Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 5:56:49 PM UTC
VERIFY
Anomaly
https://www.currenttime.tv/
DNS tampering
Russia
AS34703 LTD Pokrovsky radiotelefon
Websites
Websites
Web Connectivity Test
Runtime:
30.2s
Share on
Facebook
or
Twitter
On March 5, 2022 at 5:56:49 PM UTC,
https://www.currenttime.tv/
presented signs of DNS tampering on AS34703 in Russia. This might mean that
https://www.currenttime.tv/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
194.226.75.83
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
78.24.40.190
AS34703 (LTD Pokrovsky radiotelefon)
TCP Connections
78.24.40.190:443
: failed (generic_timeout_error)
HTTP Requests
No data
Resolver
Resolver ASN
AS43832
Resolver IP
194.226.75.83
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Measurement UID
20220305175651.057673_RU_webconnectivity_4c7340b5d97070e6
Report ID
20220305T175433Z_webconnectivity_RU_34703_n1_oivPsrWyoQt15P03
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)
Raw Measurement Data
Download JSON
Expand All
Loading…