We’re running the website https://fresqo.de.
On some networks & some devices it times out (60s timeout).
- Network A → Laptop

- Network A → Phone

- Network B → Laptop

- Network B → Phone

My other sites hosted through Vercel are reachable on this network. I saw this behaviour in the wild (other network) once during a user interview and brushed it off as a one-off incident. But seeing this now makes me worried this is a wider spread problem.
Any clue what’s going on?
Here is the output of vercel debug script:
┌───────────────────────────────────────
├─────── Fetching IP Addresses
│
│ fresqo.de IP range: 216.198.79.1, 216.198.79.65, 216.198.79.129, 216.198.79.193, 64.29.17.1, 64.29.17.65, 64.29.17.129, 64.29.17.193
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── STARTING
│
│ Domain to test: fresqo.de
│ Timestamp (UTC): Wed Oct 15 12:35:25 UTC 2025
│ Timestamp (Local): Wed Oct 15 14:35:25 CEST 2025
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── IP Information
{
“ip”: “176.126.216.78”,
“hostname”: “176-126-216-78.static.hofnetz.it”,
“city”: “Berlin”,
“region”: “State of Berlin”,
“country”: “DE”,
“loc”: “52.5244,13.4105”,
“org”: “AS50324 Campus, Hofnetz & Events GmbH”,
“postal”: “10119”,
“timezone”: “Europe/Berlin”,
“readme”: “https://ipinfo.io/missingauth”
}
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.1
Checking headers via 216.198.79.1
* Connecting to hostname: 216.198.79.1
* Trying 216.198.79.1:443…
* Connection timed out after 3002 milliseconds
* closing connection #0
Checking ping to 216.198.79.1
PING 216.198.79.1 (216.198.79.1): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
— 216.198.79.1 ping statistics —
4 packets transmitted, 0 packets received, 100.0% packet loss
Checking tracert to 216.198.79.1
1 172.16.2.1 (172.16.2.1) 6.008 ms 4.596 ms 3.146 ms
2 \* \* \*
3 \* \* \*
4 \* \* \*
5 \* \* \*
6 \* \* \*
7 \* \* \*
8 \* \* \*
9 \* \* \*
10 \* \* \*
11 \* \* \*
12 \* \* \*
13 \* \* \*
14 \* \* \*
15 \* \* \*
16 \* \* \*
17 \* \* \*
18 \* \* \*
19 \* \* \*
20 \* \* \*
21 \* \* \*
22 \* \* \*
23 \* \* \*
24 \* \* \*
25 \* \* \*
26 \* \* \*
27 \* \* \*
28 \* \* \*
29 \* \* \*
30 \* \* \*
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.65
Checking headers via 216.198.79.65
* Connecting to hostname: 216.198.79.65
* Trying 216.198.79.65:443…
* ALPN: curl offers h2,http/1.1
} \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
{ \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 216.198.79.65 (216.198.79.65) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
} \[5 bytes data\]
> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*
{ \[5 bytes data\]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ \[122 bytes data\]
* Request completely sent off
{ \[5 bytes data\]
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 15 Oct 2025 12:37:10 GMT
< location: https://www.fresqo.de/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: fra1::cjfjt-1760531830346-c1da5e745e87
<
{ \[5 bytes data\]
* Connection #0 to host 216.198.79.65 left intact
Checking ping to 216.198.79.65
PING 216.198.79.65 (216.198.79.65): 56 data bytes
64 bytes from 216.198.79.65: icmp_seq=0 ttl=249 time=4.441 ms
64 bytes from 216.198.79.65: icmp_seq=1 ttl=249 time=4.547 ms
64 bytes from 216.198.79.65: icmp_seq=2 ttl=249 time=11.217 ms
64 bytes from 216.198.79.65: icmp_seq=3 ttl=249 time=11.297 ms
— 216.198.79.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.441/7.875/11.297/3.382 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.129
Checking headers via 216.198.79.129
* Connecting to hostname: 216.198.79.129
* Trying 216.198.79.129:443…
* ALPN: curl offers h2,http/1.1
} \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
{ \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 216.198.79.129 (216.198.79.129) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
} \[5 bytes data\]
> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*
{ \[5 bytes data\]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ \[122 bytes data\]
* Request completely sent off
{ \[5 bytes data\]
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 15 Oct 2025 12:37:13 GMT
< location: https://www.fresqo.de/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: fra1::2fn4d-1760531833497-4a5a476875e0
<
{ \[5 bytes data\]
* Connection #0 to host 216.198.79.129 left intact
Checking ping to 216.198.79.129
PING 216.198.79.129 (216.198.79.129): 56 data bytes
64 bytes from 216.198.79.129: icmp_seq=0 ttl=249 time=4.288 ms
64 bytes from 216.198.79.129: icmp_seq=1 ttl=249 time=5.775 ms
64 bytes from 216.198.79.129: icmp_seq=2 ttl=249 time=6.358 ms
64 bytes from 216.198.79.129: icmp_seq=3 ttl=249 time=11.451 ms
— 216.198.79.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.288/6.968/11.451/2.696 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 216.198.79.193
Checking headers via 216.198.79.193
* Connecting to hostname: 216.198.79.193
* Trying 216.198.79.193:443…
* ALPN: curl offers h2,http/1.1
} \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
{ \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 216.198.79.193 (216.198.79.193) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
} \[5 bytes data\]
> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*
{ \[5 bytes data\]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ \[122 bytes data\]
* Request completely sent off
{ \[5 bytes data\]
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 15 Oct 2025 12:37:16 GMT
< location: https://www.fresqo.de/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: fra1::wmx2f-1760531836611-e7499133790a
<
{ \[5 bytes data\]
* Connection #0 to host 216.198.79.193 left intact
Checking ping to 216.198.79.193
PING 216.198.79.193 (216.198.79.193): 56 data bytes
64 bytes from 216.198.79.193: icmp_seq=0 ttl=249 time=4.464 ms
64 bytes from 216.198.79.193: icmp_seq=1 ttl=249 time=10.952 ms
64 bytes from 216.198.79.193: icmp_seq=2 ttl=249 time=11.196 ms
64 bytes from 216.198.79.193: icmp_seq=3 ttl=249 time=11.549 ms
— 216.198.79.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.464/9.540/11.549/2.938 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.1
Checking headers via 64.29.17.1
* Connecting to hostname: 64.29.17.1
* Trying 64.29.17.1:443…
* ALPN: curl offers h2,http/1.1
} \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
{ \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.1 (64.29.17.1) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
} \[5 bytes data\]
> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*
{ \[5 bytes data\]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ \[122 bytes data\]
* Request completely sent off
{ \[5 bytes data\]
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 15 Oct 2025 12:37:19 GMT
< location: https://www.fresqo.de/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: fra1::wr4z9-1760531839726-0842256ccb3b
<
{ \[5 bytes data\]
* Connection #0 to host 64.29.17.1 left intact
Checking ping to 64.29.17.1
PING 64.29.17.1 (64.29.17.1): 56 data bytes
64 bytes from 64.29.17.1: icmp_seq=0 ttl=249 time=4.637 ms
64 bytes from 64.29.17.1: icmp_seq=1 ttl=249 time=7.147 ms
64 bytes from 64.29.17.1: icmp_seq=2 ttl=249 time=12.302 ms
64 bytes from 64.29.17.1: icmp_seq=3 ttl=249 time=5.370 ms
— 64.29.17.1 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.637/7.364/12.302/2.993 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.65
Checking headers via 64.29.17.65
* Connecting to hostname: 64.29.17.65
* Trying 64.29.17.65:443…
* ALPN: curl offers h2,http/1.1
} \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
{ \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.65 (64.29.17.65) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
} \[5 bytes data\]
> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*
{ \[5 bytes data\]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ \[122 bytes data\]
* Request completely sent off
{ \[5 bytes data\]
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 15 Oct 2025 12:37:22 GMT
< location: https://www.fresqo.de/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: fra1::r2cts-1760531842835-8c6a64878f4d
<
{ \[5 bytes data\]
* Connection #0 to host 64.29.17.65 left intact
Checking ping to 64.29.17.65
PING 64.29.17.65 (64.29.17.65): 56 data bytes
64 bytes from 64.29.17.65: icmp_seq=0 ttl=249 time=4.098 ms
64 bytes from 64.29.17.65: icmp_seq=1 ttl=249 time=4.893 ms
64 bytes from 64.29.17.65: icmp_seq=2 ttl=249 time=4.437 ms
64 bytes from 64.29.17.65: icmp_seq=3 ttl=249 time=4.516 ms
— 64.29.17.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.098/4.486/4.893/0.283 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.129
Checking headers via 64.29.17.129
* Connecting to hostname: 64.29.17.129
* Trying 64.29.17.129:443…
* ALPN: curl offers h2,http/1.1
} \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
{ \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.129 (64.29.17.129) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
} \[5 bytes data\]
> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*
{ \[5 bytes data\]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ \[122 bytes data\]
* Request completely sent off
{ \[5 bytes data\]
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 15 Oct 2025 12:37:25 GMT
< location: https://www.fresqo.de/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: fra1::jrggq-1760531845945-4fb073aaa1dd
<
{ \[5 bytes data\]
* Connection #0 to host 64.29.17.129 left intact
Checking ping to 64.29.17.129
PING 64.29.17.129 (64.29.17.129): 56 data bytes
64 bytes from 64.29.17.129: icmp_seq=0 ttl=249 time=4.480 ms
64 bytes from 64.29.17.129: icmp_seq=1 ttl=249 time=11.334 ms
64 bytes from 64.29.17.129: icmp_seq=2 ttl=249 time=6.803 ms
64 bytes from 64.29.17.129: icmp_seq=3 ttl=249 time=11.069 ms
— 64.29.17.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.480/8.421/11.334/2.900 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Testing 64.29.17.193
Checking headers via 64.29.17.193
* Connecting to hostname: 64.29.17.193
* Trying 64.29.17.193:443…
* ALPN: curl offers h2,http/1.1
} \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
{ \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.193 (64.29.17.193) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
} \[5 bytes data\]
> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*
{ \[5 bytes data\]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ \[122 bytes data\]
* Request completely sent off
{ \[5 bytes data\]
< HTTP/2 307
< cache-control: public, max-age=0, must-revalidate
< content-type: text/plain
< date: Wed, 15 Oct 2025 12:37:29 GMT
< location: https://www.fresqo.de/
< server: Vercel
< strict-transport-security: max-age=63072000
< x-vercel-id: fra1::vmrhd-1760531849045-62c78158b7ce
<
{ \[5 bytes data\]
* Connection #0 to host 64.29.17.193 left intact
Checking ping to 64.29.17.193
PING 64.29.17.193 (64.29.17.193): 56 data bytes
64 bytes from 64.29.17.193: icmp_seq=0 ttl=249 time=2.869 ms
64 bytes from 64.29.17.193: icmp_seq=1 ttl=249 time=11.431 ms
64 bytes from 64.29.17.193: icmp_seq=2 ttl=249 time=4.618 ms
64 bytes from 64.29.17.193: icmp_seq=3 ttl=249 time=10.842 ms
— 64.29.17.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 2.869/7.440/11.431/3.754 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── dig fresqo.de
; <<>> DiG 9.10.6 <<>> fresqo.de
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30788
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;fresqo.de. IN A
;; ANSWER SECTION:
fresqo.de. 452 IN A 216.198.79.1
;; Query time: 22 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Oct 15 14:37:31 CEST 2025
;; MSG SIZE rcvd: 54
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── dig fresqo.de via 8.8.8.8
; <<>> DiG 9.10.6 <<>> fr@8.8.8.8sqo.de @8.8.8.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14495
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;fresqo.de. IN A
;; ANSWER SECTION:
fresqo.de. 528 IN A 216.198.79.1
;; Query time: 23 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Oct 15 14:37:31 CEST 2025
;; MSG SIZE rcvd: 54
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── dig fresqo.de via trace
; <<>> DiG 9.10.6 <<>> fresqo.de +trace
;; global options: +cmd
;; Received 28 bytes from 8.8.8.8#53(8.8.8.8) in 20 ms
└───────────────────────────────────────
┌───────────────────────────────────────
├─────── Output of fresqo.de
* Host fresqo.de:443 was resolved.
* IPv6: (none)
* IPv4: 216.198.79.1
* Trying 216.198.79.1:443…
* connect to 216.198.79.1 port 443 from 172.16.2.187 port 61062 failed: Operation timed out
* Failed to connect to fresqo.de port 443 after 75041 ms: Could not connect to server
* closing connection #0
└───────────────────────────────────────
┌───────────────────────────────────────
│ Time elapsed: 202 seconds
│
├─────── FINISHED
└───────────────────────────────────────