Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 1:05:45 PM UTC
VERIFY
Anomaly
https://meduza.io/
DNS tampering
Russia
AS52207 JSC "ER-Telecom Holding"
Websites
Websites
Web Connectivity Test
Runtime:
561ms
Share on
Facebook
or
Twitter
On March 5, 2022 at 1:05:45 PM UTC,
https://meduza.io/
presented signs of DNS tampering on AS52207 in Russia. This might mean that
https://meduza.io/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_refused
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.68.9.106
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
188.186.157.49
AS31483 (JSC "ER-Telecom Holding")
TCP Connections
188.186.157.49:443
: failed (connection_refused)
HTTP Requests
No data
Resolver
Resolver ASN
AS13335
Resolver IP
172.68.9.106
Resolver Network Name
Cloudflare, Inc.
Measurement UID
20220305130546.555726_RU_webconnectivity_f3969a7150627faf
Report ID
20220305T120459Z_webconnectivity_RU_52207_n1_AlXw32CjmNRv0WxI
Platform
linux
Software Name
ooniprobe-cli (3.13.0)
Measurement Engine
ooniprobe-engine (3.13.0)
Raw Measurement Data
Download JSON
Expand All
Loading…