Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
December 10, 2021 at 12:37:13 PM UTC
VERIFY
Anomaly
https://www.torproject.org/
DNS tampering
Russia
AS56701 AVANTA TELECOM ltd.
Websites
Websites
Web Connectivity Test
Runtime:
141ms
Share on
Facebook
or
Twitter
On December 10, 2021 at 12:37:13 PM UTC,
https://www.torproject.org/
presented signs of DNS tampering on AS56701 in Russia. This might mean that
https://www.torproject.org/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
ssl_invalid_hostname
DNS Experiment
null
Control
null
DNS Queries
Resolver:
193.232.93.83
Query:
IN A www.torproject.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
10.11.13.200
Unknown AS
TCP Connections
10.11.13.200:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS43832
Resolver IP
193.232.93.83
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Measurement UID
20211210123712.928719_RU_webconnectivity_aa71fdd29d7e46d1
Report ID
20211210T123623Z_webconnectivity_RU_56701_n1_NaVebyRGsnZ9Qmv0
Platform
android
Software Name
ooniprobe-android (3.4.1)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)
Raw Measurement Data
Download JSON
Expand All
Loading…