February 26, 2021 at 7:45:57 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 868ms
Share on Facebook or Twitter
On February 26, 2021 at 7:45:57 AM UTC, https://coronavirus.app/ presented signs of DNS tampering on AS136255 in Myanmar (Burma). This might mean that https://coronavirus.app/ was blocked, but false positives can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_refused
DNS Experiment
null
Control
null
DNS Queries
Resolver:
2400:ac40:300:11::2
Query:
IN A coronavirus.app
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
127.0.0.1
Unknown AS
Query:
IN AAAA coronavirus.app
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
::1
Unknown AS
TCP Connections
::1:443: failed (connection_refused)
127.0.0.1:443: failed (connection_refused)
HTTP Requests
No data
Resolver
Resolver ASN
AS136255
Resolver IP
2400:ac40:300:11::2
Resolver Network Name
Telecom International Myanmar Company Limited
Measurement UID
20210226074559.275582_MM_webconnectivity_b59463dda411df6a
Report ID
20210226T043238Z_webconnectivity_MM_136255_n1_iDvwdo8o2cNXK20J
Platform
android
Software Name
ooniprobe-android (2.9.3)
Measurement Engine
ooniprobe-engine (0.23.0)
Raw Measurement Data
Loading…