September 19, 2021 at 11:27:15 AM UTC
VERIFY
Anomaly
Websites
Websites
Runtime: 1s
Share on Facebook or Twitter
On September 19, 2021 at 11:27:15 AM UTC, https://www.rfa.org/uyghur/ presented signs of DNS tampering on AS4837 in China. This might mean that https://www.rfa.org/uyghur/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
127.0.0.2
Query:
IN A www.rfa.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
23.13.187.143
AS20940 (Akamai International B.V.)
Query:
IN AAAA www.rfa.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001::adfc:5985
AS6939 (Hurricane Electric LLC)

TCP Connections

2001::adfc:5985:443: failed (unknown_failure: dial tcp [scrubbed]: connect: network is unreachable)
23.13.187.143:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS0
Resolver IP
127.0.0.2
Resolver Network Name
Measurement UID
20210919112717.570156_CN_webconnectivity_c721f2e8949d4a1c
Report ID
20210919T112637Z_webconnectivity_CN_4837_n1_XvOxQzdJUBdsVipN
Platform
android
Software Name
ooniprobe-android (3.2.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading…