Conecta 4G


SUBMITTED BY: edvandro

DATE: June 4, 2022, 2:12 p.m.

UPDATED: Oct. 19, 2024, 1:56 p.m.

FORMAT: Text only

SIZE: 10.1 kB

HITS: 3394

  1. {
  2. "Version": "9.1.18",
  3. "ReleaseNotes": "NOVO SERVIDOR ATIVO",
  4. "UrlUpdate": "https://bitbin.it/Jvt1U9kz/raw/",
  5. "Sms": "",
  6. "EmailFeedback": "",
  7. "UrlContato": "",
  8. "UrlTermos": "https://paste.anasor.com/paste.php?raw&id=9843",
  9. "CheckUser": "true",
  10. "UdpPort": "7300;7500;7295;7296;7200;7297;7298;7299;7400",
  11. "Servers": [
  12. {
  13. "Name": "SERVIDOR DMC",
  14. "TYPE": "premium",
  15. "FLAG": "br.png",
  16. "ServerIP": "virus.v3rme.cf",
  17. "CheckUser": "http://45.233.147.57:5454/checkUser",
  18. "ServerPort": "22",
  19. "SSLPort": "443",
  20. "USER": "vivo",
  21. "PASS": "vivo"
  22. },
  23. {
  24. "Name": "BR-SV1 | FREE",
  25. "FLAG": "br.png",
  26. "ServerIP": "svfree1tr.gdmhost.ga",
  27. "ServerPort": "22",
  28. "TlsSNI": "svfree1tr.gdmhost.ga",
  29. "SSLPort": "443",
  30. "ServerU": "TERRORFREE1",
  31. "ServerP": "TERRORFREE1",
  32. "TlsPAY": "",
  33. "TlsPAY2": "",
  34. "TlsPAY3": ""
  35. },
  36. {
  37. "Name": "BR-SV2 | FREE",
  38. "FLAG": "br.png",
  39. "ServerIP": "svfree2tr.gdmhost.ga",
  40. "ServerPort": "22",
  41. "TlsSNI": "svfree2tr.gdmhost.ga",
  42. "SSLPort": "443",
  43. "ServerU": "TERRORFREE2",
  44. "ServerP": "TERRORFREE2",
  45. "TlsPAY": "",
  46. "TlsPAY2": "",
  47. "TlsPAY3": ""
  48. },
  49. {
  50. "Name": "BR-SV3 | FREE",
  51. "FLAG": "br.png",
  52. "ServerIP": "svfree3tr.gdmhost.ga",
  53. "ServerPort": "22",
  54. "TlsSNI": "svfree3tr.gdmhost.ga",
  55. "SSLPort": "443",
  56. "ServerU": "TERRORFREE3",
  57. "ServerP": "TERRORFREE3",
  58. "TlsPAY": "",
  59. "TlsPAY2": "",
  60. "TlsPAY3": ""
  61. },
  62. {
  63. "Name": "BR-SV4 | FREE",
  64. "FLAG": "br.png",
  65. "ServerIP": "svfree4tr.gdmhost.ga",
  66. "ServerPort": "22",
  67. "TlsSNI": "svfree4tr.gdmhost.ga",
  68. "SSLPort": "443",
  69. "ServerU": "TERRORFREE4",
  70. "ServerP": "TERRORFREE4",
  71. "TlsPAY": "",
  72. "TlsPAY2": "",
  73. "TlsPAY3": ""
  74. },
  75. {
  76. "Name": "BR-SV5 | FREE",
  77. "FLAG": "br.png",
  78. "ServerIP": "svfree5tr.gdmhost.ga",
  79. "ServerPort": "22",
  80. "TlsSNI": "svfree5tr.gdmhost.ga",
  81. "SSLPort": "443",
  82. "ServerU": "TERRORFREE5",
  83. "ServerP": "TERRORFREE5",
  84. "TlsPAY": "",
  85. "TlsPAY2": "",
  86. "TlsPAY3": ""
  87. }
  88. ],
  89. "Networks": [
  90. {
  91. "Name": "INJECT PROXY 1",
  92. "FLAG": "ic_vivo",
  93. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  94. "SNI": "104.18.7.80",
  95. "TlsIP": "104.18.7.80",
  96. "ProxyIP": "104.18.7.80",
  97. "ProxyPort": "80",
  98. "Info": "proxy"
  99. },
  100. {
  101. "Name": "INJECT PROXY 2",
  102. "FLAG": "ic_vivo",
  103. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  104. "SNI": "v.gdmhost.ga",
  105. "TlsIP": "v.gdmhost.ga",
  106. "ProxyIP": "v.gdmhost.ga",
  107. "ProxyPort": "80",
  108. "Info": "proxy"
  109. },
  110. {
  111. "Name": "INJECT TLS 3",
  112. "FLAG": "ic_vivo",
  113. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  114. "SNI": "v.gdmhost.ga",
  115. "TlsIP": "v.gdmhost.ga",
  116. "ProxyIP": "",
  117. "ProxyPort": "443",
  118. "Info": "Tlsws"
  119. },
  120. {
  121. "Name": "INJECT TLS 4",
  122. "FLAG": "ic_vivo",
  123. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  124. "SNI": "bi-router.movistar.com.ar",
  125. "TlsIP": "104.18.6.80",
  126. "ProxyIP": "",
  127. "ProxyPort": "443",
  128. "Info": "Tlsws"
  129. },
  130. {
  131. "Name": "INJECT TLS 5",
  132. "FLAG": "ic_vivo",
  133. "Payload": "GET wss://help.cloudflareclient.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  134. "SNI": "help.cloudflareclient.com",
  135. "TlsIP": "vigia.vivo.com.br",
  136. "ProxyIP": "",
  137. "ProxyPort": "443",
  138. "Info": "Tlsws"
  139. },
  140. {
  141. "Name": "INJECT TLS 6",
  142. "FLAG": "claro",
  143. "Payload": "GET sni://api.new.livestream.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  144. "SNI": "api.new.livestream.com",
  145. "TlsIP": "api.new.livestream.com",
  146. "ProxyIP": "",
  147. "ProxyPort": "443",
  148. "Info": "Tlsws"
  149. },
  150. {
  151. "Name": "INJECT TLS 7",
  152. "FLAG": "claro",
  153. "Payload": "GET wss://connect.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  154. "SNI": "connect.kaltura.com",
  155. "TlsIP": "connect.kaltura.com",
  156. "ProxyIP": "",
  157. "ProxyPort": "443",
  158. "Info": "Tlsws"
  159. },
  160. {
  161. "Name": "INJECT TLS 8",
  162. "FLAG": "claro",
  163. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  164. "SNI": "go.kaltura.com",
  165. "TlsIP": "go.kaltura.com",
  166. "ProxyIP": "",
  167. "ProxyPort": "443",
  168. "Info": "Tlsws"
  169. },
  170. {
  171. "Name": "INJECT TLS 9",
  172. "FLAG": "claro",
  173. "Payload": "GET wss://icanhazip.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  174. "SNI": "icanhazip.com",
  175. "TlsIP": "icanhazip.com",
  176. "ProxyIP": "",
  177. "ProxyPort": "443",
  178. "Info": "Tlsws"
  179. },
  180. {
  181. "Name": "INJECT TLS 10",
  182. "FLAG": "claro",
  183. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  184. "SNI": "content.akross.com.br",
  185. "TlsIP": "content.akross.com.br",
  186. "ProxyIP": "",
  187. "ProxyPort": "443",
  188. "Info": "Tlsws"
  189. },
  190. {
  191. "Name": "INJECT PROXY 11",
  192. "FLAG": "tim",
  193. "Payload": "GET wss://beringtime.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  194. "SNI": "beringtime.com",
  195. "TlsIP": "beringtime.com",
  196. "ProxyIP": "",
  197. "ProxyPort": "443",
  198. "Info": "Tlsws"
  199. },
  200. {
  201. "Name": "INJECT TLS 12",
  202. "FLAG": "tim",
  203. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  204. "SNI": "tim.gdmhost.ga",
  205. "TlsIP": "tim.gdmhost.ga",
  206. "ProxyIP": "tim.gdmhost.ga",
  207. "ProxyPort": "443",
  208. "Info": "Tlsws"
  209. },
  210. {
  211. "Name": "INJECT TLS 13",
  212. "FLAG": "tim",
  213. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  214. "SNI": "static.r4you.co",
  215. "TlsIP": "104.26.5.175",
  216. "ProxyIP": "",
  217. "ProxyPort": "443",
  218. "Info": "Tlsws"
  219. },
  220. {
  221. "Name": "INJECT TLS 14",
  222. "FLAG": "tim",
  223. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  224. "SNI": "[app_host]",
  225. "TlsIP": "104.16.18.94",
  226. "ProxyIP": "",
  227. "ProxyPort": "443",
  228. "Info": "Tlsws"
  229. },
  230. {
  231. "Name": "INJECT TLS 15",
  232. "FLAG": "tim",
  233. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  234. "SNI": "cdnjs.cloudflare.com",
  235. "TlsIP": "104.16.19.94",
  236. "ProxyIP": "",
  237. "ProxyPort": "443",
  238. "Info": "Tlsws"
  239. },
  240. {
  241. "Name": "INJECT TLS 16",
  242. "FLAG": "tim",
  243. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  244. "SNI": "cdnjs.cloudflare.com",
  245. "TlsIP": "cdnjs.cloudflare.com",
  246. "ProxyIP": "",
  247. "ProxyPort": "443",
  248. "Info": "Tlsws"
  249. },
  250. {
  251. "Name": "INJECT TLS 17",
  252. "FLAG": "tim",
  253. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  254. "SNI": "m.timbancavirtual.com.br",
  255. "TlsIP": "m.timbancavirtual.com.br",
  256. "ProxyIP": "",
  257. "ProxyPort": "443",
  258. "Info": "Tlsws"
  259. },
  260. {
  261. "Name": "INJECT TLS 18",
  262. "FLAG": "tim",
  263. "Payload": "GET ws://consultatim.com.br HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  264. "SNI": "consultatim.com.br",
  265. "TlsIP": "consultatim.com.br",
  266. "ProxyIP": "",
  267. "ProxyPort": "443",
  268. "Info": "Tlsws"
  269. },
  270. {
  271. "Name": "INJECT TLS 19",
  272. "FLAG": "tim",
  273. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  274. "SNI": "accesswdun.com",
  275. "TlsIP": "3cyber.com",
  276. "ProxyIP": "",
  277. "ProxyPort": "443",
  278. "Info": "Tlsws"
  279. },
  280. {
  281. "Name": "INJECT PROXY 20",
  282. "FLAG": "ic_oi",
  283. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  284. "SNI": "oii.gdmhost.ga",
  285. "TlsIP": "oii.gdmhost.ga",
  286. "ProxyIP": "oii.gdmhost.ga",
  287. "ProxyPort": "80",
  288. "Info": "proxy"
  289. },
  290. {
  291. "Name": "INJECT TLS 21",
  292. "FLAG": "ic_oi",
  293. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  294. "SNI": "oii.gdmhost.ga",
  295. "TlsIP": "oii.gdmhost.ga",
  296. "ProxyIP": "oii.gdmhost.ga",
  297. "ProxyPort": "443",
  298. "Info": "Tlsws"
  299. },
  300. {
  301. "Name": "INJECT TLS 22",
  302. "FLAG": "ic_oi",
  303. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  304. "SNI": "www.hbogo.com.br",
  305. "TlsIP": "www.hbogo.com.br",
  306. "ProxyIP": "",
  307. "ProxyPort": "443",
  308. "Info": "Tlsws"
  309. },
  310. {
  311. "Name": "INJECT TLS 23",
  312. "FLAG": "ic_oi",
  313. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  314. "SNI": "[app_host]",
  315. "TlsIP": "104.16.51.91",
  316. "ProxyIP": "",
  317. "ProxyPort": "443",
  318. "Info": "Tlsws"
  319. }
  320. ]
  321. }

comments powered by Disqus