February 27, 2022 at 7:16:37 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 623ms
Share on Facebook or Twitter
On February 27, 2022 at 7:16:37 PM UTC, https://ru.krymr.com/ presented signs of DNS tampering on AS20632 in Russia. This might mean that https://ru.krymr.com/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
217.195.66.253
Query:
IN A ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
23.52.84.204
AS20940 (Akamai International B.V.)
Query:
IN AAAA ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001:2030:15:1a9::3e9
AS1299 (Telia Company AB)
@
IN
AAAA
2001:2030:15:189::3e9
AS1299 (Telia Company AB)

TCP Connections

2001:2030:15:189::3e9:443: failed (unknown_failure: dial tcp [scrubbed]: connect: no route to host)
2001:2030:15:1a9::3e9:443: failed (unknown_failure: dial tcp [scrubbed]: connect: no route to host)
23.52.84.204:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS20632
Resolver IP
217.195.66.253
Resolver Network Name
PJSC MegaFon
Measurement UID
20220227191639.117992_RU_webconnectivity_0e09ffe5691cb181
Report ID
20220227T181317Z_webconnectivity_RU_20632_n1_MnMceu8ZNJIv7rdJ
Platform
macos
Software Name
ooniprobe-desktop-unattended (3.10.0-beta.3)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading…