February 25, 2021 at 9:10:50 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Runtime: 232ms
On February 25, 2021 at 9:10:50 AM UTC, https://coronavirus.app/ presented signs of DNS tampering on AS63852 in Myanmar (Burma).
This might mean that https://coronavirus.app/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
connection_refused
DNS Experiment
null
Control
null
DNS Queries
Resolver:
59.153.88.210
Query:
IN A coronavirus.app
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
59.153.90.11
AS58952 (Frontiir Co., Ltd)
TCP Connections
59.153.90.11:443: failed (connection_refused)
HTTP Requests
No data
Resolver
Resolver ASN
AS58952
Resolver IP
59.153.88.210
Resolver Network Name
Frontiir Co., Ltd
Measurement UID
20210225091050.750257_MM_webconnectivity_101c4ee35ba1f731
Report ID
20210225T073541Z_webconnectivity_MM_63852_n1_mJDabcvVBS3LQMka
Platform
linux
Software Name
ooniprobe-cli (3.5.2)
Measurement Engine
ooniprobe-engine (3.5.2)