Hi guys, I got a similar problem. Although, I use --standalone only. The server connects to my server and certbot replies properly. The result is Timeout during connect (likely firewall problem) , though.
Here is the tcpdump from my server. Hope it helps.
34.213.106.112.45538 > 95.216.177.125.80: Flags [P.], cksum 0x7c5c (correct), seq 4273540643:4273540914, ack 3099952526, win 211, options [nop,nop,TS val 4068796029 ecr 1314244930], length 271: HTTP, length: 271
GET /.well-known/acme-challenge/pTjzRh9TuLlyLwYocXfnEMMG_XHZXtG0jSbP2Qzsxsc HTTP/1.1
Host: console.prokams.com
User-Agent: Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)
Accept: */*
Accept-Encoding: gzip
Connection: close
0x0000: 4500 0143 ebc0 4000 2606 c959 22d5 6a70 E..C..@.&..Y".jp
0x0010: 5fd8 b17d b1e2 0050 feb9 0e23 b8c5 858e _..}...P...#....
0x0020: 8018 00d3 7c5c 0000 0101 080a f284 e67d ....|\.........}
0x0030: 4e55 c942 4745 5420 2f2e 7765 6c6c 2d6b NU.BGET./.well-k
0x0040: 6e6f 776e 2f61 636d 652d 6368 616c 6c65 nown/acme-challe
0x0050: 6e67 652f 7054 6a7a 5268 3954 754c 6c79 nge/pTjzRh9TuLly
0x0060: 4c77 596f 6358 666e 454d 4d47 5f58 485a LwYocXfnEMMG_XHZ
0x0070: 5874 4730 6a53 6250 3251 7a73 7873 6320 XtG0jSbP2Qzsxsc.
0x0080: 4854 5450 2f31 2e31 0d0a 486f 7374 3a20 HTTP/1.1..Host:.
0x0090: 636f 6e73 6f6c 652e 7072 6f6b 616d 732e console.prokams.
0x00a0: 636f 6d0d 0a55 7365 722d 4167 656e 743a com..User-Agent:
0x00b0: 204d 6f7a 696c 6c61 2f35 2e30 2028 636f .Mozilla/5.0.(co
0x00c0: 6d70 6174 6962 6c65 3b20 4c65 7427 7320 mpatible;.Let's.
0x00d0: 456e 6372 7970 7420 7661 6c69 6461 7469 Encrypt.validati
0x00e0: 6f6e 2073 6572 7665 723b 202b 6874 7470 on.server;.+http
0x00f0: 733a 2f2f 7777 772e 6c65 7473 656e 6372 s://www.letsencr
0x0100: 7970 742e 6f72 6729 0d0a 4163 6365 7074 ypt.org)..Accept
0x0110: 3a20 2a2f 2a0d 0a41 6363 6570 742d 456e :.*/*..Accept-En
0x0120: 636f 6469 6e67 3a20 677a 6970 0d0a 436f coding:.gzip..Co
0x0130: 6e6e 6563 7469 6f6e 3a20 636c 6f73 650d nnection:.close.
0x0140: 0a0d 0a ...
13:48:56.608060 IP (tos 0x0, ttl 63, id 19700, offset 0, flags [DF], proto TCP (6), length 52)
95.216.177.125.80 > 34.213.106.112.45538: Flags [.], cksum 0xe7f1 (correct), seq 3099952526, ack 4273540914, win 235, options [nop,nop,TS val 1314244986 ecr 4068796029], length 0
0x0000: 4500 0034 4cf4 4000 3f06 5035 5fd8 b17d E..4L.@.?.P5_..}
0x0010: 22d5 6a70 0050 b1e2 b8c5 858e feb9 0f32 ".jp.P.........2
0x0020: 8010 00eb e7f1 0000 0101 080a 4e55 c97a ............NU.z
0x0030: f284 e67d ...}
13:48:56.612100 IP (tos 0x0, ttl 63, id 19701, offset 0, flags [DF], proto TCP (6), length 231)
95.216.177.125.80 > 34.213.106.112.45538: Flags [P.], cksum 0xb864 (correct), seq 3099952526:3099952705, ack 4273540914, win 235, options [nop,nop,TS val 1314244987 ecr 4068796029], length 179: HTTP, length: 179
HTTP/1.0 200 OK
Server: BaseHTTP/0.3 Python/2.7.13
Date: Mon, 31 Dec 2018 12:48:56 GMT
pTjzRh9TuLlyLwYocXfnEMMG_XHZXtG0jSbP2Qzsxsc.05mAbe6c8pHNjCnk36P7twBKqy_qox2hiXbQO8MdPJ4[!http]
0x0000: 4500 00e7 4cf5 4000 3f06 4f81 5fd8 b17d E...L.@.?.O._..}
0x0010: 22d5 6a70 0050 b1e2 b8c5 858e feb9 0f32 ".jp.P.........2
0x0020: 8018 00eb b864 0000 0101 080a 4e55 c97b .....d......NU.{
0x0030: f284 e67d 4854 5450 2f31 2e30 2032 3030 ...}HTTP/1.0.200
0x0040: 204f 4b0d 0a53 6572 7665 723a 2042 6173 .OK..Server:.Bas
0x0050: 6548 5454 502f 302e 3320 5079 7468 6f6e eHTTP/0.3.Python
0x0060: 2f32 2e37 2e31 330d 0a44 6174 653a 204d /2.7.13..Date:.M
0x0070: 6f6e 2c20 3331 2044 6563 2032 3031 3820 on,.31.Dec.2018.
0x0080: 3132 3a34 383a 3536 2047 4d54 0d0a 0d0a 12:48:56.GMT....
0x0090: 7054 6a7a 5268 3954 754c 6c79 4c77 596f pTjzRh9TuLlyLwYo
0x00a0: 6358 666e 454d 4d47 5f58 485a 5874 4730 cXfnEMMG_XHZXtG0
0x00b0: 6a53 6250 3251 7a73 7873 632e 3035 6d41 jSbP2Qzsxsc.05mA
0x00c0: 6265 3663 3870 484e 6a43 6e6b 3336 5037 be6c8pHNjCnk36P7
0x00d0: 7477 424b 7179 5f71 6f78 3268 6958 6251 twBKqy_qox2hiXbQ
0x00e0: 4f38 4d64 504a 34 O8MdPJ4