Response example

< HTTP/1.1 200 Connection established
< 
* Proxy replied 200 to CONNECT request
* CONNECT phase completed!
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*  CAfile: /etc/ssl/cert.pem
*  CApath: none
* (304) (OUT), TLS handshake, Client hello (1):
* (304) (IN), TLS handshake, Server hello (2):
* (304) (IN), TLS handshake, Unknown (8):
* (304) (IN), TLS handshake, Certificate (11):
* (304) (IN), TLS handshake, CERT verify (15):
* (304) (IN), TLS handshake, Finished (20):
* (304) (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256
* ALPN, server did not agree to a protocol
* Server certificate:
*  subject: CN=unblock.smartproxy.com
*  start date: May 31 10:04:03 2023 GMT
*  expire date: Aug 29 10:04:02 2023 GMT
*  issuer: CN=Smartproxy Intermediate CA
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
> GET / HTTP/1.1
> Host: ip.smartproxy.com
> User-Agent: curl/7.79.1
> Accept: */*
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: nginx
< Date: Fri, 23 Jun 2023 12:55:32 GMT
< Content-Type: text/html; charset=UTF-8
< x-smartproxy-task-id: 7077992570218909697
< X-Cache: MISS from localhost
< X-Cache-Lookup: MISS from localhost:3129
< Transfer-Encoding: chunked
< Connection: keep-alive
< 
* Connection #0 to host unblock.smartproxy.com left intact
Your Ip is: 185.117.151.65

Site Unblocker also returns ratelimit information as well as remaining request amount and/or traffic used for your current subscription. This information is can be seen in the response headers. In this example, we use curl with verbose (-v).

Request:

curl -v -k -x unblock.smartproxy.com:60000 'https://ipinfo.io/' \
    -U 'Username:Password'

Response:

< HTTP/1.1 200 Connection established
< 
* CONNECT phase completed
* CONNECT tunnel established, response 200
* ALPN: curl offers h2,http/1.1
* (304) (OUT), TLS handshake, Client hello (1):
* (304) (IN), TLS handshake, Server hello (2):
* (304) (IN), TLS handshake, Unknown (8):
* (304) (IN), TLS handshake, Certificate (11):
* (304) (IN), TLS handshake, CERT verify (15):
* (304) (IN), TLS handshake, Finished (20):
* (304) (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / AEAD-CHACHA20-POLY1305-SHA256 / [blank] / UNDEF
* ALPN: server did not agree on a protocol. Uses default.
* Server certificate:
*  subject: CN=unblock.smartproxy.com
*  start date: Nov 23 05:19:02 2024 GMT
*  expire date: Feb 21 05:19:01 2025 GMT
*  issuer: CN=Smartproxy Intermediate CA
*  SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.
* using HTTP/1.x
> GET /ip HTTP/1.1
> Host: ip.smartproxy.com
> User-Agent: curl/8.7.1
> Accept: */*
> 
* Request completely sent off
< HTTP/1.1 200 OK
< Server: nginx
< Date: Tue, 07 Jan 2025 14:44:02 GMT
< Content-Type: text/html; charset=utf-8
< x-su-task-id: 7282406625426548737
< x-su-ratelimit-25gb-plan-limit: 26843545600
< x-su-ratelimit-25gb-plan-remaining: 26840378560
< x-su-ratelimit-internal-total-default-limit: 12000
< x-su-ratelimit-internal-total-default-remaining: 11998
< x-su-traffic-generated: 917
< Cache-Status: localhost;detail=no-cache
< Transfer-Encoding: chunked
< Connection: keep-alive
< 
* Connection #0 to host unblock.smartproxy.com left intact
188.6.19.54