Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
February 27, 2022 at 12:38:34 PM UTC
VERIFY
Anomaly
https://www.currenttime.tv/
DNS tampering
Russia
AS12389 PJSC Rostelecom
Websites
Websites
Web Connectivity Test
Runtime:
993ms
Share on
Facebook
or
Twitter
On February 27, 2022 at 12:38:34 PM UTC,
https://www.currenttime.tv/
presented signs of DNS tampering on AS12389 in Russia. This might mean that
https://www.currenttime.tv/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
74.125.114.132
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
62.115.252.9
AS1299 (Telia Company AB)
@
IN
A
62.115.252.57
AS1299 (Telia Company AB)
@
IN
A
62.115.252.49
AS1299 (Telia Company AB)
@
IN
A
80.239.137.162
AS1299 (Telia Company AB)
@
IN
A
62.115.252.40
AS1299 (Telia Company AB)
TCP Connections
62.115.252.57:443
: succeeded
62.115.252.49:443
: succeeded
62.115.252.40:443
: succeeded
80.239.137.162:443
: succeeded
62.115.252.9:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS15169
Resolver IP
74.125.114.132
Resolver Network Name
Google LLC
Measurement UID
20220227203317.221587_RU_webconnectivity_67525ed46e03c67f
Report ID
20220227T203009Z_webconnectivity_RU_12389_n1_Unoomyzork54qI6N
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)
Raw Measurement Data
Download JSON
Expand All
Loading…