curl -vvv https://ipecho.net/plain 19:03:07.465318 [0-x] == Info: [READ] client_reset, clear readers 19:03:07.604059 [0-0] == Info: Host ipecho.net:443 was resolved. 19:03:07.604175 [0-0] == Info: IPv6: 2600:1901:0:b2bd:: 19:03:07.604227 [0-0] == Info: IPv4: 34.160.111.145 19:03:07.604284 [0-0] == Info: [HTTPS-CONNECT] created with 1 ALPNs -> 0 19:03:07.604350 [0-0] == Info: [HTTPS-CONNECT] added 19:03:07.604404 [0-0] == Info: [HTTPS-CONNECT] connect, init 19:03:07.604482 [0-0] == Info: Trying [2600:1901:0:b2bd::]:443... 19:03:07.604574 [0-0] == Info: Immediate connect fail for 2600:1901:0:b2bd::: Network unreachable 19:03:07.604688 [0-0] == Info: Trying 34.160.111.145:443... 19:03:07.606214 [0-0] == Info: [HTTPS-CONNECT] connect -> 0, done=0 19:03:07.606537 [0-0] == Info: [HTTPS-CONNECT] adjust_pollset -> 1 socks 19:03:07.688264 [0-0] == Info: [SSL] cf_connect() 19:03:07.700746 [0-0] == Info: ALPN: curl offers h2,http/1.1 19:03:07.701368 [0-0] => Send SSL data, 5 bytes (0x5) 0000: ..... 19:03:07.701639 [0-0] == Info: TLSv1.3 (OUT), TLS handshake, Client hello (1): 19:03:07.701709 [0-0] => Send SSL data, 512 bytes (0x200) 0000: ........k.x.....ix....W.I[-.7...+..... ../...$.dcJ.g..f ".....i. 0040: ...g.zM.>.......,.0.........+./...$.(.k.#.'.g.....9.....3.....=. 0080: <.5./.....u.........ipecho.net.................................. 00c0: .......h2.http/1.1.........1.....0.............................. 0100: ...................+........-.....3.&.$... ..S.....xx....h..z.k. 0140: ..vk5.E.._V..................................................... 0180: ................................................................ 01c0: ................................................................ 19:03:07.702577 [0-0] == Info: [SSL] ossl_bio_cf_out_write(len=517) -> 517, err=0 19:03:07.702936 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> -1, err=81 19:03:07.703010 [0-0] == Info: [SSL] ossl_populate_x509_store, path=/etc/ssl/cert.pem, blob=0 19:03:07.762930 [0-0] == Info: CAfile: /etc/ssl/cert.pem 19:03:07.763031 [0-0] == Info: CApath: /etc/ssl/certs 19:03:07.763091 [0-0] == Info: [SSL] SSL_connect() -> err=-1, detail=2 19:03:07.763154 [0-0] == Info: [SSL] SSL_connect() -> want recv 19:03:07.763212 [0-0] == Info: [SSL] cf_connect() -> 0, done=0 19:03:07.763270 [0-0] == Info: [HTTPS-CONNECT] connect -> 0, done=0 19:03:07.763350 [0-0] == Info: [SSL] adjust_pollset, POLLIN fd=4 19:03:07.763409 [0-0] == Info: [HTTPS-CONNECT] adjust_pollset -> 1 socks 19:03:07.789923 [0-0] == Info: [SSL] cf_connect() 19:03:07.790075 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:07.790150 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ....z 19:03:07.790209 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=122) -> 122, err=0 19:03:07.790290 [0-0] == Info: TLSv1.3 (IN), TLS handshake, Server hello (2): 19:03:07.790352 [0-0] <= Recv SSL data, 122 bytes (0x7a) 0000: ...v...;..8....;.....H..HR.....X..M".6 ../...$.dcJ.g..f ".....i. 0040: ...g.zM......3.$... .F.[3..Q.x1.H.;.aF..]...6.....(..+.... 19:03:07.799183 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:07.799287 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ..... 19:03:07.799344 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=1) -> 1, err=0 19:03:07.799407 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:07.799477 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ....' 19:03:07.799541 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=3111) -> 3111, err=0 19:03:07.799703 [0-0] <= Recv SSL data, 1 bytes (0x1) 0000: . 19:03:07.799766 [0-0] == Info: TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): 19:03:07.799834 [0-0] <= Recv SSL data, 19 bytes (0x13) 0000: .................h2 19:03:07.799931 [0-0] == Info: TLSv1.3 (IN), TLS handshake, Certificate (11): 19:03:07.799994 [0-0] <= Recv SSL data, 2759 bytes (0xac7) 0000: ...........0...0...........zkS...).(...@2...0...*.H........031.0 0040: ...U....US1.0...U....Let's Encrypt1.0...U....R100...250514101557 0080: Z..250812101556Z0.1.0...U....ifconfig.me0.."0...*.H............. 00c0: 0....................y.%....@,U%...).Zh8....CA...K/..^....x.6a.. 0100: ....r.. ...g....5Opg..$e..O..5..>...K..>.j.?[.u|>......y?)...2.. 0140: F..+.7.+.. ........kR.....[.L.L.......>T.9.D..u..?.U........Pk.. 0180: .d..5K{.....CVB[.\Et.{%*......!.k..@N...`.....2RC..1..S..z.c.... 01c0: .R......S.........0...0...U...........0...U.%..0...+.........+.. 0200: .....0...U.......0.0...U........0...(.R7H..W....!{0...U.#..0.... 0240: ..G.......r....5...03..+........'0%0#..+.....0...http://r10.i.le 0280: ncr.org/0....U.....0....*.company.io..*.ifconfig.me..*.ipecho.ne 02c0: t..*.jsonip.com..*.myexternalip.com..*.useragent.io..company.io. 0300: .ifconfig.me..ipecho.net..iprobe.probenet.io..jsonip.com..myexte 0340: rnalip.com..useragent.io0...U. ..0.0...g.....0...U...'0%0#.!.... 0380: http://r10.c.lencr.org/17.crl0.....+.....y............u....0+... 03c0: @b...U..Gt|...0..B..~N.4.............F0D. q7;.s..L.....D.u...... 0400: ..|...?..L. ..q....5.8"..=..?..yk<....OfG....u...N4.SrL.....?z.. 0440: ..b...m0.....&:.............F0D. s..Q..y..,.....'...D..O....A.@. 0480: 1. y.Y.}.."..{..}..y..D.O.N}..RV.!00...*.H.............O..O...P, 04c0: .6...&.........$.K..J.....Y.{.3.Nr.2).T.'..>...GZ..".%o..=...... 0500: ........S....s..M|>.l..{..O.$......a1U...!...0.52r=..].O8.b..9.. 0540: ....!....l.."].M.=...j.~......Vy.e.............16.HJ.@{....c..7. 0580: .........=>..7.$...G...).....,...+Vx......1.m..y....d.y.....0... 05c0: 0..........K.R.../.s.K...u.0...*.H........0O1.0...U....US1)0'..U 0600: ... Internet Security Research Group1.0...U....ISRG Root X10...2 0640: 40313000000Z..270312235959Z031.0...U....US1.0...U....Let's Encry 0680: pt1.0...U....R100.."0...*.H.............0.........W...T...G..'Xv 06c0: FP(..>.......)...Z........!KbZZ<./.X......C........o.....9.ue... 0700: .[7&(....+m...X...@...W..[.x..a...T..I..n......e6.t..PL..!.8.... 0740: ..k8....z.Ru..v...].E\oa{.-.<.R...W.8.........J..E.rU.........f. 0780: ?H.q.qX.:..^.[D+b6p.1.....b......=,.... 0940: y..=\Dn.1cZ}.~O$.K..^o..._3K..W...Q.]...t..x......J+....b..t.... 0980: ..o.....Z..\.....N2...].).....]..... 19:03:07.804160 [0-0] == Info: TLSv1.3 (IN), TLS handshake, CERT verify (15): 19:03:07.804243 [0-0] <= Recv SSL data, 264 bytes (0x108) 0000: .........s...54.'.~.....N...3.....g..4.[Fkf....}.......W.T.o..|. 0040: u.0&.'(Y".V.4k.p.....*.*.....AN.......~w....V......5D..Q....Xhd. 0080: .29...K..pz...7$.U...c.e..E.?.e....b.)..k4*.........$..S... o... 00c0: ,......6....U?..5..0!.-|\Fe.".."i.G..5g...[H...Y......Q.....d... 0100: xd^|...A 19:03:07.804714 [0-0] == Info: TLSv1.3 (IN), TLS handshake, Finished (20): 19:03:07.804789 [0-0] <= Recv SSL data, 52 bytes (0x34) 0000: ...0t..... >...)`jQ^.K...H(...7*{7.p-!y.m'3..[...M%. 19:03:07.805087 [0-0] => Send SSL data, 5 bytes (0x5) 0000: ..... 19:03:07.805163 [0-0] == Info: TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): 19:03:07.805250 [0-0] => Send SSL data, 1 bytes (0x1) 0000: . 19:03:07.805504 [0-0] => Send SSL data, 5 bytes (0x5) 0000: ....E 19:03:07.805565 [0-0] => Send SSL data, 1 bytes (0x1) 0000: . 19:03:07.805619 [0-0] == Info: TLSv1.3 (OUT), TLS handshake, Finished (20): 19:03:07.805681 [0-0] => Send SSL data, 52 bytes (0x34) 0000: ...08.Y..B%o.@..MSLt....' 80, err=0 19:03:07.807296 [0-0] == Info: SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / RSASSA-PSS 19:03:07.807438 [0-0] == Info: ALPN: server accepted h2 19:03:07.807499 [0-0] == Info: Server certificate: 19:03:07.807568 [0-0] == Info: subject: CN=ifconfig.me 19:03:07.807632 [0-0] == Info: start date: May 14 10:15:57 2025 GMT 19:03:07.807701 [0-0] == Info: expire date: Aug 12 10:15:56 2025 GMT 19:03:07.807799 [0-0] == Info: subjectAltName: host "ipecho.net" matched cert's "ipecho.net" 19:03:07.807902 [0-0] == Info: issuer: C=US; O=Let's Encrypt; CN=R10 19:03:07.807971 [0-0] == Info: SSL certificate verify ok. 19:03:07.808043 [0-0] == Info: Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 19:03:07.808178 [0-0] == Info: Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption 19:03:07.808316 [0-0] == Info: Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption 19:03:07.808453 [0-0] == Info: [SSL] cf_connect() -> 0, done=1 19:03:07.808518 [0-0] == Info: [HTTPS-CONNECT] connect+handshake h2: 204ms, 1st data: 185ms 19:03:07.808652 [0-0] == Info: [HTTP/2] [0] created h2 session 19:03:07.808730 [0-0] == Info: [HTTP/2] [0] -> FRAME[SETTINGS, len=18] 19:03:07.808790 [0-0] == Info: [HTTP/2] [0] -> FRAME[WINDOW_UPDATE, incr=1048510465] 19:03:07.808860 [0-0] == Info: [HTTP/2] cf_connect() -> 0, 1, 19:03:07.808912 [0-0] == Info: [HTTPS-CONNECT] connect -> 0, done=1 19:03:07.809034 [0-0] == Info: Connected to ipecho.net (34.160.111.145) port 443 19:03:07.809101 [0-0] == Info: using HTTP/2 19:03:07.809186 [0-0] == Info: [HTTP/2] [1] OPENED stream for https://ipecho.net/plain 19:03:07.809259 [0-0] == Info: [HTTP/2] [1] [:method: GET] 19:03:07.809307 [0-0] == Info: [HTTP/2] [1] [:scheme: https] 19:03:07.809383 [0-0] == Info: [HTTP/2] [1] [:authority: ipecho.net] 19:03:07.809439 [0-0] == Info: [HTTP/2] [1] [:path: /plain] 19:03:07.809488 [0-0] == Info: [HTTP/2] [1] [user-agent: curl/8.12.1] 19:03:07.809545 [0-0] == Info: [HTTP/2] [1] [accept: */*] 19:03:07.809595 [0-0] == Info: [HTTP/2] [1] submit -> 77, 0 19:03:07.809688 [0-0] == Info: [HTTP/2] [1] -> FRAME[HEADERS, len=33, hend=1, eos=1] 19:03:07.809836 [0-0] => Send SSL data, 5 bytes (0x5) 0000: ....{ 19:03:07.809906 [0-0] => Send SSL data, 1 bytes (0x1) 0000: . 19:03:07.810064 [0-0] == Info: [SSL] ossl_bio_cf_out_write(len=128) -> 128, err=0 19:03:07.810160 [0-0] == Info: [HTTP/2] [0] egress: wrote 106 bytes 19:03:07.810415 [0-0] == Info: [HTTP/2] [1] cf_send(len=77) -> 77, 0, eos=1, h2 windows 65535-65535 (stream-conn), buffers 0-0 (stream-conn) 19:03:07.810529 [0-0] => Send header, 77 bytes (0x4d) 0000: GET /plain HTTP/2 0013: Host: ipecho.net 0025: User-Agent: curl/8.12.1 003e: Accept: */* 004b: 19:03:07.810730 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> -1, err=81 19:03:07.810813 [0-0] == Info: [SSL] cf_recv(len=16384) -> -1, 81 19:03:07.810879 [0-0] == Info: [HTTP/2] [0] progress ingress: done 19:03:07.810948 [0-0] == Info: [HTTP/2] [1] cf_recv(len=102400) -> -1 81, window=0/65535, connection 1048576000/1048576000 19:03:07.811073 [0-0] == Info: Request completely sent off 19:03:07.811142 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> -1, err=81 19:03:07.811207 [0-0] == Info: [SSL] cf_recv(len=16384) -> -1, 81 19:03:07.811262 [0-0] == Info: [HTTP/2] [0] progress ingress: done 19:03:07.811319 [0-0] == Info: [HTTP/2] [1] cf_recv(len=102400) -> -1 81, window=0/65535, connection 1048576000/1048576000 19:03:07.879371 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:07.879490 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ....I 19:03:07.879556 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=585) -> 585, err=0 19:03:07.879670 [0-0] <= Recv SSL data, 1 bytes (0x1) 0000: . 19:03:07.879825 [0-0] == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 19:03:07.879901 [0-0] <= Recv SSL data, 284 bytes (0x11c) 0000: .................a.qD..MK.B.Q..lZ...h.[.J......%..L...%'.\.C...M 0040: Bu.Zb.n.9......4....j.Q/%Gk..$....."..........[..c...e.....3.".. 0080: .7fb....v\..y...(A..r.....m..%v(._R.....Sp:`..,S.......l....{F.. 00c0: .|.6.8..............om....,,.....6X.D....8W.|._.....@%....^?g&.. 0100: !.n..3<....LPPZ......(..**.. 19:03:07.880503 [0-0] == Info: TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): 19:03:07.880588 [0-0] <= Recv SSL data, 284 bytes (0x11c) 0000: .........\.~.....a.qD..MK.B.Q..l.%8"..S..._..,....*.U...3...."h< 0040: ...q..t.t........v].....{ ..............m`....q.S_ .q..wX..;X.0. 0080: .............C).U......XZ*4.c4..mh.........2....g{.............. 00c0: ._.5`5.?U..U..S.e.j....9..>..l2..oB..I.R......V.|.....^FT..3/i.: 0100: .....)....PLPP...z.2.:..**.. 19:03:07.881237 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:07.881321 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ....9 19:03:07.881386 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=57) -> 57, err=0 19:03:07.881469 [0-0] <= Recv SSL data, 1 bytes (0x1) 0000: . 19:03:07.881531 [0-0] == Info: [SSL] cf_recv(len=16384) -> 40, 0 19:03:07.881592 [0-0] == Info: [HTTP/2] [0] ingress: read 40 bytes 19:03:07.881672 [0-0] == Info: [HTTP/2] [0] <- FRAME[SETTINGS, len=18] 19:03:07.881737 [0-0] == Info: [HTTP/2] [0] MAX_CONCURRENT_STREAMS: 100 19:03:07.881802 [0-0] == Info: [HTTP/2] [0] ENABLE_PUSH: TRUE 19:03:07.881861 [0-0] == Info: [HTTP/2] [0] <- FRAME[WINDOW_UPDATE, incr=983041] 19:03:07.881934 [0-0] == Info: [HTTP/2] [0] progress ingress: inbufg=0 19:03:07.882004 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:07.882073 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ..... 19:03:07.882219 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=26) -> 26, err=0 19:03:07.883486 [0-0] <= Recv SSL data, 1 bytes (0x1) 0000: . 19:03:07.883746 [0-0] == Info: [SSL] cf_recv(len=16384) -> 9, 0 19:03:07.883807 [0-0] == Info: [HTTP/2] [0] ingress: read 9 bytes 19:03:07.883876 [0-0] == Info: [HTTP/2] [0] <- FRAME[SETTINGS, ack=1] 19:03:07.883942 [0-0] == Info: [HTTP/2] [0] progress ingress: inbufg=0 19:03:07.884016 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> -1, err=81 19:03:07.884090 [0-0] == Info: [SSL] cf_recv(len=16384) -> -1, 81 19:03:07.884150 [0-0] == Info: [HTTP/2] [0] progress ingress: done 19:03:07.884280 [0-0] == Info: [HTTP/2] [0] -> FRAME[SETTINGS, ack=1] 19:03:07.884367 [0-0] => Send SSL data, 5 bytes (0x5) 0000: ..... 19:03:07.884431 [0-0] => Send SSL data, 1 bytes (0x1) 0000: . 19:03:07.884555 [0-0] == Info: [SSL] ossl_bio_cf_out_write(len=31) -> 31, err=0 19:03:07.884796 [0-0] == Info: [HTTP/2] [0] egress: wrote 9 bytes 19:03:07.884860 [0-0] == Info: [HTTP/2] [1] cf_recv(len=102400) -> -1 81, window=0/65536, connection 1048576000/1048576000 19:03:08.015941 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:08.016067 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ..... 19:03:08.016134 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=132) -> 132, err=0 19:03:08.016236 [0-0] <= Recv SSL data, 1 bytes (0x1) 0000: . 19:03:08.016299 [0-0] == Info: [SSL] cf_recv(len=16384) -> 115, 0 19:03:08.016360 [0-0] == Info: [HTTP/2] [0] ingress: read 115 bytes 19:03:08.016441 [0-0] <= Recv header, 13 bytes (0xd) 0000: HTTP/2 200 19:03:08.016520 [0-0] == Info: [WRITE] cw_out, wrote 13 header bytes -> 13 19:03:08.016601 [0-0] == Info: [WRITE] download_write header(type=c, blen=13) -> 0 19:03:08.016688 [0-0] == Info: [WRITE] client_write(type=c, len=13) -> 0 19:03:08.016775 [0-0] == Info: [HTTP/2] [1] local window update by 10420224 19:03:08.016856 [0-0] == Info: [HTTP/2] [1] status: HTTP/2 200 19:03:08.016929 [0-0] <= Recv header, 20 bytes (0x14) 0000: content-length: 12 19:03:08.017019 [0-0] == Info: [WRITE] header_collect pushed(type=1, len=20) -> 0 19:03:08.017092 [0-0] == Info: [WRITE] cw_out, wrote 20 header bytes -> 20 19:03:08.017158 [0-0] == Info: [WRITE] download_write header(type=4, blen=20) -> 0 19:03:08.017231 [0-0] == Info: [WRITE] client_write(type=4, len=20) -> 0 19:03:08.017296 [0-0] == Info: [HTTP/2] [1] header: content-length: 12 19:03:08.017395 [0-0] <= Recv header, 32 bytes (0x20) 0000: access-control-allow-origin: * 19:03:08.017481 [0-0] == Info: [WRITE] header_collect pushed(type=1, len=32) -> 0 19:03:08.017582 [0-0] == Info: [WRITE] cw_out, wrote 32 header bytes -> 32 19:03:08.017662 [0-0] == Info: [WRITE] download_write header(type=4, blen=32) -> 0 19:03:08.017754 [0-0] == Info: [WRITE] client_write(type=4, len=32) -> 0 19:03:08.017825 [0-0] == Info: [HTTP/2] [1] header: access-control-allow-origin: * 19:03:08.017902 [0-0] <= Recv header, 41 bytes (0x29) 0000: content-type: text/plain; charset=utf-8 19:03:08.018001 [0-0] == Info: [WRITE] header_collect pushed(type=1, len=41) -> 0 19:03:08.018074 [0-0] == Info: [WRITE] cw_out, wrote 41 header bytes -> 41 19:03:08.018141 [0-0] == Info: [WRITE] download_write header(type=4, blen=41) -> 0 19:03:08.018219 [0-0] == Info: [WRITE] client_write(type=4, len=41) -> 0 19:03:08.018284 [0-0] == Info: [HTTP/2] [1] header: content-type: text/plain; charset=utf-8 19:03:08.018365 [0-0] <= Recv header, 37 bytes (0x25) 0000: date: Thu, 15 May 2025 12:03:09 GMT 19:03:08.018458 [0-0] == Info: [WRITE] header_collect pushed(type=1, len=37) -> 0 19:03:08.018531 [0-0] == Info: [WRITE] cw_out, wrote 37 header bytes -> 37 19:03:08.018598 [0-0] == Info: [WRITE] download_write header(type=4, blen=37) -> 0 19:03:08.018671 [0-0] == Info: [WRITE] client_write(type=4, len=37) -> 0 19:03:08.018736 [0-0] == Info: [HTTP/2] [1] header: date: Thu, 15 May 2025 12:03:09 GMT 19:03:08.018814 [0-0] <= Recv header, 17 bytes (0x11) 0000: via: 1.1 google 19:03:08.018890 [0-0] == Info: [WRITE] header_collect pushed(type=1, len=17) -> 0 19:03:08.018994 [0-0] == Info: [WRITE] cw_out, wrote 17 header bytes -> 17 19:03:08.019074 [0-0] == Info: [WRITE] download_write header(type=4, blen=17) -> 0 19:03:08.019167 [0-0] == Info: [WRITE] client_write(type=4, len=17) -> 0 19:03:08.019245 [0-0] == Info: [HTTP/2] [1] header: via: 1.1 google 19:03:08.019327 [0-0] <= Recv header, 57 bytes (0x39) 0000: alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 19:03:08.019461 [0-0] == Info: [WRITE] header_collect pushed(type=1, len=57) -> 0 19:03:08.019548 [0-0] == Info: [WRITE] cw_out, wrote 57 header bytes -> 57 19:03:08.019634 [0-0] == Info: [WRITE] download_write header(type=4, blen=57) -> 0 19:03:08.019720 [0-0] == Info: [WRITE] client_write(type=4, len=57) -> 0 19:03:08.019799 [0-0] == Info: [HTTP/2] [1] header: alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000 19:03:08.019900 [0-0] == Info: [HTTP/2] [1] <- FRAME[HEADERS, len=106, hend=1, eos=0] 19:03:08.019978 [0-0] <= Recv header, 2 bytes (0x2) 0000: 19:03:08.020034 [0-0] == Info: [WRITE] header_collect pushed(type=1, len=2) -> 0 19:03:08.020111 [0-0] == Info: [WRITE] cw_out, wrote 2 header bytes -> 2 19:03:08.020176 [0-0] == Info: [WRITE] download_write header(type=4, blen=2) -> 0 19:03:08.020248 [0-0] == Info: [WRITE] client_write(type=4, len=2) -> 0 19:03:08.020314 [0-0] == Info: [HTTP/2] [1] DRAIN select_bits=1 19:03:08.020377 [0-0] == Info: [HTTP/2] [0] progress ingress: inbufg=0 19:03:08.020453 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=5) -> 5, err=0 19:03:08.020522 [0-0] <= Recv SSL data, 5 bytes (0x5) 0000: ....& 19:03:08.020585 [0-0] == Info: [SSL] ossl_bio_cf_in_read(len=38) -> 38, err=0 19:03:08.020669 [0-0] <= Recv SSL data, 1 bytes (0x1) 0000: . 19:03:08.020730 [0-0] == Info: [SSL] cf_recv(len=16384) -> 21, 0 19:03:08.020789 [0-0] == Info: [HTTP/2] [0] ingress: read 21 bytes 19:03:08.020852 [0-0] <= Recv data, 12 bytes (0xc) 0000: 188.16X.X.XX 19:03:08.020921 [0-0] == Info: [WRITE] cw_out, wrote 12 body bytes -> 12 19:03:08.020987 [0-0] == Info: [WRITE] download_write body(type=1, blen=12) -> 0 19:03:08.021059 [0-0] == Info: [WRITE] client_write(type=1, len=12) -> 0 19:03:08.021124 [0-0] == Info: [WRITE] xfer_write_resp(len=12, eos=0) -> 0 19:03:08.021333 [0-0] == Info: [HTTP/2] [1] <- FRAME[DATA, len=12, eos=1, padlen=0] 19:03:08.021417 [0-0] == Info: [HTTP/2] [1] DATA, window=12/10485760 19:03:08.021480 [0-0] == Info: [HTTP/2] [1] CLOSED 19:03:08.021528 [0-0] == Info: [HTTP/2] [1] DRAIN select_bits=1 19:03:08.021590 [0-0] == Info: [HTTP/2] [0] progress ingress: inbufg=0 19:03:08.021659 [0-0] == Info: [HTTP/2] [0] progress ingress: done 19:03:08.021721 [0-0] == Info: [HTTP/2] [1] returning CLOSE 19:03:08.021787 [0-0] == Info: [HTTP/2] handle_stream_close -> 0, 0 19:03:08.021854 [0-0] == Info: [HTTP/2] [1] cf_recv(len=102400) -> 0 0, window=-1/-1, connection 1048575988/1048576000 19:03:08.021962 [0-0] <= Recv data, 0 bytes (0x0) 19:03:08.022010 [0-0] == Info: [WRITE] download_write body(type=81, blen=0) -> 0 19:03:08.022082 [0-0] == Info: [WRITE] client_write(type=81, len=0) -> 0 19:03:08.022148 [0-0] == Info: [WRITE] xfer_write_resp(len=0, eos=1) -> 0 19:03:08.022219 [0-0] == Info: [WRITE] cw-out is notpaused 19:03:08.022337 [0-0] == Info: [WRITE] cw-out done 19:03:08.022393 [0-0] == Info: [READ] client_reset, clear readers 19:03:08.022460 [0-0] == Info: Connection #0 to host ipecho.net left intact