-873068605 | 2025-03-06T09:05:15.075704
HTTP/1.1 200 OK
Server: nginx/1.26.2
Date: Thu, 06 Mar 2025 09:05:14 GMT
Content-Type: text/html
Content-Length: 3003
Connection: keep-alive
Last-Modified: Fri, 28 Feb 2025 13:23:20 GMT
ETag: "67c1b8c8-bbb"
Accept-Ranges: bytes
Access-Control-Allow-Methods: GET, POST, OPTIONS
Access-Control-Allow-Headers: Origin, X-Requested-With, Content-Type, Accept, Authorization
Access-Control-Allow-Credentials: true
Access-Control-Max-Age: 86400
-1061666927 | 2025-02-21T17:49:54.268812
HTTP/1.1 200 OK
Server: nginx/1.26.2
Date: Fri, 21 Feb 2025 17:49:53 GMT
Content-Type: text/html
Content-Length: 15076
Connection: keep-alive
Vary: Accept-Encoding
X-Trace-Id: 5899d2149384fe99077cd8d35d8bb6bd
Last-Modified: Tue, 24 Sep 2024 10:41:09 GMT
ETag: "66f29745-3ae4"
Accept-Ranges: bytes
SSL Certificate
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
73:d4:78:26:f4:58:8f:0b:47:58:50:3b:6a:fb:86:c3
Signature Algorithm: sha384WithRSAEncryption
Issuer: C=CN, O=TrustAsia Technologies, Inc., CN=TrustAsia RSA DV TLS CA G3
Validity
Not Before: Jan 10 00:00:00 2025 GMT
Not After : Apr 10 23:59:59 2025 GMT
Subject: CN=rest.miiow.com.cn
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:ae:5a:78:cb:90:70:4a:98:69:79:23:7d:90:39:
f4:6a:4f:81:4e:17:70:2e:ec:c8:d0:b0:4f:d4:de:
a1:8b:31:0e:5e:27:c9:7c:f1:b8:ae:4b:9d:14:21:
9e:6f:06:9f:0a:90:e0:93:57:c7:54:80:af:0d:96:
a6:31:8a:3c:9c:3b:bd:92:52:22:49:4f:8d:42:90:
6d:2a:d4:7d:9b:c3:c2:0b:38:ad:6a:05:bb:bc:1a:
fc:1d:ec:a4:f2:1e:85:94:90:33:09:ce:32:fa:08:
41:d8:9f:9d:f1:9e:d3:ce:ec:c5:4f:b4:db:32:55:
57:61:56:b2:c7:9c:a0:d5:15:1f:f9:23:77:ff:60:
e6:e1:9e:01:2f:b6:a1:cd:ac:70:d8:20:1f:fb:c8:
56:71:65:08:0a:99:c9:7b:81:ff:13:38:f1:eb:94:
eb:23:0a:69:72:c3:33:1a:20:94:09:3c:5b:b2:9c:
e7:32:86:a6:ca:97:70:5c:9c:f5:aa:1c:92:88:05:
82:c9:9a:f6:ba:a4:a3:65:72:a2:b6:df:52:51:3e:
1a:63:17:24:7b:4d:cb:8a:6b:4e:05:46:f1:e3:d0:
b2:b8:9d:25:30:97:74:9c:37:14:0c:6c:79:b5:78:
70:ca:48:59:1f:3c:73:be:ab:d3:5e:ff:42:a3:71:
aa:ab
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Authority Key Identifier:
C8:F3:C5:09:1B:33:A2:5F:A6:12:AB:90:D6:00:B6:5C:FC:8D:1C:06
X509v3 Subject Key Identifier:
00:52:2F:FF:42:B3:02:24:C3:54:15:69:3B:09:79:38:BC:1E:63:EA
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Basic Constraints: critical
CA:FALSE
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
X509v3 Certificate Policies:
Policy: 1.3.6.1.4.1.6449.1.2.2.49
CPS: https://sectigo.com/CPS
Policy: 2.23.140.1.2.1
Authority Information Access:
CA Issuers - URI:http://crt.trust-provider.cn/TrustAsiaRSADVTLSCAG3.crt
OCSP - URI:http://ocsp.trust-provider.cn
CT Precertificate SCTs:
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
Timestamp : Jan 10 08:41:21.275 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:45:02:20:56:ED:69:75:26:A6:43:79:2A:A6:36:DD:
29:74:B3:9E:24:0F:79:CE:D0:57:BE:31:30:CA:7A:12:
67:C6:14:DC:02:21:00:E9:36:45:FF:30:7F:AB:36:1B:
81:EC:E6:A8:5B:03:CD:00:B4:92:86:83:BA:48:84:BB:
C4:51:13:DF:63:A5:DC
Signed Certificate Timestamp:
Version : v1 (0x0)
Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
Timestamp : Jan 10 08:41:21.235 2025 GMT
Extensions: none
Signature : ecdsa-with-SHA256
30:46:02:21:00:8E:98:E0:35:BF:2E:64:81:F8:CC:A1:
74:69:4E:F1:8A:F3:DD:B2:80:58:F2:02:DD:9A:95:93:
ED:4D:B8:D9:E6:02:21:00:D3:E8:DA:5C:76:D2:93:46:
E1:48:29:61:51:76:6D:F6:EC:78:94:96:1A:FB:AE:71:
5E:31:15:7A:EF:F5:3D:6C
X509v3 Subject Alternative Name:
DNS:rest.miiow.com.cn
Signature Algorithm: sha384WithRSAEncryption
Signature Value:
35:95:b3:29:df:ae:aa:c6:b6:29:9a:03:cb:28:77:1d:7b:d5:
e5:4d:73:70:24:45:d1:d6:a5:7f:21:37:50:0d:0c:53:24:cf:
b4:c9:57:61:98:9e:19:9c:3c:2f:5e:12:75:4b:3c:3f:12:92:
14:34:ea:96:7f:ef:c5:42:cd:79:e5:c6:01:8c:8d:a2:16:64:
87:60:d5:af:9d:40:9f:db:d1:ba:6c:1f:d7:9c:89:db:98:8f:
22:87:29:ac:bf:b1:1c:17:c4:f5:a9:f3:e9:d6:44:62:ed:7a:
00:6d:05:0b:49:3d:d9:14:b7:fb:72:3f:6d:ab:c9:25:7f:b8:
d5:5d:17:17:1f:32:24:8f:0c:b7:ac:f4:30:b1:1e:26:6d:eb:
dd:0a:77:5d:03:00:1f:a2:2d:d1:71:16:7b:78:7a:53:27:64:
f9:42:db:0a:27:8b:bc:9e:2c:ca:43:d7:af:1f:45:be:e6:1b:
e8:9b:21:02:b2:53:10:23:42:d8:d3:08:ba:4c:2b:ec:a9:a2:
00:45:df:9a:95:76:44:8b:1b:dd:b6:97:a2:24:0f:28:98:0f:
1e:de:91:67:7d:9f:de:b8:40:c6:30:c6:57:f6:50:38:dc:aa:
bb:1e:36:9d:f4:21:e5:c7:e6:79:b0:78:c3:88:fc:65:21:b5:
da:8b:3a:41:90:5a:14:9a:05:1e:7e:03:79:84:6c:69:9b:61:
1a:f3:b4:b8:76:bb:41:79:08:02:68:5c:56:4c:71:1c:ab:2d:
6a:c8:81:cb:1c:30:36:30:c4:96:c8:71:7b:f1:90:8a:08:5b:
21:2b:cd:99:03:ab:75:0c:be:4f:66:fd:a8:99:bc:22:2b:bd:
1d:f9:25:73:8a:ce:9a:56:91:09:68:a3:5b:d8:43:0d:5d:a6:
45:46:11:4f:e9:32:5c:14:13:7d:42:d5:6f:1c:39:21:9c:52:
79:fe:63:e1:1e:b7:5e:99:22:d1:03:25:a9:9c:20:a1:4c:28:
50:49:64:7c:6a:b4
1892546794 | 2025-03-05T02:40:57.924879
HTTP/1.1 400
vary: accept-encoding
Content-Type: text/html;charset=utf-8
Content-Language: en
Content-Length: 1909
Date: Wed, 05 Mar 2025 02:40:56 GMT
Connection: close
<!doctype html><html lang="en"><head><title>HTTP Status 400 – Bad Request</title><style type="text/css">body {font-family:Tahoma,Arial,sans-serif;} h1, h2, h3, b {color:white;background-color:#525D76;} h1 {font-size:22px;} h2 {font-size:16px;} h3 {font-size:14px;} p {font-size:12px;} a {color:black;} .line {height:1px;background-color:#525D76;border:none;}</style></head><body><h1>HTTP Status 400 – Bad Request</h1><hr class="line" /><p><b>Type</b> Exception Report</p><p><b>Message</b> Invalid character found in method name [0x01I2010...]. HTTP method names must be tokens</p><p><b>Description</b> The server cannot or will not process the request due to something that is perceived to be a client error (e.g., malformed request syntax, invalid request message framing, or deceptive request routing).</p><p><b>Exception</b></p><pre>java.lang.IllegalArgumentException: Invalid character found in method name [0x01I2010...]. HTTP method names must be tokens
org.apache.coyote.http11.Http11InputBuffer.parseRequestLine(Http11InputBuffer.java:417)
org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:261)
org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:868)
org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1590)
org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
java.lang.Thread.run(Thread.java:748)
</pre><p><b>Note</b> The full stack trace of the root cause is available in the server logs.</p><hr class="line" /><h3>Apache Tomcat/9.0.39</h3></body></html>