Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
May 20, 2020 at 8:32:17 AM UTC
VERIFY
Anomaly
https://www.pinterest.com/
DNS tampering
Burundi
AS37336
Websites
Websites
Web Connectivity Test
Runtime:
1.8s
Share on
Facebook
or
Twitter
On May 20, 2020 at 8:32:17 AM UTC,
https://www.pinterest.com/
presented signs of DNS tampering on AS37336 in Burundi. This might mean that
https://www.pinterest.com/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.253.11.3
Query:
IN A www.pinterest.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
prod.pinterest.global.map.fastly.net
Unknown AS
@
IN
A
151.101.0.84
Unknown AS
@
IN
A
151.101.64.84
Unknown AS
@
IN
A
151.101.128.84
Unknown AS
@
IN
A
151.101.192.84
Unknown AS
TCP Connections
151.101.64.84:443
: succeeded
151.101.128.84:443
: succeeded
151.101.0.84:443
: succeeded
151.101.192.84:443
: succeeded
HTTP Requests
No data
Measurement UID
0120200520db56f304d9426e5e9f61d70aa89953
Report ID
20200520T103026Z_AS37336_nRxZhHSn9J1EcTcE26Iwv6RQ4TXdcIPA7XpXAEKexgb92iiCRI
Platform
android
Software Name
ooniprobe-android (2.3.2)
Measurement Engine
libmeasurement_kit (0.10.11)
Raw Measurement Data
Download JSON
Expand All
Loading…