August 23, 2020 at 8:58:26 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 1s
Share on Facebook or Twitter
On August 23, 2020 at 8:58:26 AM UTC, https://cock.li presented signs of DNS tampering on AS43232 in Belarus. This might mean that https://cock.li was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
ssl_error: error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed
DNS Experiment
null
Control
null

DNS Queries

Resolver:
172.253.197.5
Query:
IN A cock.li
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
cock.li
Unknown AS
@
IN
A
185.123.187.8
Unknown AS

TCP Connections

185.123.187.8:443: succeeded

HTTP Requests

No data
Measurement UID
0120200823720426f8d5600d59e3cb7cd5341e8f
Report ID
20200823T105730Z_AS43232_82og8NTq9oDzlUVtHyhMQ5rYgrVkgPOw06A2GLo1y1RzUBcFQC
Platform
android
Software Name
ooniprobe-android (2.5.2)
Measurement Engine
libmeasurement_kit (0.10.12)

Raw Measurement Data

Loading…