September 19, 2021 at 11:30:59 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 31.1s
Share on Facebook or Twitter
On September 19, 2021 at 11:30:59 AM UTC, https://rsf.org/ presented signs of DNS tampering on AS4837 in China. This might mean that https://rsf.org/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null

DNS Queries

Resolver:
127.0.0.2
Query:
IN A rsf.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
104.244.43.182
AS54113 (Fastly)
Query:
IN AAAA rsf.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001::1f0d:5731
AS6939 (Hurricane Electric LLC)

TCP Connections

2001::1f0d:5731:443: failed (unknown_failure: dial tcp [scrubbed]: connect: network is unreachable)
104.244.43.182:443: failed (generic_timeout_error)

HTTP Requests

No data

Resolver

Resolver ASN
AS0
Resolver IP
127.0.0.2
Resolver Network Name
Measurement UID
20210919113131.566355_CN_webconnectivity_bd3dd8249c06f579
Report ID
20210919T112637Z_webconnectivity_CN_4837_n1_XvOxQzdJUBdsVipN
Platform
android
Software Name
ooniprobe-android (3.2.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading…