Anomaly
http://www.blizzard.com/
DNS tampering
United States
Country
AS16552
Network
July 31, 2020, 01:23 AM UTC
Date & Time
Websites
Websites
Web Connectivity Test
Runtime: 2.2s

On July 31, 2020, 01:23 AM UTC, http://www.blizzard.com/ presented signs of DNS tampering on AS16552 in United States. This might mean that http://www.blizzard.com/ was blocked, but [false positives](https://ooni.org/support/faq/#why-do-false-positives-occur) can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
unknown_failure 'ascii' codec can't decode byte 0xc2 in position 77661: ordinal not in range(128)
DNS Experiment
null
Control
null

DNS Queries

Resolver:
187.123.92.122
Query:
IN A www.blizzard.com
Engine:
Name
Class
TTL
Type
DATA
@
IN
TTL
A
52.203.60.146
@
IN
TTL
A
3.94.60.120
@
IN
TTL
A
34.230.156.143
@
IN
TTL
A
52.205.224.69
@
IN
TTL
A
52.200.46.166
@
IN
TTL
A
3.210.188.104
@
IN
TTL
A
52.55.74.241
@
IN
TTL
A
3.85.149.71

TCP Connections

Connection to 34.230.156.143:80 succeeded.
Connection to 3.94.60.120:80 succeeded.
Connection to 52.203.60.146:80 succeeded.
Connection to 52.200.46.166:80 succeeded.
Connection to 3.210.188.104:80 succeeded.
Connection to 52.55.74.241:80 succeeded.
Connection to 52.205.224.69:80 succeeded.
Connection to 3.85.149.71:80 succeeded.

HTTP Requests

Report ID

20200731T120123Z_AS16552_N9iFo6jrBkOmU1dmH03JSSrUiLwOqOGRD2P22AhXXrNVGa8xC7

Platform

linux

OONI Probe version

2.2.0

Measurement Kit version

none

Raw Measurement Data