Quote: "Can you use wireshark and verify the outgoing connection is correct (and is actually being sent)?"
It is - the request seem to stop at AMAZO-ZFRA (35.156.75.109) Which I am guessing is the Amazon datacenter in Frankfurt - where my server resides.
from start to finish:
5 2.058741 192.168.1.101 35.156.75.109 TCP 66 49852 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM=1
!!6 2.104229 35.156.75.109 192.168.1.101 TCP 60 80 → 49852 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
7 2.183341 192.168.1.144 239.255.255.250 SSDP 318 NOTIFY * HTTP/1.1
*8 2.604402 192.168.1.101 35.156.75.109 TCP 66 [TCP Spurious Retransmission] 49852 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM=1
!9 2.650067 35.156.75.109 192.168.1.101 TCP 60 80 → 49852 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
*10 3.150449 192.168.1.101 35.156.75.109 TCP 66 [TCP Spurious Retransmission] 49852 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM=1
!!11 3.196146 35.156.75.109 192.168.1.101 TCP 60 80 → 49852 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
12 3.548142 Cisco_f2:51:3d Spanning-tree-(for-bridges)_00 STP 60 Conf. Root = 32768/0/00:a2:ee:f2:51:3c Cost = 0 Port = 0x8001
13 5.548219 Cisco_f2:51:3d Spanning-tree-(for-bridges)_00 STP 60 Conf. Root = 32768/0/00:a2:ee:f2:51:3c Cost = 0 Port = 0x8001
14 7.172199 192.168.1.144 239.255.255.250 SSDP 318 NOTIFY * HTTP/1.1
15 7.195934 192.168.1.101 35.156.75.109 TCP 66 49853 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM=1
!!16 7.241492 35.156.75.109 192.168.1.101 TCP 60 80 → 49853 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
17 7.548259 Cisco_f2:51:3d Spanning-tree-(for-bridges)_00 STP 60 Conf. Root = 32768/0/00:a2:ee:f2:51:3c Cost = 0 Port = 0x8001
*18 7.741722 192.168.1.101 35.156.75.109 TCP 66 [TCP Spurious Retransmission] 49853 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM=1
!!19 7.787291 35.156.75.109 192.168.1.101 TCP 60 80 → 49853 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
20 7.826769 192.168.1.101 54.192.130.51 TCP 55 49744 → 80 [ACK] Seq=1 Ack=1 Win=254 Len=1
21 7.869889 54.192.130.51 192.168.1.101 TCP 66 80 → 49744 [ACK] Seq=1 Ack=2 Win=156 Len=0 SLE=1 SRE=2
*22 8.288660 192.168.1.101 35.156.75.109 TCP 66 [TCP Spurious Retransmission] 49853 → 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM=1
23 8.334422 35.156.75.109 192.168.1.101 TCP 60 80 → 49853 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
!! = line in red
* = line in black
So something is going out where it should - and getting back, but the AGK2 app on windows won't pick it up. Unlike if the app is compiled and running on linux, mac or android.