Fenix update


SUBMITTED BY: fbodilon

DATE: June 29, 2022, 11:25 p.m.

UPDATED: June 30, 2022, 8:46 a.m.

FORMAT: Text only

SIZE: 10.4 kB

HITS: 1162

  1. {
  2. "Version": "2.2.2",
  3. "ReleaseNotes": "🇧🇷MELHOR SERVIDOR FENIX VPS :), atualize para se manter conectado (a)!",
  4. "UrlUpdate": "https://bitbin.it/TqF0ytXK/raw/",
  5. "Sms": "SEU LINK DE SMS AQUI",
  6. "EmailFeedback": "enocflexa18@gmail.com",
  7. "UrlContato": "https://t.me/seu @ do telegram",
  8. "UrlTermos": "https://linkmenu.cc/cloudrocket",
  9. "CheckUser": "true",
  10. "Udp": [
  11. {
  12. "Porta": "7400"
  13. }
  14. ],
  15. "Servers": [
  16. {
  17. "Name": "🔄SERVIDOR ALEATÓRIO",
  18. "TYPE": "free",
  19. "FLAG": "id.png",
  20. "ServerIP": "br.dejotanet.xyz",
  21. "CheckUser": "http://144.22.217.3:5454/checkUser",
  22. "ServerPort": "22",
  23. "SSLPort": "443",
  24. "USER": "",
  25. "PASS": ""
  26. },
  27. {
  28. "Name": "BR-SV1 | FREE",
  29. "TYPE": "free",
  30. "FLAG": "br.png",
  31. "ServerIP": "br.dejotanet.xyz",
  32. "CheckUser": "http://144.22.217.3:5454/checkUser",
  33. "ServerPort": "22",
  34. "SSLPort": "443",
  35. "USER": "",
  36. "PASS": ""
  37. },
  38. {
  39. "Name": "BR-SV2 | FREE",
  40. "TYPE": "free",
  41. "FLAG": "br.png",
  42. "ServerIP": "br.dejotanet.xyz",
  43. "CheckUser": "http://144.22.217.3:5454/checkUser",
  44. "ServerPort": "22",
  45. "SSLPort": "443",
  46. "USER": "",
  47. "PASS": ""
  48. },
  49. {
  50. "Name": "BR-SV3 | FREE",
  51. "TYPE": "free",
  52. "FLAG": "br.png",
  53. "ServerIP": "br.dejotanet.xyz",
  54. "CheckUser": "http://144.22.217.3:5454/checkUser",
  55. "ServerPort": "22",
  56. "SSLPort": "443",
  57. "USER": "",
  58. "PASS": ""
  59. },
  60. {
  61. "Name": "CA-SV4 | FREE",
  62. "TYPE": "free",
  63. "FLAG": "ca.png",
  64. "ServerIP": "br.dejotanet.xyz",
  65. "CheckUser": "http://144.22.217.3:5454/checkUser",
  66. "ServerPort": "22",
  67. "SSLPort": "443",
  68. "USER": "",
  69. "PASS": ""
  70. },
  71. {
  72. "Name": "US-SV5 | FREE",
  73. "TYPE": "free",
  74. "FLAG": "us.png",
  75. "ServerIP": "br.dejotanet.xyz",
  76. "CheckUser": "http://144.22.217.3:5454/checkUser",
  77. "ServerPort": "22",
  78. "SSLPort": "443",
  79. "USER": "",
  80. "PASS": ""
  81. },
  82. ],
  83. "Networks": [
  84. {
  85. "Name": "INJECT PROXY 1",
  86. "FLAG": "vivo",
  87. "Payload": "GET wss://beneficios.vivo.com.br [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  88. "SNI": "beneficios.vivo.com.br",
  89. "TlsIP": "beneficios.vivo.com.br",
  90. "ProxyIP": "",
  91. "ProxyPort": "443",
  92. "Info": "Tlsws"
  93. },
  94. {
  95. "Name": "INJECT PROXY 2",
  96. "FLAG": "Vivo",
  97. "Payload": "GET wss://gedoc.vivo.com.br [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  98. "SNI": "gedoc.vivo.com.br",
  99. "TlsIP": "gedoc.vivo.com.br",
  100. "ProxyIP": "",
  101. "ProxyPort": "443",
  102. "Info": "proxy"
  103. },
  104. {
  105. "Name": "INJECT TLS 3",
  106. "FLAG": "vivo",
  107. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  108. "SNI": "bi-router.movistar.com.ar",
  109. "TlsIP": "bi-router.movistar.com.ar",
  110. "ProxyIP": "",
  111. "ProxyPort": "443",
  112. "Info": "Tlsws"
  113. },
  114. {
  115. "Name": "INJECT TLS 4",
  116. "FLAG": "vivo",
  117. "Payload": "GET wss://bi-router.movistar.com.ar [protocol][crlf]Host: [app_host][crlf] Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  118. "SNI": "bi-router.movistar.com.ar",
  119. "TlsIP": "104.18.6.80",
  120. "ProxyIP": "",
  121. "ProxyPort": "443",
  122. "Info": "Tlsws"
  123. },
  124. {
  125. "Name": "INJECT TLS 5",
  126. "FLAG": "vivo",
  127. "Payload": "GET wss://help.cloudflareclient.com/ HTTP/1.1[crlf]Host: [app_host][crlf]Connection: keep-alive[crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  128. "SNI": "help.cloudflareclient.com",
  129. "TlsIP": "vigia.vivo.com.br",
  130. "ProxyIP": "",
  131. "ProxyPort": "443",
  132. "Info": "Tlsws"
  133. },
  134. {
  135. "Name": "INJECT TLS 6",
  136. "FLAG": "claro",
  137. "Payload": "GET sni://ct.livestream.com HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Upgrade[crlf][crlf]",
  138. "SNI": "ct.livestream.com",
  139. "TlsIP": "ct.livestream.com",
  140. "ProxyIP": "",
  141. "ProxyPort": "443",
  142. "Info": "Tlsws"
  143. },
  144. {
  145. "Name": "INJECT TLS 7",
  146. "FLAG": "claro",
  147. "Payload": "GET wss://ct.livestream.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  148. "SNI": "ct.livestream.com",
  149. "TlsIP": "ct.livestream.com",
  150. "ProxyIP": "",
  151. "ProxyPort": "443",
  152. "Info": "Tlsws"
  153. },
  154. {
  155. "Name": "INJECT TLS 8",
  156. "FLAG": "claro",
  157. "Payload": "GET wss://go.kaltura.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  158. "SNI": "go.kaltura.com",
  159. "TlsIP": "go.kaltura.com",
  160. "ProxyIP": "",
  161. "ProxyPort": "443",
  162. "Info": "Tlsws"
  163. },
  164. {
  165. "Name": "INJECT TLS 9",
  166. "FLAG": "claro",
  167. "Payload": "GET wss://ct.livestream.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  168. "SNI": "ct.livestream.com",
  169. "TlsIP": "ct.livestream.com",
  170. "ProxyIP": "",
  171. "ProxyPort": "443",
  172. "Info": "Tlsws"
  173. },
  174. {
  175. "Name": "INJECT TLS 10",
  176. "FLAG": "claro",
  177. "Payload": "GET wss://content.akross.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: covid[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  178. "SNI": "content.akross.com.br",
  179. "TlsIP": "content.akross.com.br",
  180. "ProxyIP": "",
  181. "ProxyPort": "443",
  182. "Info": "Tlsws"
  183. },
  184. {
  185. "Name": "INJECT PROXY 11",
  186. "FLAG": "tim",
  187. "Payload": "GET wss://static.r4you.co/ HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Connection: Keep-Alive[crlf][crlf]",
  188. "SNI": "static.r4you.co",
  189. "TlsIP": "static.r4you.co",
  190. "ProxyIP": "",
  191. "ProxyPort": "443",
  192. "Info": "Tlsws"
  193. },
  194. {
  195. "Name": "INJECT TLS 12",
  196. "FLAG": "tim",
  197. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  198. "SNI": "static.r4you.co",
  199. "TlsIP": "104.26.5.175",
  200. "ProxyIP": "",
  201. "ProxyPort": "443",
  202. "Info": "Tlsws"
  203. },
  204. {
  205. "Name": "INJECT TLS 13",
  206. "FLAG": "tim",
  207. "Payload": "GET ws://static.r4you.co HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  208. "SNI": "static.r4you.co",
  209. "TlsIP": "104.26.5.175",
  210. "ProxyIP": "",
  211. "ProxyPort": "443",
  212. "Info": "Tlsws"
  213. },
  214. {
  215. "Name": "INJECT TLS 14",
  216. "FLAG": "tim",
  217. "Payload": "GET / HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  218. "SNI": "[app_host]",
  219. "TlsIP": "104.16.18.94",
  220. "ProxyIP": "",
  221. "ProxyPort": "443",
  222. "Info": "Tlsws"
  223. },
  224. {
  225. "Name": "INJECT TLS 15",
  226. "FLAG": "tim",
  227. "Payload": "GET sni://cdnjs.cloudflare.com [protocol][crlf]Host: [app_host][crlf]X-Forwarded-For: [app_host][crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  228. "SNI": "cdnjs.cloudflare.com",
  229. "TlsIP": "104.16.19.94",
  230. "ProxyIP": "",
  231. "ProxyPort": "443",
  232. "Info": "Tlsws"
  233. },
  234. {
  235. "Name": "INJECT TLS 16",
  236. "FLAG": "tim",
  237. "Payload": "GET wss://cdnjs.cloudflare.com HTTP/1.1[crlf]Host: [app_host][crlf]Connection: Keep-alive[crlf]Upgrade: ws[crlf][crlf]",
  238. "SNI": "cdnjs.cloudflare.com",
  239. "TlsIP": "cdnjs.cloudflare.com",
  240. "ProxyIP": "",
  241. "ProxyPort": "443",
  242. "Info": "Tlsws"
  243. },
  244. {
  245. "Name": "INJECT TLS 17",
  246. "FLAG": "tim",
  247. "Payload": "GET wss://m.timbancavirtual.com.br HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  248. "SNI": "m.timbancavirtual.com.br",
  249. "TlsIP": "m.timbancavirtual.com.br",
  250. "ProxyIP": "",
  251. "ProxyPort": "443",
  252. "Info": "Tlsws"
  253. },
  254. {
  255. "Name": "INJECT TLS 18",
  256. "FLAG": "tim",
  257. "Payload": "GET ws://static.r4you.co HTTP/1.1\nHost: [app_host_proxy]\nUpgrade: ws\n\n",
  258. "SNI": "static.r4you.co",
  259. "TlsIP": "104.26.5.175",
  260. "ProxyIP": "",
  261. "ProxyPort": "443",
  262. "Info": "Tlsws"
  263. },
  264. {
  265. "Name": "INJECT TLS 19",
  266. "FLAG": "tim",
  267. "Payload": "GET wss://accesswdun.com HTTP/1.1[crlf]Host: [app_host][crlf]Upgrade: Websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf]Connection: Keep-Alive[crlf][crlf]",
  268. "SNI": "accesswdun.com",
  269. "TlsIP": "3cyber.com",
  270. "ProxyIP": "",
  271. "ProxyPort": "443",
  272. "Info": "Tlsws"
  273. },
  274. {
  275. "Name": "INJECT PROXY 20",
  276. "FLAG": "oi",
  277. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  278. "SNI": "oii.gdmhost.ga",
  279. "TlsIP": "www.hbogo.com.br",
  280. "ProxyIP": "www.hbogo.com.br",
  281. "ProxyPort": "80",
  282. "Info": "proxy"
  283. },
  284. {
  285. "Name": "INJECT TLS 21",
  286. "FLAG": "oi",
  287. "Payload": "GET \/ HTTP\/1.3[crlf]Host: [app_host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  288. "SNI": "www.hbogo.com.br",
  289. "TlsIP": "www.hbogo.com.br",
  290. "ProxyIP": "www.hbogo.com.br",
  291. "ProxyPort": "443",
  292. "Info": "Tlsws"
  293. },
  294. {
  295. "Name": "INJECT TLS 22",
  296. "FLAG": "oi",
  297. "Payload": "GET ws://www.hbogo.com.br HTTP/1.1\nHost: [app_host]\nUpgrade: ws[crlf]Sec-Websocket-Extensions: superspeed\n\n",
  298. "SNI": "www.hbogo.com.br",
  299. "TlsIP": "www.hbogo.com.br",
  300. "ProxyIP": "",
  301. "ProxyPort": "443",
  302. "Info": "Tlsws"
  303. },
  304. {
  305. "Name": "INJECT TLS 23",
  306. "FLAG": "oi",
  307. "Payload": "GET / HTTP/1.1[crlf]Host: [host][crlf]Upgrade: websocket[crlf]Sec-Websocket-Extensions: superspeed[crlf][crlf]",
  308. "SNI": "[app_host]",
  309. "TlsIP": "104.16.51.91",
  310. "ProxyIP": "",
  311. "ProxyPort": "443",
  312. "Info": "Tlsws"
  313. }
  314. ]
  315. }

comments powered by Disqus