Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
August 9, 2020 at 3:30:32 PM UTC
VERIFY
Anomaly
https://www.hidemyass.com/
DNS tampering
Belarus
AS6697 Republican Unitary Telecommunication Enterprise Beltelecom
Websites
Websites
Web Connectivity Test
Runtime:
31s
Share on
Facebook
or
Twitter
On August 9, 2020 at 3:30:32 PM UTC,
https://www.hidemyass.com/
presented signs of DNS tampering on AS6697 in Belarus. This might mean that
https://www.hidemyass.com/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
127.0.0.1
Query:
IN A www.hidemyass.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
e13178.dsca.akamaiedge.net
Unknown AS
@
IN
A
23.73.247.109
Unknown AS
TCP Connections
23.73.247.109:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS20473
Resolver IP
207.246.87.132
Resolver Network Name
Choopa, LLC
Measurement UID
0120200809d5cef39d3b208aff48d5250f7bd940
Report ID
20200809T161759Z_AS6697_6I3t4ZBhLNGf53b2T9aZC2mvHgyOGT9RuYl0LoFYK3kdGI37im
Platform
windows
Software Name
ooniprobe-desktop (3.0.3)
Measurement Engine
libmeasurement_kit (0.10.11)
Raw Measurement Data
Download JSON
Expand All
Loading…