Anomaly
https://flagshtok.info/by
DNS tampering
Belarus
Country
AS25106
Network
August 24, 2020, 04:20 AM UTC
Date & Time
Websites
Runtime: 1.4s
On August 24, 2020, 04:20 AM UTC, https://flagshtok.info/by presented signs of DNS tampering on AS25106 in Belarus.
This might mean that https://flagshtok.info/by was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
response_never_received
DNS Experiment
null
Control
null
DNS Queries
Resolver:
87.252.243.96
Query:
IN A flagshtok.info
Engine:
Name
Class
TTL
Type
DATA
@
IN
TTL
A
134.17.0.7
TCP Connections
Connection to 134.17.0.7:443 succeeded.
HTTP Requests
No Data
No Data
No Data
Report ID
20200824T042043Z_AS25106_tVKVERdRJBI7JKy2F4HtcUqGnKecbZP7FoJOi0RPCS4XDEwo34
Platform
linux
Software Name
ooniprobe (2.2.0)
Measurement Engine
Unavailable