Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
May 20, 2020 at 9:57:25 AM UTC
VERIFY
Anomaly
https://www.linkedin.com/
DNS tampering
Burundi
AS37336
Websites
Websites
Web Connectivity Test
Runtime:
32.1s
Share on
Facebook
or
Twitter
On May 20, 2020 at 9:57:25 AM UTC,
https://www.linkedin.com/
presented signs of DNS tampering on AS37336 in Burundi. This might mean that
https://www.linkedin.com/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.253.14.1
Query:
IN A www.linkedin.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
pop-tln1-alpha.www.linkedin.com
Unknown AS
@
IN
A
185.63.144.1
Unknown AS
TCP Connections
185.63.144.1:443
: succeeded
HTTP Requests
No data
Measurement UID
012020052022e6401f34363343e510f3b1a1e850
Report ID
20200520T115719Z_AS37336_P8aFTs1VnLRc3LZiWwKhH0m5rvU3u132CcimHbOVZAneAAf9rp
Platform
android
Software Name
ooniprobe-android (2.3.2)
Measurement Engine
libmeasurement_kit (0.10.11)
Raw Measurement Data
Download JSON
Expand All
Loading…