Apex domain (trenna.co) intermittently times out

Hi Vercel team/community,

I’m experiencing intermittent connection timeouts on my apex domain (trenna.co) from my location in Porto Alegre, Brazil (Claro NXT / virtua.com.br ISP). The site works fine from other locations/networks, and www.trenna.co loads consistently without issues.

Current setup (as recommended by Vercel):

  • Apex (trenna.co): A record → 216.198.79.1 (from Vercel dashboard)

  • www: CNAME → [your-vercel-cname].vercel-dns-017.com

  • Redirect: Apex → www (307 redirect configured in Domains settings)

  • CAA record: 0 issue “letsencrypt.org” (verified and passing in dashboard)

  • SSL: Active (Let’s Encrypt cert valid until Mar 2026)

Symptoms:

  • From my network: https://trenna.co often gives ERR_CONNECTION_TIMED_OUT or takes 60+ seconds to fail.

  • https://www.trenna.co loads instantly (no redirect needed).

  • External checks (e.g., from other countries) show the apex works (200 or 307 redirect).

  • The issue is location/ISP-specific — likely anycast routing problem.

Debug output (from Vercel connect debug script):

  • DNS resolves apex to 216.198.79.1 consistently (via 8.8.8.8 too).

  • Testing the IP range:

    • 216.198.79.1: Connection timed out after ~3s (HTTPS 443), 100% packet loss on ping, tracert dies early.

    • All other IPs (216.198.79.65/129/193, 64.29.17.1/65/129/193): Connect successfully → TLS handshake OK, valid cert, HTTP/2 307 redirect to https://www.trenna.co/, ping ~44-55ms with 0% loss, x-vercel-id from gru1 (São Paulo region).

  • Direct curl to trenna.co: Timeout after ~75s on resolved IP 216.198.79.1.

Full log attached

What I’ve tried:

  • Flush DNS cache, incognito, different browsers/devices.

  • Test on mobile data (Claro 4G/5G) — same issue on fixed line, but sometimes better.

  • VPN to other BR servers → often bypasses the bad route.

  • Confirmed no local firewall/antivirus blocking.

  • CAA and DNS are correct (verified in dashboard and dig).

This looks like a classic anycast/BGP routing inconsistency where my ISP routes to a “bad” PoP for 216.198.79.1, while other IPs in the range hit good routes (GRU region).

Questions:

  • Is there a way to force/avoid the problematic IP (216.198.79.1) for my apex A record?

  • Recommended workaround: Invert config (make apex primary Production, redirect www → apex with 308) to avoid redirect on the flaky apex path?

  • Should I switch to Vercel nameservers (ns1/2.vercel-dns.com) even for apex (with ALIAS/ANAME if supported by Namecheap)?

  • Any known issues with Claro Brazil + Vercel anycast IPs?

Happy to provide more logs, screenshots, or run additional tests. Thanks in advance!

Full log:


Domain to test (e.g. example.com):
┌───────────────────────────────────────
├─────── Fetching IP Addresses
│
│ trenna.co IP range: 216.198.79.1, 216.198.79.65, 216.198.79.129, 216.198.79.193, 64.29.17.1, 64.29.17.65, 64.29.17.129, 64.29.17.193
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── STARTING
│
│ Domain to test: trenna.co
│ Timestamp (UTC): Wed Jan 21 23:26:30 UTC 2026
│ Timestamp (Local): Wed Jan 21 20:26:30 -03 2026
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── IP Information

{
“ip”: “179.152.53.181”,
“hostname”: “b39835b5.virtua.com.br”,
“city”: “Porto Alegre”,
“region”: “Rio Grande do Sul”,
“country”: “BR”,
“loc”: “-30.0328,-51.2302”,
“org”: “AS28573 Claro NXT Telecomunicacoes Ltda”,
“postal”: “90000-000”,
“timezone”: “America/Sao_Paulo”,
“readme”: “https://ipinfo.io/missingauth”
}
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.1
Checking headers via 216.198.79.1

* Connecting to hostname: 216.198.79.1
* Trying 216.198.79.1:443…
* Connection timed out after 3004 milliseconds
* Closing connection

Checking ping to 216.198.79.1
PING 216.198.79.1 (216.198.79.1): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2

— 216.198.79.1 ping statistics —
4 packets transmitted, 0 packets received, 100.0% packet loss

Checking tracert to 216.198.79.1
1  192.168.2.1 (192.168.2.1)  4.455 ms  2.791 ms  3.176 ms
2  192.168.0.1 (192.168.0.1)  3.974 ms  4.385 ms  3.610 ms
3  b3983401.virtua.com.br (179.152.52.1)  18.469 ms  19.036 ms  13.322 ms
4  \* \* \*
5  \* \* \*
6  \* \* \*
7  \* \* \*
8  \* \* \*
9  \* \* \*
10  \* \* \*
11  \* \* \*
12  \* \* \*
13  \* \* \*
14  \* \* \*
15  \* \* \*
16  \* \* \*
17  \* \* \*
18  \* \* \*
19  \* \* \*
20  \* \* \*
21  \* \* \*
22  \* \* \*
23  \* \* \*
24  \* \* \*
25  \* \* \*
26  \* \* \*
27  \* \* \*
28  \* \* \*
29  \* \* \*
30  \* \* \*
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.65
Checking headers via 216.198.79.65

* Connecting to hostname: 216.198.79.65
* Trying 216.198.79.65:443…
* Connected to 216.198.79.65 (216.198.79.65) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
  } \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
  { \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
  { \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]

> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*

* Request completely sent off
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 21 Jan 2026 23:28:10 GMT
  < location: https://www.trenna.co/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: gru1::cklmr-1769038090026-2645e6c429a5
  <
  { \[15 bytes data\]
* Connection #0 to host 216.198.79.65 left intact

Checking ping to 216.198.79.65
PING 216.198.79.65 (216.198.79.65): 56 data bytes
64 bytes from 216.198.79.65: icmp_seq=0 ttl=243 time=44.373 ms
64 bytes from 216.198.79.65: icmp_seq=1 ttl=243 time=44.100 ms
64 bytes from 216.198.79.65: icmp_seq=2 ttl=243 time=45.611 ms
64 bytes from 216.198.79.65: icmp_seq=3 ttl=243 time=44.578 ms

— 216.198.79.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 44.100/44.666/45.611/0.572 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.129
Checking headers via 216.198.79.129

* Connecting to hostname: 216.198.79.129
* Trying 216.198.79.129:443…
* Connected to 216.198.79.129 (216.198.79.129) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
  } \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
  { \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
  { \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]

> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*

* Request completely sent off
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 21 Jan 2026 23:28:13 GMT
  < location: https://www.trenna.co/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: gru1::vbhjb-1769038093309-8b9df01af79c
  <
  { \[15 bytes data\]
* Connection #0 to host 216.198.79.129 left intact

Checking ping to 216.198.79.129
PING 216.198.79.129 (216.198.79.129): 56 data bytes
64 bytes from 216.198.79.129: icmp_seq=0 ttl=243 time=49.086 ms
64 bytes from 216.198.79.129: icmp_seq=1 ttl=243 time=65.509 ms
64 bytes from 216.198.79.129: icmp_seq=2 ttl=243 time=49.244 ms
64 bytes from 216.198.79.129: icmp_seq=3 ttl=243 time=45.415 ms

— 216.198.79.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 45.415/52.313/65.509/7.771 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.193
Checking headers via 216.198.79.193

* Connecting to hostname: 216.198.79.193
* Trying 216.198.79.193:443…
* Connected to 216.198.79.193 (216.198.79.193) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
  } \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
  { \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
  { \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]

> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*

* Request completely sent off
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 21 Jan 2026 23:28:16 GMT
  < location: https://www.trenna.co/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: gru1::q6xx2-1769038096579-ad6ed3aa7338
  <
  { \[15 bytes data\]
* Connection #0 to host 216.198.79.193 left intact

Checking ping to 216.198.79.193
PING 216.198.79.193 (216.198.79.193): 56 data bytes
64 bytes from 216.198.79.193: icmp_seq=0 ttl=243 time=50.723 ms
64 bytes from 216.198.79.193: icmp_seq=1 ttl=243 time=45.879 ms
64 bytes from 216.198.79.193: icmp_seq=2 ttl=243 time=54.966 ms
64 bytes from 216.198.79.193: icmp_seq=3 ttl=243 time=47.700 ms

— 216.198.79.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 45.879/49.817/54.966/3.440 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.1
Checking headers via 64.29.17.1

* Connecting to hostname: 64.29.17.1
* Trying 64.29.17.1:443…
* Connected to 64.29.17.1 (64.29.17.1) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
  } \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
  { \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
  { \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]

> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*

* Request completely sent off
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 21 Jan 2026 23:28:19 GMT
  < location: https://www.trenna.co/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: gru1::mcbtr-1769038099871-84d49cfe386b
  <
  { \[15 bytes data\]
* Connection #0 to host 64.29.17.1 left intact

Checking ping to 64.29.17.1
PING 64.29.17.1 (64.29.17.1): 56 data bytes
64 bytes from 64.29.17.1: icmp_seq=0 ttl=243 time=49.074 ms
64 bytes from 64.29.17.1: icmp_seq=1 ttl=243 time=45.828 ms
64 bytes from 64.29.17.1: icmp_seq=2 ttl=243 time=45.377 ms
64 bytes from 64.29.17.1: icmp_seq=3 ttl=243 time=46.366 ms

— 64.29.17.1 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 45.377/46.661/49.074/1.436 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.65
Checking headers via 64.29.17.65

* Connecting to hostname: 64.29.17.65
* Trying 64.29.17.65:443…
* Connected to 64.29.17.65 (64.29.17.65) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
  } \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
  { \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
  { \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]

> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*

* Request completely sent off
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 21 Jan 2026 23:28:23 GMT
  < location: https://www.trenna.co/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: gru1::zp695-1769038103149-14272d0cf0d9
  <
  { \[15 bytes data\]
* Connection #0 to host 64.29.17.65 left intact

Checking ping to 64.29.17.65
PING 64.29.17.65 (64.29.17.65): 56 data bytes
64 bytes from 64.29.17.65: icmp_seq=0 ttl=243 time=46.404 ms
64 bytes from 64.29.17.65: icmp_seq=1 ttl=243 time=53.850 ms
64 bytes from 64.29.17.65: icmp_seq=2 ttl=243 time=62.024 ms
64 bytes from 64.29.17.65: icmp_seq=3 ttl=243 time=59.194 ms

— 64.29.17.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 46.404/55.368/62.024/5.950 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.129
Checking headers via 64.29.17.129

* Connecting to hostname: 64.29.17.129
* Trying 64.29.17.129:443…
* Connected to 64.29.17.129 (64.29.17.129) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
  } \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
  { \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
  { \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]

> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*

* Request completely sent off
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 21 Jan 2026 23:28:26 GMT
  < location: https://www.trenna.co/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: gru1::hkq45-1769038106443-4e34d4128704
  <
  { \[15 bytes data\]
* Connection #0 to host 64.29.17.129 left intact

Checking ping to 64.29.17.129
PING 64.29.17.129 (64.29.17.129): 56 data bytes
64 bytes from 64.29.17.129: icmp_seq=0 ttl=243 time=43.060 ms
64 bytes from 64.29.17.129: icmp_seq=1 ttl=243 time=49.917 ms
64 bytes from 64.29.17.129: icmp_seq=2 ttl=243 time=47.891 ms
64 bytes from 64.29.17.129: icmp_seq=3 ttl=243 time=42.941 ms

— 64.29.17.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 42.941/45.952/49.917/3.038 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.193
Checking headers via 64.29.17.193

* Connecting to hostname: 64.29.17.193
* Trying 64.29.17.193:443…
* Connected to 64.29.17.193 (64.29.17.193) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
  } \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
  { \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
  { \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]

> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*

* Request completely sent off
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 21 Jan 2026 23:28:29 GMT
  < location: https://www.trenna.co/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: gru1::xznqg-1769038109737-c96f2a31e405
  <
  { \[15 bytes data\]
* Connection #0 to host 64.29.17.193 left intact

Checking ping to 64.29.17.193
PING 64.29.17.193 (64.29.17.193): 56 data bytes
64 bytes from 64.29.17.193: icmp_seq=0 ttl=243 time=47.651 ms
64 bytes from 64.29.17.193: icmp_seq=1 ttl=243 time=55.653 ms
64 bytes from 64.29.17.193: icmp_seq=2 ttl=243 time=55.783 ms
64 bytes from 64.29.17.193: icmp_seq=3 ttl=243 time=52.909 ms

— 64.29.17.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 47.651/52.999/55.783/3.294 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── dig trenna.co

; <<>> DiG 9.10.6 <<>> trenna.co
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54007
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;trenna.co.			IN	A

;; ANSWER SECTION:
trenna.co.		1799	IN	A	216.198.79.1

;; Query time: 474 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Jan 21 20:28:33 -03 2026
;; MSG SIZE  rcvd: 54

└───────────────────────────────────────

┌───────────────────────────────────────
├─────── dig trenna.co via 8.8.8.8

; <<>> DiG 9.10.6 <<>> tre@8.8.8.8na.co @8.8.8.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32772
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;trenna.co.			IN	A

;; ANSWER SECTION:
trenna.co.		1799	IN	A	216.198.79.1

;; Query time: 500 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Jan 21 20:28:33 -03 2026
;; MSG SIZE  rcvd: 54

└───────────────────────────────────────

┌───────────────────────────────────────
├─────── dig trenna.co via trace

; <<>> DiG 9.10.6 <<>> trenna.co +trace
;; global options: +cmd
;; Received 28 bytes from 8.8.8.8#53(8.8.8.8) in 99 ms

└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Output of trenna.co

* Host trenna.co:443 was resolved.
* IPv6: (none)
* IPv4: 216.198.79.1
* Trying 216.198.79.1:443…
* connect to 216.198.79.1 port 443 from 192.168.2.100 port 52875 failed: Operation timed out
* Failed to connect to trenna.co port 443 after 75063 ms: Couldn’t connect to server
* Closing connection

└───────────────────────────────────────

┌───────────────────────────────────────
│ Time elapsed: 199 seconds
│
├─────── FINISHED
└───────────────────────────────────────

File can be found at /Users/ftocchetto/Documents/GitHub/saas-cb/vercel-debug.txt

There’s another community post with 404 debugging tips that might be helpful. Please give these solutions a try and let us know how it goes.

A human should be around soon to offer more advice. But you can also get helpful information quickly by asking v0.

1 Like