Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
December 10, 2021 at 10:55:02 AM UTC
VERIFY
Anomaly
https://www.torproject.org/
DNS tampering
Russia
AS41330 T2 Mobile LLC
Websites
Websites
Web Connectivity Test
Runtime:
781ms
Share on
Facebook
or
Twitter
On December 10, 2021 at 10:55:02 AM UTC,
https://www.torproject.org/
presented signs of DNS tampering on AS41330 in Russia. This might mean that
https://www.torproject.org/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
176.59.137.37
Query:
IN A www.torproject.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
95.213.158.61
AS49505 (OOO "Network of data-centers "Selectel")
TCP Connections
95.213.158.61:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS41330
Resolver IP
176.59.137.37
Resolver Network Name
T2 Mobile LLC
Measurement UID
20211210105503.642602_RU_webconnectivity_95d0b43f9e0c118c
Report ID
20211210T105449Z_webconnectivity_RU_41330_n1_uc2M7EBcbzxpTNaW
Platform
android
Software Name
ooniprobe-android (3.4.1)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)
Raw Measurement Data
Download JSON
Expand All
Loading…