ATT CONECTA


SUBMITTED BY: isaias

DATE: June 9, 2022, 1:51 p.m.

UPDATED: Oct. 9, 2022, 4:18 p.m.

FORMAT: Text only

SIZE: 10.5 kB

HITS: 8505

  1. {
  2. "Version": "1.3.9",
  3. "ReleaseNotes": "🇧🇷Novas servidores grátis disponíveis :), atualize para se manter conectado (a)!",
  4. "UrlUpdate": "https://bitbin.it/0sROAzUz/raw/",
  5. "Sms": "https://bitbin.it/oKgMpLx1/raw/",
  6. "EmailFeedback": "cloudzinmaker@gmail.com",
  7. "UrlContato": "https://t.me/satancloud",
  8. "UrlTermos": "https://linkmenu.cc/cloudrocket",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7300"
  13. }
  14. ],
  15. "Servers": [
  16. {
  17. "Name": "🔄SERVIDOR ALEATÓRIO",
  18. "TYPE": "free",
  19. "FLAG": "id.png",
  20. "ServerIP": "cloudzinssh.tk",
  21. "CheckUser": "http://20.226.53.225:5454/checkUser",
  22. "ServerPort": "22",
  23. "SSLPort": "443",
  24. "USER": "",
  25. "PASS": ""
  26. },
  27. {
  28. "Name": "BR-SV1 | FREE",
  29. "TYPE": "free",
  30. "FLAG": "br.png",
  31. "ServerIP": "br.serverfree2.xyz",
  32. "CheckUser": "http://20.226.53.225:5454/checkUser",
  33. "ServerPort": "22",
  34. "SSLPort": "443",
  35. "USER": "",
  36. "PASS": ""
  37. },
  38. {
  39. "Name": "BR-SV2 | FREE",
  40. "TYPE": "premium",
  41. "FLAG": "br.png",
  42. "ServerIP": "cloudzinssh.tk",
  43. "CheckUser": "http://cloudzinssh.tk:5454/checkUser",
  44. "ServerPort": "22",
  45. "SSLPort": "443",
  46. "USER": "",
  47. "PASS": ""
  48. },
  49. {
  50. "Name": "BR-SV3 | FREE",
  51. "TYPE": "premium",
  52. "FLAG": "br.png",
  53. "ServerIP": "proxyovh.sshbrasil.net,
  54. "CheckUser": "",
  55. "ServerPort": "22",
  56. "SSLPort": "443",
  57. "USER": "",
  58. "PASS": ""
  59. },
  60. {
  61. "Name": "BR-SV4 | FREE",
  62. "TYPE": "premium",
  63. "FLAG": "br.png",
  64. "ServerIP": "serverfree2.xyz",
  65. "CheckUser": "http://br.serverfree2.xyz:5454/checkUser",
  66. "ServerPort": "22",
  67. "SSLPort": "443",
  68. "USER": "",
  69. "PASS": ""
  70. },
  71. {
  72. "Name": "CA-SV5 | FREE",
  73. "TYPE": "free",
  74. "FLAG": "ca.png",
  75. "ServerIP": "cas-2.opensvr.net",
  76. "CheckUser": "http://cas-2.opensvr.net:5454/checkUser",
  77. "ServerPort": "22",
  78. "SSLPort": "443",
  79. "USER": "",
  80. "PASS": ""
  81. },
  82. {
  83. "Name": "US-SV6 | FREE",
  84. "TYPE": "free",
  85. "FLAG": "us.png",
  86. "ServerIP": "uss-3.opensvr.net",
  87. "CheckUser": "http://uss-3.opensvr.net:5454/checkUser",
  88. "ServerPort": "22",
  89. "SSLPort": "443",
  90. "USER": "",
  91. "PASS": ""
  92. },
  93. ],
  94. "Networks": [
  95. {
  96. "Name": "INJECT PROXY 1",
  97. "FLAG": "vivo",
  98. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  99. "SNI": "celular.vivo.com.br",
  100. "TlsIP": "celular.vivo.com.br",
  101. "ProxyIP": "celular.vivo.com.br",
  102. "ProxyPort": "80",
  103. "Info": "proxy"
  104. },
  105. {
  106. "Name": "INJECT PROXY 2",
  107. "FLAG": "Vivo",
  108. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  109. "SNI": "celular.vivo.com.br",
  110. "TlsIP": "celular.vivo.com.br",
  111. "ProxyIP": "celular.vivo.com.br",
  112. "ProxyPort": "80",
  113. "Info": "proxy"
  114. },
  115. {
  116. "Name": "INJECT TLS 3",
  117. "FLAG": "vivo",
  118. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  119. "SNI": "celular.vivo.com.br",
  120. "TlsIP": "celular.vivo.com.br",
  121. "ProxyIP": "",
  122. "ProxyPort": "443",
  123. "Info": "Tlsws"
  124. },
  125. {
  126. "Name": "INJECT TLS 4",
  127. "FLAG": "vivo",
  128. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  129. "SNI": "bi-router.movistar.com.ar",
  130. "TlsIP": "104.18.6.80",
  131. "ProxyIP": "",
  132. "ProxyPort": "443",
  133. "Info": "Tlsws"
  134. },
  135. {
  136. "Name": "INJECT TLS 5",
  137. "FLAG": "vivo",
  138. "Payload": "GET wss://help.cloudflareclient.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  139. "SNI": "help.cloudflareclient.com",
  140. "TlsIP": "vigia.vivo.com.br",
  141. "ProxyIP": "",
  142. "ProxyPort": "443",
  143. "Info": "Tlsws"
  144. },
  145. {
  146. "Name": "INJECT TLS 6",
  147. "FLAG": "claro",
  148. "Payload": "GET sni://api.new.livestream.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  149. "SNI": "api.new.livestream.com",
  150. "TlsIP": "api.new.livestream.com",
  151. "ProxyIP": "",
  152. "ProxyPort": "443",
  153. "Info": "Tlsws"
  154. },
  155. {
  156. "Name": "INJECT TLS 7",
  157. "FLAG": "claro",
  158. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  159. "SNI": "connect.kaltura.com",
  160. "TlsIP": "connect.kaltura.com",
  161. "ProxyIP": "",
  162. "ProxyPort": "443",
  163. "Info": "Tlsws"
  164. },
  165. {
  166. "Name": "INJECT TLS 8",
  167. "FLAG": "claro",
  168. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  169. "SNI": "go.kaltura.com",
  170. "TlsIP": "go.kaltura.com",
  171. "ProxyIP": "",
  172. "ProxyPort": "443",
  173. "Info": "Tlsws"
  174. },
  175. {
  176. "Name": "INJECT TLS 9",
  177. "FLAG": "claro",
  178. "Payload": "GET wss://icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  179. "SNI": "icanhazip.com",
  180. "TlsIP": "icanhazip.com",
  181. "ProxyIP": "",
  182. "ProxyPort": "443",
  183. "Info": "Tlsws"
  184. },
  185. {
  186. "Name": "INJECT TLS 10",
  187. "FLAG": "claro",
  188. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  189. "SNI": "content.akross.com.br",
  190. "TlsIP": "content.akross.com.br",
  191. "ProxyIP": "",
  192. "ProxyPort": "443",
  193. "Info": "Tlsws"
  194. },
  195. {
  196. "Name": "INJECT PROXY 11",
  197. "FLAG": "tim",
  198. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  199. "SNI": "beringtime.com",
  200. "TlsIP": "beringtime.com",
  201. "ProxyIP": "",
  202. "ProxyPort": "443",
  203. "Info": "Tlsws"
  204. },
  205. {
  206. "Name": "INJECT TLS 12",
  207. "FLAG": "tim",
  208. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  209. "SNI": "static.r4you.co",
  210. "TlsIP": "104.26.5.175",
  211. "ProxyIP": "",
  212. "ProxyPort": "443",
  213. "Info": "Tlsws"
  214. },
  215. {
  216. "Name": "INJECT TLS 13",
  217. "FLAG": "tim",
  218. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  219. "SNI": "static.r4you.co",
  220. "TlsIP": "104.26.5.175",
  221. "ProxyIP": "",
  222. "ProxyPort": "443",
  223. "Info": "Tlsws"
  224. },
  225. {
  226. "Name": "INJECT TLS 14",
  227. "FLAG": "tim",
  228. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  229. "SNI": "[app_host]",
  230. "TlsIP": "104.16.18.94",
  231. "ProxyIP": "",
  232. "ProxyPort": "443",
  233. "Info": "Tlsws"
  234. },
  235. {
  236. "Name": "INJECT TLS 15",
  237. "FLAG": "tim",
  238. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  239. "SNI": "cdnjs.cloudflare.com",
  240. "TlsIP": "104.16.19.94",
  241. "ProxyIP": "",
  242. "ProxyPort": "443",
  243. "Info": "Tlsws"
  244. },
  245. {
  246. "Name": "INJECT TLS 16",
  247. "FLAG": "tim",
  248. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  249. "SNI": "cdnjs.cloudflare.com",
  250. "TlsIP": "cdnjs.cloudflare.com",
  251. "ProxyIP": "",
  252. "ProxyPort": "443",
  253. "Info": "Tlsws"
  254. },
  255. {
  256. "Name": "INJECT TLS 17",
  257. "FLAG": "tim",
  258. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  259. "SNI": "m.timbancavirtual.com.br",
  260. "TlsIP": "m.timbancavirtual.com.br",
  261. "ProxyIP": "",
  262. "ProxyPort": "443",
  263. "Info": "Tlsws"
  264. },
  265. {
  266. "Name": "INJECT TLS 18",
  267. "FLAG": "tim",
  268. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  269. "SNI": "consultatim.com.br",
  270. "TlsIP": "consultatim.com.br",
  271. "ProxyIP": "",
  272. "ProxyPort": "443",
  273. "Info": "Tlsws"
  274. },
  275. {
  276. "Name": "INJECT TLS 19",
  277. "FLAG": "tim",
  278. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  279. "SNI": "accesswdun.com",
  280. "TlsIP": "3cyber.com",
  281. "ProxyIP": "",
  282. "ProxyPort": "443",
  283. "Info": "Tlsws"
  284. },
  285. {
  286. "Name": "INJECT PROXY 20",
  287. "FLAG": "oi",
  288. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  289. "SNI": "oii.gdmhost.ga",
  290. "TlsIP": "www.hbogo.com.br",
  291. "ProxyIP": "www.hbogo.com.br",
  292. "ProxyPort": "80",
  293. "Info": "proxy"
  294. },
  295. {
  296. "Name": "INJECT TLS 21",
  297. "FLAG": "oi",
  298. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  299. "SNI": "www.hbogo.com.br",
  300. "TlsIP": "www.hbogo.com.br",
  301. "ProxyIP": "www.hbogo.com.br",
  302. "ProxyPort": "443",
  303. "Info": "Tlsws"
  304. },
  305. {
  306. "Name": "INJECT TLS 22",
  307. "FLAG": "oi",
  308. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  309. "SNI": "www.hbogo.com.br",
  310. "TlsIP": "www.hbogo.com.br",
  311. "ProxyIP": "",
  312. "ProxyPort": "443",
  313. "Info": "Tlsws"
  314. },
  315. {
  316. "Name": "INJECT TLS 23",
  317. "FLAG": "oi",
  318. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  319. "SNI": "[app_host]",
  320. "TlsIP": "104.16.51.91",
  321. "ProxyIP": "",
  322. "ProxyPort": "443",
  323. "Info": "Tlsws"
  324. }
  325. ]
  326. }

comments powered by Disqus