Intermittent 'website takes too long to respond'

We’re running the website https://fresqo.de.

On some networks & some devices it times out (60s timeout).

  • Network A → Laptop :cross_mark:
  • Network A → Phone :check_mark:
  • Network B → Laptop :check_mark:
  • Network B → Phone :check_mark:

My other sites hosted through Vercel are reachable on this network. I saw this behaviour in the wild (other network) once during a user interview and brushed it off as a one-off incident. But seeing this now makes me worried this is a wider spread problem.

Any clue what’s going on?

Here is the output of vercel debug script:


┌───────────────────────────────────────
├─────── Fetching IP Addresses
│
│ fresqo.de IP range: 216.198.79.1, 216.198.79.65, 216.198.79.129, 216.198.79.193, 64.29.17.1, 64.29.17.65, 64.29.17.129, 64.29.17.193
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── STARTING
│
│ Domain to test: fresqo.de
│ Timestamp (UTC): Wed Oct 15 12:35:25 UTC 2025
│ Timestamp (Local): Wed Oct 15 14:35:25 CEST 2025
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── IP Information

{
“ip”: “176.126.216.78”,
“hostname”: “176-126-216-78.static.hofnetz.it”,
“city”: “Berlin”,
“region”: “State of Berlin”,
“country”: “DE”,
“loc”: “52.5244,13.4105”,
“org”: “AS50324 Campus, Hofnetz & Events GmbH”,
“postal”: “10119”,
“timezone”: “Europe/Berlin”,
“readme”: “https://ipinfo.io/missingauth”
}
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.1
Checking headers via 216.198.79.1

* Connecting to hostname: 216.198.79.1
* Trying 216.198.79.1:443…
* Connection timed out after 3002 milliseconds
* closing connection #0

Checking ping to 216.198.79.1
PING 216.198.79.1 (216.198.79.1): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2

— 216.198.79.1 ping statistics —
4 packets transmitted, 0 packets received, 100.0% packet loss

Checking tracert to 216.198.79.1
1  172.16.2.1 (172.16.2.1)  6.008 ms  4.596 ms  3.146 ms
2  \* \* \*
3  \* \* \*
4  \* \* \*
5  \* \* \*
6  \* \* \*
7  \* \* \*
8  \* \* \*
9  \* \* \*
10  \* \* \*
11  \* \* \*
12  \* \* \*
13  \* \* \*
14  \* \* \*
15  \* \* \*
16  \* \* \*
17  \* \* \*
18  \* \* \*
19  \* \* \*
20  \* \* \*
21  \* \* \*
22  \* \* \*
23  \* \* \*
24  \* \* \*
25  \* \* \*
26  \* \* \*
27  \* \* \*
28  \* \* \*
29  \* \* \*
30  \* \* \*
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.65
Checking headers via 216.198.79.65

* Connecting to hostname: 216.198.79.65
* Trying 216.198.79.65:443…
* ALPN: curl offers h2,http/1.1
  } \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
  } \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
  { \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  { \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
  { \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  } \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 216.198.79.65 (216.198.79.65) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
  } \[5 bytes data\]

> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*

{ \[5 bytes data\]

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  { \[122 bytes data\]
* Request completely sent off
  { \[5 bytes data\]
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 15 Oct 2025 12:37:10 GMT
  < location: https://www.fresqo.de/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: fra1::cjfjt-1760531830346-c1da5e745e87
  <
  { \[5 bytes data\]
* Connection #0 to host 216.198.79.65 left intact

Checking ping to 216.198.79.65
PING 216.198.79.65 (216.198.79.65): 56 data bytes
64 bytes from 216.198.79.65: icmp_seq=0 ttl=249 time=4.441 ms
64 bytes from 216.198.79.65: icmp_seq=1 ttl=249 time=4.547 ms
64 bytes from 216.198.79.65: icmp_seq=2 ttl=249 time=11.217 ms
64 bytes from 216.198.79.65: icmp_seq=3 ttl=249 time=11.297 ms

— 216.198.79.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.441/7.875/11.297/3.382 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.129
Checking headers via 216.198.79.129

* Connecting to hostname: 216.198.79.129
* Trying 216.198.79.129:443…
* ALPN: curl offers h2,http/1.1
  } \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
  } \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
  { \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  { \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
  { \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  } \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 216.198.79.129 (216.198.79.129) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
  } \[5 bytes data\]

> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*

{ \[5 bytes data\]

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  { \[122 bytes data\]
* Request completely sent off
  { \[5 bytes data\]
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 15 Oct 2025 12:37:13 GMT
  < location: https://www.fresqo.de/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: fra1::2fn4d-1760531833497-4a5a476875e0
  <
  { \[5 bytes data\]
* Connection #0 to host 216.198.79.129 left intact

Checking ping to 216.198.79.129
PING 216.198.79.129 (216.198.79.129): 56 data bytes
64 bytes from 216.198.79.129: icmp_seq=0 ttl=249 time=4.288 ms
64 bytes from 216.198.79.129: icmp_seq=1 ttl=249 time=5.775 ms
64 bytes from 216.198.79.129: icmp_seq=2 ttl=249 time=6.358 ms
64 bytes from 216.198.79.129: icmp_seq=3 ttl=249 time=11.451 ms

— 216.198.79.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.288/6.968/11.451/2.696 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 216.198.79.193
Checking headers via 216.198.79.193

* Connecting to hostname: 216.198.79.193
* Trying 216.198.79.193:443…
* ALPN: curl offers h2,http/1.1
  } \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
  } \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
  { \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  { \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
  { \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  } \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 216.198.79.193 (216.198.79.193) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
  } \[5 bytes data\]

> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*

{ \[5 bytes data\]

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  { \[122 bytes data\]
* Request completely sent off
  { \[5 bytes data\]
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 15 Oct 2025 12:37:16 GMT
  < location: https://www.fresqo.de/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: fra1::wmx2f-1760531836611-e7499133790a
  <
  { \[5 bytes data\]
* Connection #0 to host 216.198.79.193 left intact

Checking ping to 216.198.79.193
PING 216.198.79.193 (216.198.79.193): 56 data bytes
64 bytes from 216.198.79.193: icmp_seq=0 ttl=249 time=4.464 ms
64 bytes from 216.198.79.193: icmp_seq=1 ttl=249 time=10.952 ms
64 bytes from 216.198.79.193: icmp_seq=2 ttl=249 time=11.196 ms
64 bytes from 216.198.79.193: icmp_seq=3 ttl=249 time=11.549 ms

— 216.198.79.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.464/9.540/11.549/2.938 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.1
Checking headers via 64.29.17.1

* Connecting to hostname: 64.29.17.1
* Trying 64.29.17.1:443…
* ALPN: curl offers h2,http/1.1
  } \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
  } \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
  { \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  { \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
  { \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  } \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.1 (64.29.17.1) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
  } \[5 bytes data\]

> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*

{ \[5 bytes data\]

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  { \[122 bytes data\]
* Request completely sent off
  { \[5 bytes data\]
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 15 Oct 2025 12:37:19 GMT
  < location: https://www.fresqo.de/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: fra1::wr4z9-1760531839726-0842256ccb3b
  <
  { \[5 bytes data\]
* Connection #0 to host 64.29.17.1 left intact

Checking ping to 64.29.17.1
PING 64.29.17.1 (64.29.17.1): 56 data bytes
64 bytes from 64.29.17.1: icmp_seq=0 ttl=249 time=4.637 ms
64 bytes from 64.29.17.1: icmp_seq=1 ttl=249 time=7.147 ms
64 bytes from 64.29.17.1: icmp_seq=2 ttl=249 time=12.302 ms
64 bytes from 64.29.17.1: icmp_seq=3 ttl=249 time=5.370 ms

— 64.29.17.1 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.637/7.364/12.302/2.993 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.65
Checking headers via 64.29.17.65

* Connecting to hostname: 64.29.17.65
* Trying 64.29.17.65:443…
* ALPN: curl offers h2,http/1.1
  } \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
  } \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
  { \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  { \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
  { \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  } \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.65 (64.29.17.65) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
  } \[5 bytes data\]

> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*

{ \[5 bytes data\]

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  { \[122 bytes data\]
* Request completely sent off
  { \[5 bytes data\]
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 15 Oct 2025 12:37:22 GMT
  < location: https://www.fresqo.de/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: fra1::r2cts-1760531842835-8c6a64878f4d
  <
  { \[5 bytes data\]
* Connection #0 to host 64.29.17.65 left intact

Checking ping to 64.29.17.65
PING 64.29.17.65 (64.29.17.65): 56 data bytes
64 bytes from 64.29.17.65: icmp_seq=0 ttl=249 time=4.098 ms
64 bytes from 64.29.17.65: icmp_seq=1 ttl=249 time=4.893 ms
64 bytes from 64.29.17.65: icmp_seq=2 ttl=249 time=4.437 ms
64 bytes from 64.29.17.65: icmp_seq=3 ttl=249 time=4.516 ms

— 64.29.17.65 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.098/4.486/4.893/0.283 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.129
Checking headers via 64.29.17.129

* Connecting to hostname: 64.29.17.129
* Trying 64.29.17.129:443…
* ALPN: curl offers h2,http/1.1
  } \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
  } \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
  { \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  { \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
  { \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  } \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.129 (64.29.17.129) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
  } \[5 bytes data\]

> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*

{ \[5 bytes data\]

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  { \[122 bytes data\]
* Request completely sent off
  { \[5 bytes data\]
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 15 Oct 2025 12:37:25 GMT
  < location: https://www.fresqo.de/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: fra1::jrggq-1760531845945-4fb073aaa1dd
  <
  { \[5 bytes data\]
* Connection #0 to host 64.29.17.129 left intact

Checking ping to 64.29.17.129
PING 64.29.17.129 (64.29.17.129): 56 data bytes
64 bytes from 64.29.17.129: icmp_seq=0 ttl=249 time=4.480 ms
64 bytes from 64.29.17.129: icmp_seq=1 ttl=249 time=11.334 ms
64 bytes from 64.29.17.129: icmp_seq=2 ttl=249 time=6.803 ms
64 bytes from 64.29.17.129: icmp_seq=3 ttl=249 time=11.069 ms

— 64.29.17.129 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 4.480/8.421/11.334/2.900 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Testing 64.29.17.193
Checking headers via 64.29.17.193

* Connecting to hostname: 64.29.17.193
* Trying 64.29.17.193:443…
* ALPN: curl offers h2,http/1.1
  } \[5 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
  } \[512 bytes data\]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
  { \[122 bytes data\]
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
  { \[1 bytes data\]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  { \[15 bytes data\]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
  { \[2575 bytes data\]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
  { \[264 bytes data\]
* TLSv1.3 (IN), TLS handshake, Finished (20):
  { \[36 bytes data\]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  } \[1 bytes data\]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
  } \[36 bytes data\]
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / x25519 / RSASSA-PSS
* ALPN: server accepted h2
* Server certificate:
* subject: CN=fresqo.de
* start date: Aug 21 11:40:28 2025 GMT
* expire date: Nov 19 11:40:27 2025 GMT
* issuer: C=US; O=Let’s Encrypt; CN=R12
* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* Certificate level 0: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
* Connected to 64.29.17.193 (64.29.17.193) port 443
* using HTTP/2
* \[HTTP/2\] \[1\] OPENED stream for https://fresqo.de/
* \[HTTP/2\] \[1\] \[:method: GET\]
* \[HTTP/2\] \[1\] \[:scheme: https\]
* \[HTTP/2\] \[1\] \[:authority: fresqo.de\]
* \[HTTP/2\] \[1\] \[:path: /\]
* \[HTTP/2\] \[1\] \[user-agent: curl/8.12.1\]
* \[HTTP/2\] \[1\] \[accept: */*\]
  } \[5 bytes data\]

> GET / HTTP/2
> Host: fresqo.de
> User-Agent: curl/8.12.1
> Accept: */*

{ \[5 bytes data\]

* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  { \[122 bytes data\]
* Request completely sent off
  { \[5 bytes data\]
  < HTTP/2 307
  < cache-control: public, max-age=0, must-revalidate
  < content-type: text/plain
  < date: Wed, 15 Oct 2025 12:37:29 GMT
  < location: https://www.fresqo.de/
  < server: Vercel
  < strict-transport-security: max-age=63072000
  < x-vercel-id: fra1::vmrhd-1760531849045-62c78158b7ce
  <
  { \[5 bytes data\]
* Connection #0 to host 64.29.17.193 left intact

Checking ping to 64.29.17.193
PING 64.29.17.193 (64.29.17.193): 56 data bytes
64 bytes from 64.29.17.193: icmp_seq=0 ttl=249 time=2.869 ms
64 bytes from 64.29.17.193: icmp_seq=1 ttl=249 time=11.431 ms
64 bytes from 64.29.17.193: icmp_seq=2 ttl=249 time=4.618 ms
64 bytes from 64.29.17.193: icmp_seq=3 ttl=249 time=10.842 ms

— 64.29.17.193 ping statistics —
4 packets transmitted, 4 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 2.869/7.440/11.431/3.754 ms
└───────────────────────────────────────

┌───────────────────────────────────────
├─────── dig fresqo.de

; <<>> DiG 9.10.6 <<>> fresqo.de
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 30788
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;fresqo.de.			IN	A

;; ANSWER SECTION:
fresqo.de.		452	IN	A	216.198.79.1

;; Query time: 22 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Oct 15 14:37:31 CEST 2025
;; MSG SIZE  rcvd: 54

└───────────────────────────────────────

┌───────────────────────────────────────
├─────── dig fresqo.de via 8.8.8.8

; <<>> DiG 9.10.6 <<>> fr@8.8.8.8sqo.de @8.8.8.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14495
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;fresqo.de.			IN	A

;; ANSWER SECTION:
fresqo.de.		528	IN	A	216.198.79.1

;; Query time: 23 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Wed Oct 15 14:37:31 CEST 2025
;; MSG SIZE  rcvd: 54

└───────────────────────────────────────

┌───────────────────────────────────────
├─────── dig fresqo.de via trace

; <<>> DiG 9.10.6 <<>> fresqo.de +trace
;; global options: +cmd
;; Received 28 bytes from 8.8.8.8#53(8.8.8.8) in 20 ms

└───────────────────────────────────────

┌───────────────────────────────────────
├─────── Output of fresqo.de

* Host fresqo.de:443 was resolved.
* IPv6: (none)
* IPv4: 216.198.79.1
* Trying 216.198.79.1:443…
* connect to 216.198.79.1 port 443 from 172.16.2.187 port 61062 failed: Operation timed out
* Failed to connect to fresqo.de port 443 after 75041 ms: Could not connect to server
* closing connection #0

└───────────────────────────────────────

┌───────────────────────────────────────
│ Time elapsed: 202 seconds
│
├─────── FINISHED
└───────────────────────────────────────

I’m seeing more users recently mentioning issues around this IP address (see Vercel Ip blocked by PLDT ISP in Philippines )

Our website is still down today. Could we get resolution?