Notepad/20241012 Pantip Network Resolve
Jump to navigation
Jump to search
Test 1
❯ curl -o /dev/null -v https://pantip.com/ % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 203.151.13.168:443... * Connected to pantip.com (203.151.13.168) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: /etc/ssl/certs * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [187 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [4842 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=pantip.com * start date: Oct 9 00:00:00 2024 GMT * expire date: Jan 7 23:59:59 2025 GMT * subjectAltName: host "pantip.com" matched cert's "pantip.com" * issuer: C=AT; O=ZeroSSL; CN=ZeroSSL RSA Domain Secure Site CA * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x555ffd1eaeb0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET / HTTP/2 > Host: pantip.com > user-agent: curl/7.81.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 128)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] 0 0 0 0 0 0 0 0 --:--:-- 0:00:04 --:--:-- 0* TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < server: bytex/1.24.0 < date: Fri, 11 Oct 2024 17:11:31 GMT < content-type: text/html; charset=utf-8 < content-length: 159888 < vary: Accept-Encoding < vary: Accept-Encoding < x-powered-by: Next.js < set-cookie: pantip_visitc=sl7br3iX3ZbJ2iwRc; Domain=pantip.com; Path=/; Expires=Mon, 09 Oct 2034 17:11:27 GMT; HttpOnly; Secure; SameSite=None < set-cookie: pantip_visitc=sl7br7iWcvc96PW3b; Domain=pantip.com; Path=/; Expires=Mon, 09 Oct 2034 17:11:31 GMT; HttpOnly; Secure; SameSite=None < etag: "nl5f6428432tkb" < cache-control: private, no-cache, no-store, max-age=0, must-revalidate < vary: Accept-Encoding < strict-transport-security: max-age=15768001; preload < content-security-policy: upgrade-insecure-requests < { [15866 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] 100 156k 100 156k 0 0 36322 0 0:00:04 0:00:04 --:--:-- 38113 * Connection #0 to host pantip.com left intact
Test 2
(Took very long time before TLS handshake logs)
❯ curl -o /dev/null -v https://pantip.com/topic/43016660 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 203.151.13.167:443... * Trying 2001:c00:4618:cafe:1996::169:443... * Immediate connect fail for 2001:c00:4618:cafe:1996::169: Network is unreachable * Trying 2001:c00:4618:cafe:1996::167:443... * Immediate connect fail for 2001:c00:4618:cafe:1996::167: Network is unreachable * Trying 2001:c00:4618:cafe:1996::168:443... * Immediate connect fail for 2001:c00:4618:cafe:1996::168: Network is unreachable * Trying 2001:c00:4618:cafe:1996::165:443... * Immediate connect fail for 2001:c00:4618:cafe:1996::165: Network is unreachable * Trying 2001:c00:4618:cafe:1996::166:443... * Immediate connect fail for 2001:c00:4618:cafe:1996::166: Network is unreachable 0 0 0 0 0 0 0 0 --:--:-- 0:02:12 --:--:-- 0* connect to 203.151.13.167 port 443 failed: Connection timed out * Trying 203.151.13.166:443... 0 0 0 0 0 0 0 0 --:--:-- 0:02:13 --:--:-- 0* Connected to pantip.com (203.151.13.166) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: /etc/ssl/certs * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [187 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [4842 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=pantip.com * start date: Oct 9 00:00:00 2024 GMT * expire date: Jan 7 23:59:59 2025 GMT * subjectAltName: host "pantip.com" matched cert's "pantip.com" * issuer: C=AT; O=ZeroSSL; CN=ZeroSSL RSA Domain Secure Site CA * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x55c0a4505eb0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /topic/43016660 HTTP/2 > Host: pantip.com > user-agent: curl/7.81.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 128)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < server: bytex/1.24.0 < date: Fri, 11 Oct 2024 17:13:29 GMT < content-type: text/html < vary: Accept-Encoding < vary: Accept-Encoding < set-cookie: pantip_sessions=RCFqUWtExWysDxFV3PkBaYWIv0cpSD%2FIPbjEksOIiPxGzkki4o9kMJoxOE%2BjHP9EFoyNkekU%2BndVMaROZiHS9fuRZRQH8yOL3QC6%2FcaGZWs1EtMP57vO8XlEr7ALJJjeHNOh%2FT0PDuLPABE81yWUSMZLimcYANHg2hmqtk%2BT8rdLldWdxSehTRVxTb86ojdWFodU%2FcSf6S9LwpxKovwQJYy7It%2BcK3F7lbiuJu4ilrjzWW3mwfuZN402CqdSHoq2x%2Feybv86%2BikHK8F1uWOcMLiiOgcWKM5YhSfv7SKFe9g%3D; path=/ < set-cookie: pantip_visitc=sl7buh1z4lwBWvSGpK6q1; expires=Mon, 09-Oct-2034 17:13:29 GMT; Max-Age=315360000; path=/; domain=pantip.com; httponly < set-cookie: pantip_visitc=sl7buh1z4lwuSi6764rJC; expires=Mon, 09-Oct-2034 17:13:29 GMT; Max-Age=315360000; path=/; domain=pantip.com; httponly < set-cookie: PHPSESSID=jb3ohmdjrpc029b15ruihpi4m7; path=/ < set-cookie: rlr=43016660; expires=Fri, 18-Oct-2024 17:13:29 GMT; Max-Age=604800; path=/; SameSite=None; secure; httponly < x-frame-options: SAMEORIGIN < expires: Tue, 01 Jan 2000 00:00:00 GMT < last-modified: Fri, 11 Oct 2024 17:13:29 GMT < cache-control: no-store, no-cache, must-revalidate, max-age=0 < cache-control: post-check=0, pre-check=0 < pragma: no-cache < set-cookie: pantip_visitc=sl7buh1z4lw9C3hHcCzFY; expires=Mon, 09-Oct-2034 17:13:29 GMT; Max-Age=315360000; path=/; domain=pantip.com; httponly < strict-transport-security: max-age=15768001; preload < content-security-policy: upgrade-insecure-requests < { [15290 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] 100 168k 0 168k 0 0 1289 0 --:--:-- 0:02:13 --:--:-- 41058 * Connection #0 to host pantip.com left intact
Test 3
❯ curl -o /dev/null -v https://pantip.com/topic/43016660 % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 203.151.13.165:443... * Connected to pantip.com (203.151.13.165) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * CAfile: /etc/ssl/certs/ca-certificates.crt * CApath: /etc/ssl/certs * TLSv1.0 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [88 bytes data] * TLSv1.2 (OUT), TLS header, Finished (20): } [5 bytes data] * TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS header, Finished (20): { [5 bytes data] * TLSv1.2 (IN), TLS header, Certificate Status (22): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Server hello (2): { [187 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): { [19 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Certificate (11): { [4842 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, CERT verify (15): { [264 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Finished (20): { [52 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.3 (OUT), TLS handshake, Finished (20): } [52 bytes data] * SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 * ALPN, server accepted to use h2 * Server certificate: * subject: CN=pantip.com * start date: Oct 9 00:00:00 2024 GMT * expire date: Jan 7 23:59:59 2025 GMT * subjectAltName: host "pantip.com" matched cert's "pantip.com" * issuer: C=AT; O=ZeroSSL; CN=ZeroSSL RSA Domain Secure Site CA * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Connection state changed (HTTP/2 confirmed) * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * Using Stream ID: 1 (easy handle 0x56097f3aaeb0) * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] > GET /topic/43016660 HTTP/2 > Host: pantip.com > user-agent: curl/7.81.0 > accept: */* > * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): { [57 bytes data] * old SSL session ID is stale, removing * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * Connection state changed (MAX_CONCURRENT_STREAMS == 128)! * TLSv1.2 (OUT), TLS header, Supplemental data (23): } [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] 0 0 0 0 0 0 0 0 --:--:-- 0:01:02 --:--:-- 0* TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] < HTTP/2 200 < server: bytex/1.24.0 < date: Fri, 11 Oct 2024 17:13:20 GMT < content-type: text/html; charset=UTF-8 < vary: Accept-Encoding < vary: Accept-Encoding < set-cookie: pantip_sessions=ekI%2FxorYWhT77KL3v6Cu7EW0d6dwWtKK7qJoCHtsxrx1Va9nCy%2FfxgfR0UrqILUCcYLQvmOeyit8wJsnPLMhNw9qxINeZJr9xPPdvYSXj7JrlW%2FbGJHKeNfz%2FITn%2BKZ%2FcKh5P4wQXQX3EAAv8lTKMrLfKuZ4zbGT5fweIO7RRR0pWNlwRUVBeKghRe9roeOmL%2FzdEk%2F8qMlvC8JPiVjMkm8MTNZPoipYVHYjByCwZn8PBXEI6%2Btrd32eqf1J8X%2FbpUOokFx5gfoHIRPWNvvYDoPrh1sP7M9sK0CgDnbVhTk%3D; path=/ < set-cookie: pantip_visitc=sl7bu611wqh8Ztn9G20PY; expires=Mon, 09-Oct-2034 17:13:18 GMT; Max-Age=315360000; path=/; domain=pantip.com; httponly < set-cookie: pantip_visitc=sl7bu611wqhi12K8Q7XkX; expires=Mon, 09-Oct-2034 17:13:18 GMT; Max-Age=315360000; path=/; domain=pantip.com; httponly < set-cookie: PHPSESSID=n88pjgc88c4ln8bc89638ron64; path=/ < set-cookie: rlr=43016660; expires=Fri, 18-Oct-2024 17:13:18 GMT; Max-Age=604800; path=/; SameSite=None; secure; httponly < x-frame-options: SAMEORIGIN < expires: Tue, 01 Jan 2000 00:00:00 GMT < last-modified: Fri, 11 Oct 2024 17:13:20 GMT < cache-control: no-store, no-cache, must-revalidate, max-age=0 < cache-control: post-check=0, pre-check=0 < pragma: no-cache < set-cookie: pantip_visitc=sl7bu811wqh0921FuEJh2; expires=Mon, 09-Oct-2034 17:13:20 GMT; Max-Age=315360000; path=/; domain=pantip.com; httponly < strict-transport-security: max-age=15768001; preload < content-security-policy: upgrade-insecure-requests < { [15280 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] * TLSv1.2 (IN), TLS header, Supplemental data (23): { [5 bytes data] 100 168k 0 168k 0 0 2762 0 --:--:-- 0:01:02 --:--:-- 42455 * Connection #0 to host pantip.com left intact