Anomaly
https://www.torproject.org/
DNS tampering
Russia
Country
AS56701
Network
December 10, 2021, 12:37 PM UTC
Date & Time
Websites
Runtime: 142ms
On December 10, 2021, 12:37 PM UTC, https://www.torproject.org/ presented signs of DNS tampering on AS56701 in Russia.
This might mean that https://www.torproject.org/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
ssl_invalid_hostname
DNS Experiment
null
Control
null
DNS Queries
Resolver:
193.232.93.83
Query:
IN A www.torproject.org
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
10.11.13.200
TCP Connections
Connection to 10.11.13.200:443 succeeded.
HTTP Requests
No Data
Resolver
Resolver ASN
AS43832
Resolver IP
193.232.93.83
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Report ID
20211210T123623Z_webconnectivity_RU_56701_n1_NaVebyRGsnZ9Qmv0
Platform
android
Software Name
ooniprobe-android (3.4.1)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)