Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
September 19, 2021 at 11:27:15 AM UTC
VERIFY
Anomaly
https://www.rfa.org/uyghur/
DNS tampering
China
AS4837 <unknown>
Websites
Websites
Web Connectivity Test
Runtime:
1s
Share on
Facebook
or
Twitter
On September 19, 2021 at 11:27:15 AM UTC,
https://www.rfa.org/uyghur/
presented signs of DNS tampering on AS4837 in China. This might mean that
https://www.rfa.org/uyghur/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
127.0.0.2
Query:
IN A www.rfa.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
23.13.187.143
AS20940 (Akamai International B.V.)
Query:
IN AAAA www.rfa.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001::adfc:5985
AS6939 (Hurricane Electric LLC)
TCP Connections
2001::adfc:5985:443
: failed (unknown_failure: dial tcp [scrubbed]: connect: network is unreachable)
23.13.187.143:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS0
Resolver IP
127.0.0.2
Resolver Network Name
Measurement UID
20210919112717.570156_CN_webconnectivity_c721f2e8949d4a1c
Report ID
20210919T112637Z_webconnectivity_CN_4837_n1_XvOxQzdJUBdsVipN
Platform
android
Software Name
ooniprobe-android (3.2.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)
Raw Measurement Data
Download JSON
Expand All
Loading…