.fr https://an.yandex.ru https://avatars.dzeninfra.ru https://b.delivery.consentmanager.net https://cdn.consentmanager.mgr.consensu.org https://cdn.consentmanager.net https://cdn.dzen.ru https://cold-video.dzeninfra.ru https://consentmanager.mgr.consensu.org https://home.cdn-vk.ru https://dzen.ru https://home.mrgcdn.ru https://jstracer.yandex.ru https://log.strm.yandex.ru https://mail.ru https://mc.yandex.by https://mc.yandex.com https://mc.yandex.fr https://mc.yandex.kz https://mc.yandex.md https://mc.yandex.ru https://mc.yandex.uz https://ok.ru https://playlog.dzen.ru https://sdk-api.apptracer.ru https://s3.dzeninfra.ru https://static.dzeninfra.ru https://strm.yandex.ru https://telemetry.dzen.ru https://verify.yandex.ru https://video.dzen.ru https://vk.com https://vk.ru https://yandex.ru https://www.google-analytics.com https://yandex.st https://yastat.net https://yastatic.net https://*.strm.yandex.net https://ymetrica1.com https://csp.yandex.net https://zen-int.dzeninfra.ru; default-src ‘none’; font-src blob: data: https://*.imgsmail.ru https://*.mail.ru https://*.mradx.net https://an.yandex.ru https://static.dzeninfra.ru https://yastat.net https://yastatic.net ‘self’; form-action https://account.mail.ru https://auth.mail.ru https://e.mail.ru https://yandex.ru https://widgets.mail.ru ‘self’; frame-src https://*.doubleverify.com https://*.imgsmail.ru https://*.mail.ru https://*.mradx.net https://*.ok.ru https://*.vk.com https://*.vk.ru https://*.yandex.ru https://app.appsflyer.com https://awaps.yandex.net https://mail.ru https://mc.yandex.by https://mc.yandex.com https://mc.yandex.fr https://mc.yandex.kz https://mc.yandex.md https://mc.yandex.ru https://mc.yandex.uz https://mini.vkplay.ru https://ok.ru https://vk.com https://vk.ru https://vkvideo.ru https://yandex.ru https://yastat.net https://yastatic.net https://widgets.mail.ru https://forms.cdn-vk.ru; img-src blob: data: https://*.mail.ru https://*.okcdn.ru https://*.radar.imgsmail.ru https://*.targetads.io https://*.vkuserphoto.ru https://static.rustore.ru https://*.userapi.com https://*.zen.zeta.dzen.ru https://presizer.imgsmail.ru https://promoimages.datacloudmail.ru https://promoimages.hb.ru-msk.vkcloud-storage.ru https://i.mycdn.me https://a.delivery.consentmanager.net https://ad.adriver.ru https://amc.yandex.ru https://an.yandex.ru https://avatars.dzeninfra.ru https://avatars.mds.yandex.net https://bs.serving-sys.com https://bs.serving-sys.ru https://bs.yandex.ru https://cdn.consentmanager.mgr.consensu.org https://cdn.consentmanager.net https://cdn.dzen.ru https://counter.yadro.ru https://d.mradx.net https://dzen.ru https://favicon.yandex.net https://fmdata.imgsmail.ru https://home.cdn-vk.ru https://home.imgsmail.ru https://img.imgsmail.ru https://imgs2.imgsmail.ru https://impression.appsflyer.com https://likemore-go.imgsmail.ru https://limg.imgsmail.ru https://mc.yandex.by https://mc.yandex.com https://mc.yandex.fr https://mc.yandex.kz https://mc.yandex.md https://mc.yandex.ru https://mc.yandex.uz https://mgcomru.solution.weborama.fr https://pixel.adlooxtracking.ru https://playlog.dzen.ru https://pogoda.imgsmail.ru https://promoimages.hb.bizmrg.com https://pulse.imgsmail.ru https://r.mradx.net https://s3.dzeninfra.ru https://static.dzeninfra.ru https://storage.mds.yandex.net https://verify.yandex.ru https://video.dzen.ru https://vkvideo.ru https://prod-backend.hb.bizmrg.com https://vk.com https://vk.ru https://vkplay.ru https://wcm-ru.frontend.weborama.fr https://wcm.weborama-tech.ru https://www.tns-counter.ru https://www.google-analytics.com https://www.googletagmanager.com https://yandex.ru https://yastatic.net ‘self’; manifest-src https://limg.imgsmail.ru; media-src blob: data: https://*.cold-video.dzeninfra.ru https://*.extcdn.dzeninfra.ru https://*.hot-video.dzeninfra.ru https://*.imgsmail.ru https://*.mail.ru https://*.mradx.net https://*.ok.ru https://*.strm.yandex.ru https://*.vk.com https://*.vk.ru https://*.yandex.net https://cdn.dzen.ru https://cold-video.dzeninfra.ru https://home.cdn-vk.ru https://mail.ru https://ok.ru https://strm.yandex.ru https://video.dzen.ru https://vk.com https://vk.ru https://yandex.ru https://yandex.st https://yastat.net https://yastatic.net https://*.strm.yandex.net https://*.mycdn.me https://*.okcdn.ru https://*.vkuser.net https://*.targetads.io; script-src ‘self’ https://*.adlooxtracking.com https://*.adlooxtracking.ru https://*.adsafeprotected.com https://*.doubleverify.com https://*.imgsmail.ru https://*.mail.ru https://*.moatads.com https://*.mradx.net https://*.serving-sys.com https://*.serving-sys.ru https://*.vk.com https://*.vk.ru https://*.weborama-tech.ru https://*.weborama.fr https://an.yandex.ru https://b.delivery.consentmanager.net https://cdn.consentmanager.mgr.consensu.org https://cdn.consentmanager.net https://consentmanager.mgr.consensu.org https://home.cdn-vk.ru https://home.mrgcdn.ru https://iframe.s3.yandex.net https://mail.ru https://mc.yandex.by https://mc.yandex.com https://mc.yandex.fr https://mc.yandex.kz https://mc.yandex.md https://mc.yandex.ru https://mc.yandex.uz https://ok.ru https://st.mycdn.me https://st.okcdn.ru https://static.dzeninfra.ru https://vk.com https://vk.ru https://www.google-analytics.com https://ssl.google-analytics.com https://yandex.ru https://yandex.st https://yastat.net https://yastatic.net ‘unsafe-eval’ ‘unsafe-inline’ ‘nonce-0c35a2992bf1720c96fb50a0c5203d80’ ‘strict-dynamic’ ‘report-sample’; style-src ‘self’ blob: https://*.imgsmail.ru https://*.mail.ru https://*.mradx.net https://b.delivery.consentmanager.net https://cdn.consentmanager.mgr.consensu.org https://cdn.consentmanager.net https://consentmanager.mgr.consensu.org https://home.cdn-vk.ru https://home.mrgcdn.ru https://static.dzeninfra.ru https://yandex.st https://yastat.net https://yastatic.net ‘unsafe-eval’ ‘unsafe-inline’; report-uri https://cspreport.mail.ru/home?disposition=report&rev=22.01.26;

<

* Connection #0 to host mail.ru:443 left intact

vk.com

curl -v https://vk.com --interface wg0

* Host vk.com:443 was resolved.

* IPv6: (none)

* IPv4: 87.240.129.133, 93.186.225.194, 87.240.132.67, 87.240.132.78, 87.240.137.164, 87.240.132.72

* Trying 87.240.129.133:443…

* socket successfully bound to interface ‘wg0’

* ALPN: curl offers h2,http/1.1

* TLSv1.3 (OUT), TLS handshake, Client hello (1):

* SSL Trust Anchors:

* CAfile: /opt/etc/ssl/certs/ca-certificates.crt

* CApath: /etc/ssl/certs

* TLSv1.3 (IN), TLS handshake, Server hello (2):

* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):

* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):

* TLSv1.3 (IN), TLS handshake, Certificate (11):

* TLSv1.3 (IN), TLS handshake, CERT verify (15):

* TLSv1.3 (IN), TLS handshake, Finished (20):

* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):

* TLSv1.3 (OUT), TLS handshake, Finished (20):

* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / id-ecPublicKey

* ALPN: server accepted h2

* Server certificate:

* subject: C=RU; ST=Moscow; L=Moscow; O=VK LLC; CN=*.vk.com

* start date: Jan 30 16:54:41 2026 GMT

* expire date: Mar 3 16:54:40 2027 GMT

* issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign ECC OV SSL CA 2018

* Certificate level 0: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using ecdsa-with-SHA384

* Certificate level 1: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using ecdsa-with-SHA384

* Certificate level 2: Public key type EC/secp384r1 (384/192 Bits/secBits), signed using ecdsa-with-SHA384

* subjectAltName: “vk.com” matches cert’s “vk.com

* SSL certificate verified via OpenSSL.

* Established connection to vk.com (87.240.129.133 port 443) from 172.16.0.2 port 52898

* using HTTP/2

* [HTTP/2] [1] OPENED stream for https://vk.com/

* [HTTP/2] [1] [:method: GET]

* [HTTP/2] [1] [:scheme: https]

* [HTTP/2] [1] [:authority: vk.com]

* [HTTP/2] [1] [:path: /]

* [HTTP/2] [1] [user-agent: curl/8.18.0]

* [HTTP/2] [1] [accept: */*]

> GET / HTTP/2

> Host: vk.com

> User-Agent: curl/8.18.0

> Accept: */*

>

* Request completely sent off

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):

< HTTP/2 302

< server: kittenx

< date: Sat, 07 Mar 2026 13:27:08 GMT

< content-type: text/html

< content-length: 140

< location: /challenge.html?tid=ikhTdurFIME26mMTrQ8XYWUH13hLRQ&hash429=HOD2Tk-EGADnB1an8FtBAhPr8vuT8vjhNyDMQ3FoYDPSU4HpP29BPsfKSrK-Dh42nFbSc17eIhlgk2hV2n47MzioSKLMHTcwnQVb7uQtbdW6MeTDB45CUdxlSP6TvMZixmwIB89k5RdIoUyG&redirect=/&sign=kSYcygsKt6oL3lOnu5RNXQ&lang_id=

< expires: Sat, 07 Mar 2026 13:27:07 GMT

< cache-control: no-cache

< set-cookie: hitw429=1; Path=/; HttpOnly; Secure; SameSite=None; Max-Age=300

< set-cookie: solution429=deleted; Path=/; HttpOnly; Secure; SameSite=None; expires=Thu, 01 Jan 1970 00:00:01 GMT

< set-cookie: solution429=deleted; Path=/; HttpOnly; Secure; SameSite=None; expires=Thu, 01 Jan 1970 00:00:01 GMT; Domain=vk.com;

< set-cookie: s429=deleted; Path=/; HttpOnly; Secure; SameSite=None; expires=Thu, 01 Jan 1970 00:00:01 GMT

< set-cookie: s429=deleted; Path=/; HttpOnly; Secure; SameSite=None; expires=Thu, 01 Jan 1970 00:00:01 GMT; Domain=vk.com;

< x-challenge: required

< x-challenge-url: /challenge.html?tid=ikhTdurFIME26mMTrQ8XYWUH13hLRQ

< timing-allow-origin: *

< access-control-allow-credentials: true

< access-control-max-age: 0

< access-control-expose-headers: X-Challenge, X-Challenge-Url, X-Trace-Id, X-WAF-Redirect

< x-waf-redirect: 1

< cache-control: no-store,must-revalidate

< pragma: no-cache

< x-frontend: front656700

< x-trace-id: ikhTdurFIME26mMTrQ8XYWUH13hLRQ

< x-trace-id-v2: 019cc87af9187d5db61a3924b6747b32

< server-timing: challenge;desc=“/challenge.html?tid=ikhTdurFIME26mMTrQ8XYWUH13hLRQ”,tid;desc=“ikhTdurFIME26mMTrQ8XYWUH13hLRQ”,front;dur=0.219

<

302 Found

302 Found


kittenx

* Connection #0 to host vk.com:443 left intact

Тесты в браузере:
ya.ru в инкогнито - открылось, показывает локацию Вашингтон
mail.ru в инкогнито - открылось, показывает локацию Варшава
gosulsugi.ru в инкогнито - открылись все ОК
vk.com в инкогнито - открылось все ок

ozon.ru

16:32:48.780481 IP 172.16.0.2.43090 > 185.73.194.82.443: Flags [SEW], seq 389678638, win 42340, options [mss 1380,sackOK,TS val 3108669683 ecr 0,nop,wscale 4], length 0
16:32:48.781381 IP 185.73.194.82.443 > 172.16.0.2.43090: Flags [S.E], seq 2032686123, ack 389678639, win 65535, options [mss 1460,sackOK,TS val 2093611497 ecr 3108669683,nop,wscale 13], length 0
16:32:48.816923 IP 172.16.0.2.43090 > 185.73.194.82.443: Flags [.], ack 1, win 2647, options [nop,nop,TS val 3108669719 ecr 2093611497], length 0
16:32:48.872636 IP 172.16.0.2.43090 > 185.73.194.82.443: Flags [P.], seq 1:518, ack 1, win 2647, options [nop,nop,TS val 3108669775 ecr 2093611497], length 517
16:32:48.873563 IP 185.73.194.82.443 > 172.16.0.2.43090: Flags [.], ack 518, win 16, options [nop,nop,TS val 2093611589 ecr 3108669775], length 0
16:32:50.399411 IP 172.16.0.2.43090 > 185.73.194.82.443: Flags [F.], seq 518, ack 1, win 2647, options [nop,nop,TS val 3108671302 ecr 2093611589], length 0
16:32:50.441315 IP 185.73.194.82.443 > 172.16.0.2.43090: Flags [.], ack 519, win 16, options [nop,nop,TS val 2093613157 ecr 3108671302], length 0
^C

mail.ru


16:33:25.011834 IP 172.16.0.2.52562 > 89.221.239.1.443: Flags [SEW], seq 2263955731, win 42340, options [mss 1380,sackOK,TS val 4183900639 ecr 0,nop,wscale 4], length 0
16:33:25.012846 IP 89.221.239.1.443 > 172.16.0.2.52562: Flags [S.E], seq 642343066, ack 2263955732, win 65535, options [mss 1460,sackOK,TS val 2093647728 ecr 4183900639,nop,wscale 13], length 0
16:33:25.048495 IP 172.16.0.2.52562 > 89.221.239.1.443: Flags [.], ack 1, win 2647, options [nop,nop,TS val 4183900676 ecr 2093647728], length 0
16:33:25.106511 IP 172.16.0.2.52562 > 89.221.239.1.443: Flags [P.], seq 1:518, ack 1, win 2647, options [nop,nop,TS val 4183900734 ecr 2093647728], length 517
16:33:25.107445 IP 89.221.239.1.443 > 172.16.0.2.52562: Flags [.], ack 518, win 16, options [nop,nop,TS val 2093647823 ecr 4183900734], length 0
^C
16:34:16.629777 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [SEW], seq 3030619275, win 42340, options [mss 1380,sackOK,TS val 2006240815 ecr 0,nop,wscale 4], length 0
16:34:16.630788 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [S.E], seq 952533607, ack 3030619276, win 65535, options [mss 1460,sackOK,TS val 2093699346 ecr 2006240815,nop,wscale 13], length 0
16:34:16.666398 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 1, win 2647, options [nop,nop,TS val 2006240852 ecr 2093699346], length 0
16:34:16.721782 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [P.], seq 1:518, ack 1, win 2647, options [nop,nop,TS val 2006240907 ecr 2093699346], length 517
16:34:16.722654 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [.], ack 518, win 16, options [nop,nop,TS val 2093699438 ecr 2006240907], length 0
16:34:16.774545 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [.], seq 1:1369, ack 518, win 16, options [nop,nop,TS val 2093699490 ecr 2006240907], length 1368
16:34:16.774578 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [P.], seq 1369:2417, ack 518, win 16, options [nop,nop,TS val 2093699490 ecr 2006240907], length 1048
16:34:16.774584 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [.], seq 2417:3785, ack 518, win 16, options [nop,nop,TS val 2093699490 ecr 2006240907], length 1368
16:34:16.810122 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 1369, win 2641, options [nop,nop,TS val 2006240996 ecr 2093699490], length 0
16:34:16.810163 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 2417, win 2609, options [nop,nop,TS val 2006240996 ecr 2093699490], length 0
16:34:16.810286 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 3785, win 2551, options [nop,nop,TS val 2006240996 ecr 2093699490], length 0
16:34:16.811218 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [P.], seq 3785:4012, ack 518, win 16, options [nop,nop,TS val 2093699526 ecr 2006240996], length 227
16:34:16.846792 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 4012, win 2537, options [nop,nop,TS val 2006241032 ecr 2093699526], length 0
16:34:17.256080 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [P.], seq 518:598, ack 4012, win 2641, options [nop,nop,TS val 2006241442 ecr 2093699526], length 80
16:34:17.257105 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [.], ack 598, win 16, options [nop,nop,TS val 2093699972 ecr 2006241442], length 0
16:34:17.271799 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [P.], seq 598:717, ack 4012, win 2641, options [nop,nop,TS val 2006241457 ecr 2093699526], length 119
16:34:17.272741 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [.], ack 717, win 16, options [nop,nop,TS val 2093699988 ecr 2006241457], length 0
16:34:17.309074 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [P.], seq 4012:4555, ack 717, win 16, options [nop,nop,TS val 2093700024 ecr 2006241457], length 543
16:34:17.344434 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 4555, win 2641, options [nop,nop,TS val 2006241530 ecr 2093700024], length 0
16:34:17.349975 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [P.], seq 717:748, ack 4555, win 2641, options [nop,nop,TS val 2006241536 ecr 2093700024], length 31
16:34:17.359501 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [P.], seq 4555:4599, ack 748, win 16, options [nop,nop,TS val 2093700075 ecr 2006241536], length 44
16:34:17.361683 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [.], seq 4599:5967, ack 748, win 16, options [nop,nop,TS val 2093700077 ecr 2006241536], length 1368
16:34:17.397304 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 5967, win 2641, options [nop,nop,TS val 2006241583 ecr 2093700075], length 0
16:34:17.398195 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [P.], seq 5967:6659, ack 748, win 16, options [nop,nop,TS val 2093700113 ecr 2006241583], length 692
16:34:17.446424 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [P.], seq 748:796, ack 6659, win 2641, options [nop,nop,TS val 2006241632 ecr 2093700113], length 48
16:34:17.446567 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [P.], seq 796:820, ack 6659, win 2641, options [nop,nop,TS val 2006241632 ecr 2093700113], length 24
16:34:17.447437 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [.], ack 820, win 16, options [nop,nop,TS val 2093700163 ecr 2006241632], length 0
16:34:17.477783 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [F.], seq 820, ack 6659, win 2641, options [nop,nop,TS val 2006241663 ecr 2093700113], length 0
16:34:17.480039 IP 5.255.255.242.443 > 172.16.0.2.51240: Flags [F.], seq 6659, ack 821, win 16, options [nop,nop,TS val 2093700195 ecr 2006241663], length 0
16:34:17.515537 IP 172.16.0.2.51240 > 5.255.255.242.443: Flags [.], ack 6660, win 2641, options [nop,nop,TS val 2006241701 ecr 2093700195], length 0

517 - стандартный размер client hello от curl/openssl/tls1.3 без кибер
518 - sequence 517+1

с warpом и из-за границы проблемки подключаться в Россию иногда

sudo tcpdump -ni any host 82.146.51.244 and port 443

Password:

tcpdump: data link type PKTAP

tcpdump: verbose output suppressed, use -v[v]... for full protocol decode

listening on any, link-type PKTAP (Apple DLT_PKTAP), snapshot length 524288 bytes

19:14:19.963928 IP 172.16.0.2.64044 > 82.146.51.244.443: Flags [SEW], seq 2789961816, win 65535, options [mss 1240,nop,wscale 6,nop,nop,TS val 4172420133 ecr 0,sackOK,eol], length 0

19:14:20.963592 IP 172.16.0.2.64044 > 82.146.51.244.443: Flags [S], seq 2789961816, win 65535, options [mss 1240,nop,wscale 6,nop,nop,TS val 4172421133 ecr 0,sackOK,eol], length 0

19:14:21.964306 IP 172.16.0.2.64044 > 82.146.51.244.443: Flags [S], seq 2789961816, win 65535, options [mss 1240,nop,wscale 6,nop,nop,TS val 4172422134 ecr 0,sackOK,eol], length 0

19:14:22.965140 IP 172.16.0.2.64044 > 82.146.51.244.443: Flags [S], seq 2789961816, win 65535, options [mss 1240,nop,wscale 6,nop,nop,TS val 4172423134 ecr 0,sackOK,eol], length 0

19:14:23.965144 IP 172.16.0.2.64044 > 82.146.51.244.443: Flags [S], seq 2789961816, win 65535, options [mss 1240,nop,wscale 6,nop,nop,TS val 4172424134 ecr 0,sackOK,eol], length 0
curl -v https://git.one-pix.com > /dev/null

  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current

                                 Dload  Upload   Total   Spent    Left  Speed

  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0* Host git.one-pix.com:443 was resolved.

* IPv6: (none)

* IPv4: 82.146.51.244

*   Trying 82.146.51.244:443...

  0     0    0     0    0     0      0      0 --:--:--  0:00:09 --:--:--     0