Anomaly
https://www.torproject.org/
DNS tampering
Russia
Country
AS56701
Network
December 10, 2021, 12:37 PM UTC
Date & Time
Websites
Websites
Runtime: 142ms

On December 10, 2021, 12:37 PM UTC, https://www.torproject.org/ presented signs of DNS tampering on AS56701 in Russia.

This might mean that https://www.torproject.org/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
ssl_invalid_hostname
DNS Experiment
null
Control
null

DNS Queries

Resolver:
193.232.93.83
Query:
IN A www.torproject.org
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
10.11.13.200

TCP Connections

Connection to 10.11.13.200:443 succeeded.

HTTP Requests

No Data

Resolver

Resolver ASN
AS43832
Resolver IP
193.232.93.83
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Report ID
20211210T123623Z_webconnectivity_RU_56701_n1_NaVebyRGsnZ9Qmv0
Platform
android
Software Name
ooniprobe-android (3.4.1)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading