Anomaly
https://tutanota.com
DNS tampering
Belarus
Country
AS43232
Network
August 23, 2020, 10:57 AM UTC
Date & Time
Websites
Websites
Runtime: 882ms

On August 23, 2020, 10:57 AM UTC, https://tutanota.com presented signs of DNS tampering on AS43232 in Belarus. This might mean that https://tutanota.com was blocked, but [false positives](https://ooni.org/support/faq/#why-do-false-positives-occur) can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
ssl_error: error:14007086:SSL routines:CONNECT_CR_CERT:certificate verify failed
DNS Experiment
null
Control
null

DNS Queries

Resolver:
172.253.197.5
Query:
IN A tutanota.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
CNAME
tutanota.com
@
IN
A
185.123.187.8

TCP Connections

Connection to 185.123.187.8:443 succeeded.

HTTP Requests

No Data

Report ID

20200823T105730Z_AS43232_82og8NTq9oDzlUVtHyhMQ5rYgrVkgPOw06A2GLo1y1RzUBcFQC

Platform

android

Software Name

ooniprobe-android (2.5.2)

Measurement Engine

libmeasurement_kit (0.10.12)

Raw Measurement Data