Hi Vercel team/community,
I’m experiencing intermittent connection timeouts on my apex domain (trenna.co) from my location in Porto Alegre, Brazil (Claro NXT / virtua.com.br ISP). The site works fine from other locations/networks, and www.trenna.co loads consistently without issues.
Current setup (as recommended by Vercel):
-
Apex (trenna.co): A record → 216.198.79.1 (from Vercel dashboard)
-
www: CNAME → [your-vercel-cname].vercel-dns-017.com
-
Redirect: Apex → www (307 redirect configured in Domains settings)
-
CAA record: 0 issue “letsencrypt.org” (verified and passing in dashboard)
-
SSL: Active (Let’s Encrypt cert valid until Mar 2026)
Symptoms:
-
From my network: https://trenna.co often gives ERR_CONNECTION_TIMED_OUT or takes 60+ seconds to fail.
-
https://www.trenna.co loads instantly (no redirect needed).
-
External checks (e.g., from other countries) show the apex works (200 or 307 redirect).
-
The issue is location/ISP-specific — likely anycast routing problem.
Debug output (from Vercel connect debug script):
-
DNS resolves apex to 216.198.79.1 consistently (via 8.8.8.8 too).
-
Testing the IP range:
-
216.198.79.1: Connection timed out after ~3s (HTTPS 443), 100% packet loss on ping, tracert dies early.
-
All other IPs (216.198.79.65/129/193, 64.29.17.1/65/129/193): Connect successfully → TLS handshake OK, valid cert, HTTP/2 307 redirect to https://www.trenna.co/, ping ~44-55ms with 0% loss, x-vercel-id from gru1 (São Paulo region).
-
-
Direct curl to trenna.co: Timeout after ~75s on resolved IP 216.198.79.1.
Full log attached
What I’ve tried:
-
Flush DNS cache, incognito, different browsers/devices.
-
Test on mobile data (Claro 4G/5G) — same issue on fixed line, but sometimes better.
-
VPN to other BR servers → often bypasses the bad route.
-
Confirmed no local firewall/antivirus blocking.
-
CAA and DNS are correct (verified in dashboard and dig).
This looks like a classic anycast/BGP routing inconsistency where my ISP routes to a “bad” PoP for 216.198.79.1, while other IPs in the range hit good routes (GRU region).
Questions:
-
Is there a way to force/avoid the problematic IP (216.198.79.1) for my apex A record?
-
Recommended workaround: Invert config (make apex primary Production, redirect www → apex with 308) to avoid redirect on the flaky apex path?
-
Should I switch to Vercel nameservers (ns1/2.vercel-dns.com) even for apex (with ALIAS/ANAME if supported by Namecheap)?
-
Any known issues with Claro Brazil + Vercel anycast IPs?
Happy to provide more logs, screenshots, or run additional tests. Thanks in advance!
Full log:
Domain to test (e.g. example.com):
┌───────────────────────────────────────
├─────── Fetching IP Addresses
│
│ trenna.co IP range: 216.198.79.1, 216.198.79.65, 216.198.79.129, 216.198.79.193, 64.29.17.1, 64.29.17.65, 64.29.17.129, 64.29.17.193
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── STARTING
│
│ Domain to test: trenna.co
│ Timestamp (UTC): Wed Jan 21 23:26:30 UTC 2026
│ Timestamp (Local): Wed Jan 21 20:26:30 -03 2026
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── IP Information
{
“ip”: “179.152.53.181”,
“hostname”: “b39835b5.virtua.com.br”,
“city”: “Porto Alegre”,
“region”: “Rio Grande do Sul”,
“country”: “BR”,
“loc”: “-30.0328,-51.2302”,
“org”: “AS28573 Claro NXT Telecomunicacoes Ltda”,
“postal”: “90000-000”,
“timezone”: “America/Sao_Paulo”,
“readme”: “https://ipinfo.io/missingauth”
}
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.1
Checking headers via 216.198.79.1
* Connecting to hostname: 216.198.79.1
* Trying 216.198.79.1:443…
* Connection timed out after 3004 milliseconds
* Closing connection
Checking ping to 216.198.79.1
PING 216.198.79.1 (216.198.79.1): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
— 216.198.79.1 ping statistics —
4 packets transmitted, 0 packets received, 100.0% packet loss
Checking tracert to 216.198.79.1
1 192.168.2.1 (192.168.2.1) 4.455 ms 2.791 ms 3.176 ms
2 192.168.0.1 (192.168.0.1) 3.974 ms 4.385 ms 3.610 ms
3 b3983401.virtua.com.br (179.152.52.1) 18.469 ms 19.036 ms 13.322 ms
4 \* \* \*
5 \* \* \*
6 \* \* \*
7 \* \* \*
8 \* \* \*
9 \* \* \*
10 \* \* \*
11 \* \* \*
12 \* \* \*
13 \* \* \*
14 \* \* \*
15 \* \* \*
16 \* \* \*
17 \* \* \*
18 \* \* \*
19 \* \* \*
20 \* \* \*
21 \* \* \*
22 \* \* \*
23 \* \* \*
24 \* \* \*
25 \* \* \*
26 \* \* \*
27 \* \* \*
28 \* \* \*
29 \* \* \*
30 \* \* \*
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.65
Checking headers via 216.198.79.65
* Connecting to hostname: 216.198.79.65
* Trying 216.198.79.65:443…
* Connected to 216.198.79.65 (216.198.79.65) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
{ \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
{ \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*
* Request completely sent off
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 21 Jan 2026 23:28:10 GMT
< location: https://www.trenna.co/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: gru1::cklmr-1769038090026-2645e6c429a5
<
{ \[15 bytes data\]
* Connection #0 to host 216.198.79.65 left intact
Checking ping to 216.198.79.65
PING 216.198.79.65 (216.198.79.65): 56 data bytes
64 bytes from 216.198.79.65: icmp_seq=0 ttl=243 time=44.373 ms
64 bytes from 216.198.79.65: icmp_seq=1 ttl=243 time=44.100 ms
64 bytes from 216.198.79.65: icmp_seq=2 ttl=243 time=45.611 ms
64 bytes from 216.198.79.65: icmp_seq=3 ttl=243 time=44.578 ms
— 216.198.79.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 44.100/44.666/45.611/0.572 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.129
Checking headers via 216.198.79.129
* Connecting to hostname: 216.198.79.129
* Trying 216.198.79.129:443…
* Connected to 216.198.79.129 (216.198.79.129) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
{ \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
{ \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*
* Request completely sent off
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 21 Jan 2026 23:28:13 GMT
< location: https://www.trenna.co/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: gru1::vbhjb-1769038093309-8b9df01af79c
<
{ \[15 bytes data\]
* Connection #0 to host 216.198.79.129 left intact
Checking ping to 216.198.79.129
PING 216.198.79.129 (216.198.79.129): 56 data bytes
64 bytes from 216.198.79.129: icmp_seq=0 ttl=243 time=49.086 ms
64 bytes from 216.198.79.129: icmp_seq=1 ttl=243 time=65.509 ms
64 bytes from 216.198.79.129: icmp_seq=2 ttl=243 time=49.244 ms
64 bytes from 216.198.79.129: icmp_seq=3 ttl=243 time=45.415 ms
— 216.198.79.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 45.415/52.313/65.509/7.771 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.193
Checking headers via 216.198.79.193
* Connecting to hostname: 216.198.79.193
* Trying 216.198.79.193:443…
* Connected to 216.198.79.193 (216.198.79.193) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
{ \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
{ \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*
* Request completely sent off
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 21 Jan 2026 23:28:16 GMT
< location: https://www.trenna.co/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: gru1::q6xx2-1769038096579-ad6ed3aa7338
<
{ \[15 bytes data\]
* Connection #0 to host 216.198.79.193 left intact
Checking ping to 216.198.79.193
PING 216.198.79.193 (216.198.79.193): 56 data bytes
64 bytes from 216.198.79.193: icmp_seq=0 ttl=243 time=50.723 ms
64 bytes from 216.198.79.193: icmp_seq=1 ttl=243 time=45.879 ms
64 bytes from 216.198.79.193: icmp_seq=2 ttl=243 time=54.966 ms
64 bytes from 216.198.79.193: icmp_seq=3 ttl=243 time=47.700 ms
— 216.198.79.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 45.879/49.817/54.966/3.440 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.1
Checking headers via 64.29.17.1
* Connecting to hostname: 64.29.17.1
* Trying 64.29.17.1:443…
* Connected to 64.29.17.1 (64.29.17.1) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
{ \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
{ \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*
* Request completely sent off
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 21 Jan 2026 23:28:19 GMT
< location: https://www.trenna.co/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: gru1::mcbtr-1769038099871-84d49cfe386b
<
{ \[15 bytes data\]
* Connection #0 to host 64.29.17.1 left intact
Checking ping to 64.29.17.1
PING 64.29.17.1 (64.29.17.1): 56 data bytes
64 bytes from 64.29.17.1: icmp_seq=0 ttl=243 time=49.074 ms
64 bytes from 64.29.17.1: icmp_seq=1 ttl=243 time=45.828 ms
64 bytes from 64.29.17.1: icmp_seq=2 ttl=243 time=45.377 ms
64 bytes from 64.29.17.1: icmp_seq=3 ttl=243 time=46.366 ms
— 64.29.17.1 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 45.377/46.661/49.074/1.436 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.65
Checking headers via 64.29.17.65
* Connecting to hostname: 64.29.17.65
* Trying 64.29.17.65:443…
* Connected to 64.29.17.65 (64.29.17.65) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
{ \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
{ \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*
* Request completely sent off
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 21 Jan 2026 23:28:23 GMT
< location: https://www.trenna.co/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: gru1::zp695-1769038103149-14272d0cf0d9
<
{ \[15 bytes data\]
* Connection #0 to host 64.29.17.65 left intact
Checking ping to 64.29.17.65
PING 64.29.17.65 (64.29.17.65): 56 data bytes
64 bytes from 64.29.17.65: icmp_seq=0 ttl=243 time=46.404 ms
64 bytes from 64.29.17.65: icmp_seq=1 ttl=243 time=53.850 ms
64 bytes from 64.29.17.65: icmp_seq=2 ttl=243 time=62.024 ms
64 bytes from 64.29.17.65: icmp_seq=3 ttl=243 time=59.194 ms
— 64.29.17.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 46.404/55.368/62.024/5.950 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.129
Checking headers via 64.29.17.129
* Connecting to hostname: 64.29.17.129
* Trying 64.29.17.129:443…
* Connected to 64.29.17.129 (64.29.17.129) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
{ \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
{ \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*
* Request completely sent off
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 21 Jan 2026 23:28:26 GMT
< location: https://www.trenna.co/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: gru1::hkq45-1769038106443-4e34d4128704
<
{ \[15 bytes data\]
* Connection #0 to host 64.29.17.129 left intact
Checking ping to 64.29.17.129
PING 64.29.17.129 (64.29.17.129): 56 data bytes
64 bytes from 64.29.17.129: icmp_seq=0 ttl=243 time=43.060 ms
64 bytes from 64.29.17.129: icmp_seq=1 ttl=243 time=49.917 ms
64 bytes from 64.29.17.129: icmp_seq=2 ttl=243 time=47.891 ms
64 bytes from 64.29.17.129: icmp_seq=3 ttl=243 time=42.941 ms
— 64.29.17.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 42.941/45.952/49.917/3.038 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.193
Checking headers via 64.29.17.193
* Connecting to hostname: 64.29.17.193
* Trying 64.29.17.193:443…
* Connected to 64.29.17.193 (64.29.17.193) port 443
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
} \[314 bytes data\]
* (304) (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* (304) (IN), TLS handshake, Unknown (8):
{ \[15 bytes data\]
* (304) (IN), TLS handshake, Certificate (11):
{ \[2582 bytes data\]
* (304) (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* (304) (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* (304) (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / \[blank\] / UNDEF
* ALPN: server accepted h2
* Server certificate:
* subject: CN=trenna.co
* start date: Dec 18 14:45:39 2025 GMT
* expire date: Mar 18 14:45:38 2026 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify ok.
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://trenna.co/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: trenna.co\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.7.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
> GET / HTTP/2
> Host: trenna.co
> User-Agent: curl/8.7.1
> Accept: */*
* Request completely sent off
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 21 Jan 2026 23:28:29 GMT
< location: https://www.trenna.co/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: gru1::xznqg-1769038109737-c96f2a31e405
<
{ \[15 bytes data\]
* Connection #0 to host 64.29.17.193 left intact
Checking ping to 64.29.17.193
PING 64.29.17.193 (64.29.17.193): 56 data bytes
64 bytes from 64.29.17.193: icmp_seq=0 ttl=243 time=47.651 ms
64 bytes from 64.29.17.193: icmp_seq=1 ttl=243 time=55.653 ms
64 bytes from 64.29.17.193: icmp_seq=2 ttl=243 time=55.783 ms
64 bytes from 64.29.17.193: icmp_seq=3 ttl=243 time=52.909 ms
— 64.29.17.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 47.651/52.999/55.783/3.294 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── dig trenna.co
; <<>> DiG 9.10.6 <<>> trenna.co
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 54007
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;trenna.co. IN A
;; ANSWER SECTION:
trenna.co. 1799 IN A 216.198.79.1
;; Query time: 474 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Jan 21 20:28:33 -03 2026
;; MSG SIZE rcvd: 54
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── dig trenna.co via 8.8.8.8
; <<>> DiG 9.10.6 <<>> tre@8.8.8.8na.co @8.8.8.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 32772
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;trenna.co. IN A
;; ANSWER SECTION:
trenna.co. 1799 IN A 216.198.79.1
;; Query time: 500 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Jan 21 20:28:33 -03 2026
;; MSG SIZE rcvd: 54
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── dig trenna.co via trace
; <<>> DiG 9.10.6 <<>> trenna.co +trace
;; global options: +cmd
;; Received 28 bytes from 8.8.8.8#53(8.8.8.8) in 99 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Output of trenna.co
* Host trenna.co:443 was resolved.
* IPv6: (none)
* IPv4: 216.198.79.1
* Trying 216.198.79.1:443…
* connect to 216.198.79.1 port 443 from 192.168.2.100 port 52875 failed: Operation timed out
* Failed to connect to trenna.co port 443 after 75063 ms: Couldn’t connect to server
* Closing connection
└───────────────────────────────────────
┌───────────────────────────────────────
│ Time elapsed: 199 seconds
│
├─────── FINISHED
└───────────────────────────────────────
File can be found at /Users/ftocchetto/Documents/GitHub/saas-cb/vercel-debug.txt