Anomaly
https://coronavirus.app/
DNS tampering
Myanmar
Country
AS136255
Network
February 24, 2021, 05:11 AM UTC
Date & Time
Websites
Websites
Runtime: 1.5s

On February 24, 2021, 05:11 AM UTC, https://coronavirus.app/ presented signs of DNS tampering on AS136255 in Myanmar.

This might mean that https://coronavirus.app/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
connection_refused
DNS Experiment
null
Control
null

DNS Queries

Resolver:
2400:ac40:300:d::2
Query:
IN A coronavirus.app
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
59.153.90.11

TCP Connections

Connection to 59.153.90.11:443 failed.

HTTP Requests

No Data
Report ID
20210224T051155Z_webconnectivity_MM_136255_n1_Sp4DoDRD9AYS3oNd
Platform
android
Software Name
ooniprobe-android (2.9.3)
Measurement Engine
ooniprobe-engine (0.23.0)

Raw Measurement Data

Loading