Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 4, 2022 at 9:37:40 PM UTC
VERIFY
Anomaly
https://www.currenttime.tv/
DNS tampering
Russia
AS42610 PJSC Rostelecom
Websites
Websites
Web Connectivity Test
Runtime:
1.3s
Share on
Facebook
or
Twitter
On March 4, 2022 at 9:37:40 PM UTC,
https://www.currenttime.tv/
presented signs of DNS tampering on AS42610 in Russia. This might mean that
https://www.currenttime.tv/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
127.0.0.1
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
e36975.dsca.akamaiedge.net
Unknown AS
@
IN
A
104.104.52.16
Unknown AS
@
IN
CNAME
e36975.dsca.akamaiedge.net
Unknown AS
@
IN
A
104.104.52.19
Unknown AS
TCP Connections
104.104.52.19:443
: succeeded
104.104.52.16:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS31898
Resolver IP
140.204.16.46
Resolver Network Name
Oracle Corporation
Measurement UID
20220304213743.239224_RU_webconnectivity_485c46f498fbf066
Report ID
20220304T213547Z_webconnectivity_RU_42610_n1_zDetQnHIZaz9iP98
Platform
linux
Software Name
ooniprobe-cli (3.0.3)
Measurement Engine
libmeasurement_kit (0.10.11)
Raw Measurement Data
Download JSON
Expand All
Loading…