Anomaly
http://anonym.to/
DNS tampering
Belarus
Country
AS31143
Network
August 27, 2020, 06:26 PM UTC
Date & Time
Websites
Websites
Runtime: 904ms

On August 27, 2020, 06:26 PM UTC, http://anonym.to/ presented signs of DNS tampering on AS31143 in Belarus.

This might mean that http://anonym.to/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
208.69.33.92
Query:
IN A anonym.to
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
CNAME
anonym.to
@
IN
A
146.112.61.106

TCP Connections

Connection to 146.112.61.106:80 succeeded.

HTTP Requests

URL
GET http://anonym.to/
Response Headers
Date:
Thu, 27 Aug 2020 18:26:18 GMT
Transfer-Encoding:
chunked
Connection:
keep-alive
Content-Type:
text/html
Server:
Cisco Umbrella
Response Body
<html><head><script type="text/javascript">location.replace("https://block.opendns.com/?url=667980799078158580&ablock&server=fra16&prefs=&tagging=&nref");</script></head></html>                                                                                                                                                                                                                                                                                                                                                
Report ID
20200827T182604Z_AS31143_9l5AtNzwtaX5Vm7c9t99R8WZQpsJWTxXDmSqJDnTI6sQvvNOVf
Platform
android
Software Name
ooniprobe-android (2.5.2)
Measurement Engine
libmeasurement_kit (0.10.12)

Raw Measurement Data

Loading