Anomaly
https://login.live.com/
DNS tampering
United States
Country
AS16552
Network
July 31, 2020, 01:23 AM UTC
Date & Time
Websites
Websites
Web Connectivity Test
Runtime: 4.4s

On July 31, 2020, 01:23 AM UTC, https://login.live.com/ presented signs of DNS tampering on AS16552 in United States. This might mean that https://login.live.com/ was blocked, but [false positives](https://ooni.org/support/faq/#why-do-false-positives-occur) can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
unknown_failure 'ascii' codec can't decode byte 0xc3 in position 15841: ordinal not in range(128)
DNS Experiment
null
Control
null

DNS Queries

Resolver:
187.123.92.122
Query:
IN A login.live.com
Engine:
Name
Class
TTL
Type
DATA
@
IN
TTL
CNAME
login.msa.msidentity.com
@
IN
TTL
CNAME
www.tm.lg.prod.aadmsa.trafficmanager.net
@
IN
TTL
CNAME
blu-main-ips.b.lg.prod.aadmsa.trafficmanager.net
@
IN
TTL
A
40.90.137.120
@
IN
TTL
A
40.90.137.127
@
IN
TTL
A
40.90.23.247
@
IN
TTL
A
40.90.137.126
@
IN
TTL
A
40.90.23.154
@
IN
TTL
A
40.90.137.124
@
IN
TTL
A
40.90.23.206
@
IN
TTL
A
40.90.23.153

TCP Connections

Connection to 40.90.137.124:443 succeeded.
Connection to 40.90.137.126:443 succeeded.
Connection to 40.90.137.120:443 succeeded.
Connection to 40.90.23.206:443 succeeded.
Connection to 40.90.137.127:443 succeeded.
Connection to 40.90.23.247:443 succeeded.
Connection to 40.90.23.154:443 succeeded.
Connection to 40.90.23.153:443 succeeded.

HTTP Requests

Report ID

20200731T012306Z_AS16552_L6dN1Htd1454hJCwq60wHf3aTAtri6vYObbEkJCpekdyNpl0Gf

Platform

linux

OONI Probe version

2.2.0

Measurement Kit version

none

Raw Measurement Data