March 3, 2022 at 6:25:05 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 3s
Share on Facebook or Twitter
On March 3, 2022 at 6:25:05 PM UTC, https://navalny.com/ presented signs of DNS tampering on AS25513 in Russia. This might mean that https://navalny.com/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
173.194.98.9
Query:
IN A navalny.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
188.114.96.2
Unknown AS
@
IN
A
188.114.97.2
Unknown AS
Query:
IN AAAA navalny.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2a06:98c1:3120::2
Unknown AS
@
IN
AAAA
2a06:98c1:3121::2
Unknown AS

TCP Connections

2a06:98c1:3120::2:443: failed (unknown_failure: dial tcp [scrubbed]: connect: no route to host)
2a06:98c1:3121::2:443: failed (unknown_failure: dial tcp [scrubbed]: connect: no route to host)
188.114.96.2:443: succeeded
188.114.97.2:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS15169
Resolver IP
173.194.98.9
Resolver Network Name
Google LLC
Measurement UID
20220303182509.610802_RU_webconnectivity_e44ce6bf4d85bff5
Report ID
20220303T182340Z_webconnectivity_RU_25513_n1_38bdEdyUwbXIclTP
Platform
macos
Software Name
ooniprobe-desktop-unattended (3.10.0-beta.3)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading…