February 25, 2021 at 5:20:41 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 30.3s
Share on Facebook or Twitter
On February 25, 2021 at 5:20:41 AM UTC, https://coronavirus.app/ presented signs of DNS tampering on AS138168 in Myanmar (Burma). This might mean that https://coronavirus.app/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null

DNS Queries

Resolver:
74.125.190.27
Query:
IN A coronavirus.app
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
172.31.31.2
Unknown AS

TCP Connections

172.31.31.2:443: failed (generic_timeout_error)

HTTP Requests

No data

Resolver

Resolver ASN
AS15169
Resolver IP
74.125.190.27
Resolver Network Name
Google LLC
Measurement UID
20210225052111.642648_MM_webconnectivity_4680f0f85f238d1e
Report ID
20210225T031320Z_webconnectivity_MM_138168_n1_sUUA3tB3xBmLBd0E
Platform
windows
Software Name
ooniprobe-desktop (3.2.3)
Measurement Engine
ooniprobe-engine (3.5.2)

Raw Measurement Data

Loading…