August 29, 2020 at 7:06:25 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 745ms
Share on Facebook or Twitter
On August 29, 2020 at 7:06:25 AM UTC, http://anonym.to/ presented signs of DNS tampering on AS31143 in Belarus. This might mean that http://anonym.to/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
208.69.33.70
Query:
IN A anonym.to
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
CNAME
anonym.to
Unknown AS
@
IN
A
146.112.61.106
Unknown AS

TCP Connections

146.112.61.106:80: succeeded

HTTP Requests

URL
GET http://anonym.to/
Response Headers
Date:
Sat, 29 Aug 2020 09:06:26 GMT
Transfer-Encoding:
chunked
Connection:
keep-alive
Content-Type:
text/html
Server:
Cisco Umbrella
Response Body
<html><head><script type="text/javascript">location.replace("https://block.opendns.com/?url=667980799078158580&ablock&server=fra16&prefs=&tagging=&nref");</script></head></html>                                                                                                                                                                                                                                                                                                                                                
Measurement UID
01202008296748c7312aa21b6b83de2e5706b36e
Report ID
20200829T090538Z_AS31143_OyBXUAivKhF35Xelbh0YgiwYDh3UBQLzAnyGLuWTwSRWlxEjvn
Platform
android
Software Name
ooniprobe-android (2.5.2)
Measurement Engine
libmeasurement_kit (0.10.12)

Raw Measurement Data

Loading…