Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
May 20, 2020 at 8:30:32 AM UTC
VERIFY
Anomaly
https://www.linkedin.com/
DNS tampering
Burundi
AS37336
Websites
Websites
Web Connectivity Test
Runtime:
1.5s
Share on
Facebook
or
Twitter
On May 20, 2020 at 8:30:32 AM UTC,
https://www.linkedin.com/
presented signs of DNS tampering on AS37336 in Burundi. This might mean that
https://www.linkedin.com/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.253.11.3
Query:
IN A www.linkedin.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
l-0005.l-msedge.net
Unknown AS
@
IN
A
13.107.42.14
Unknown AS
TCP Connections
13.107.42.14:443
: succeeded
HTTP Requests
No data
Measurement UID
012020052051ea1cd6cbbb0f27158476c3017fb9
Report ID
20200520T103026Z_AS37336_nRxZhHSn9J1EcTcE26Iwv6RQ4TXdcIPA7XpXAEKexgb92iiCRI
Platform
android
Software Name
ooniprobe-android (2.3.2)
Measurement Engine
libmeasurement_kit (0.10.11)
Raw Measurement Data
Download JSON
Expand All
Loading…