Findings
Censorship
Countries
Charts
Search
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
November 29, 2023 at 4:11:47 AM UTC
VERIFY
Anomaly
https://p16-sign-sg.tiktokcdn.com/robots.txt
DNS tampering
Nepal
AS38565 Ncell Pty. Ltd.
Share on
Facebook
or
Twitter
Websites
Websites
Web Connectivity Test
Runtime:
893ms
On November 29, 2023 at 4:11:47 AM UTC,
https://p16-sign-sg.tiktokcdn.com/robots.txt
presented signs of DNS tampering on AS38565 in Nepal. This might mean that
https://p16-sign-sg.tiktokcdn.com/robots.txt
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_refused
DNS Experiment
null
Control
null
DNS Queries
Resolver:
116.68.213.156
Query:
IN A p16-sign-sg.tiktokcdn.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
52.16.240.96
AS16509 (Amazon.com, Inc.)
TCP Connections
52.16.240.96:443
: failed (connection_refused)
HTTP Requests
No data
Resolver
Resolver ASN
AS38565
Resolver IP
116.68.213.156
Resolver Network Name
Ncell Pty. Ltd.
Measurement UID
20231129041147.379062_NP_webconnectivity_9631e4569c8252c1
Report ID
20231129T041109Z_webconnectivity_NP_38565_n1_c5FLTiyMpE0zNeSw
Platform
android
Software Name
ooniprobe-android (3.8.4)
Measurement Engine
ooniprobe-engine (3.19.0)
Raw Measurement Data
Download JSON
Expand All
Loading…