Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 5:56:05 PM UTC
VERIFY
Anomaly
https://www.currenttime.tv/tv/schedule/92/
DNS tampering
Russia
AS31213 PJSC MegaFon
Websites
Websites
Web Connectivity Test
Runtime:
878ms
Share on
Facebook
or
Twitter
On March 5, 2022 at 5:56:05 PM UTC,
https://www.currenttime.tv/tv/schedule/92/
presented signs of DNS tampering on AS31213 in Russia. This might mean that
https://www.currenttime.tv/tv/schedule/92/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
eof_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
185.76.9.81
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
80.239.150.75
AS1299 (Telia Company AB)
@
IN
A
80.239.150.83
AS1299 (Telia Company AB)
TCP Connections
80.239.150.75:443
: succeeded
80.239.150.83:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS60068
Resolver IP
185.76.9.81
Resolver Network Name
Datacamp Limited
Measurement UID
20220305175607.889749_RU_webconnectivity_d20e1c2b9bbb1fc0
Report ID
20220305T174947Z_webconnectivity_RU_31213_n1_xrSZRxvwOIiuHBoI
Platform
windows
Software Name
ooniprobe-desktop-unattended (3.10.0-beta.3)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)
Raw Measurement Data
Download JSON
Expand All
Loading…