Anomaly
http://anonym.to/
DNS tampering
Belarus
Country
AS31143
Network
August 29, 2020, 09:05 AM UTC
Date & Time
Websites
Websites
Runtime: 745ms

On August 29, 2020, 09:05 AM UTC, http://anonym.to/ presented signs of DNS tampering on AS31143 in Belarus.

This might mean that http://anonym.to/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
208.69.33.70
Query:
IN A anonym.to
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
CNAME
anonym.to
@
IN
A
146.112.61.106

TCP Connections

Connection to 146.112.61.106:80 succeeded.

HTTP Requests

URL
GET http://anonym.to/
Response Headers
Date:
Sat, 29 Aug 2020 09:06:26 GMT
Transfer-Encoding:
chunked
Connection:
keep-alive
Content-Type:
text/html
Server:
Cisco Umbrella
Response Body
<html><head><script type="text/javascript">location.replace("https://block.opendns.com/?url=667980799078158580&ablock&server=fra16&prefs=&tagging=&nref");</script></head></html>                                                                                                                                                                                                                                                                                                                                                
Report ID
20200829T090538Z_AS31143_OyBXUAivKhF35Xelbh0YgiwYDh3UBQLzAnyGLuWTwSRWlxEjvn
Platform
android
Software Name
ooniprobe-android (2.5.2)
Measurement Engine
libmeasurement_kit (0.10.12)

Raw Measurement Data

Loading