February 24, 2021 at 11:43:39 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 923ms
Share on Facebook or Twitter
On February 24, 2021 at 11:43:39 AM UTC, https://coronavirus.app/ presented signs of DNS tampering on AS63852 in Myanmar (Burma). This might mean that https://coronavirus.app/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_refused
DNS Experiment
null
Control
null

DNS Queries

Resolver:
116.206.136.161
Query:
IN A coronavirus.app
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
59.153.90.11
AS58952 (Frontiir Co., Ltd)

TCP Connections

59.153.90.11:443: failed (connection_refused)

HTTP Requests

No data

Resolver

Resolver ASN
AS58952
Resolver IP
116.206.136.161
Resolver Network Name
Frontiir Co., Ltd
Measurement UID
20210224114340.858221_MM_webconnectivity_280acba026a940ed
Report ID
20210224T060227Z_webconnectivity_MM_63852_n1_EoHjfZdQwbGfx9AB
Platform
macos
Software Name
ooniprobe-desktop (3.2.3)
Measurement Engine
ooniprobe-engine (3.5.2)

Raw Measurement Data

Loading…