March 3, 2022 at 10:59:50 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 1.6s
Share on Facebook or Twitter
On March 3, 2022 at 10:59:50 PM UTC, https://navalny.com/ presented signs of DNS tampering on AS42387 in Russia. This might mean that https://navalny.com/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
217.77.53.237
Query:
IN A navalny.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
104.21.27.178
AS13335 (Cloudflare, Inc.)
@
IN
A
172.67.143.107
AS13335 (Cloudflare, Inc.)
Query:
IN AAAA navalny.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2606:4700:3036::ac43:8f6b
AS13335 (Cloudflare, Inc.)
@
IN
AAAA
2606:4700:3035::6815:1bb2
AS13335 (Cloudflare, Inc.)

TCP Connections

2606:4700:3035::6815:1bb2:443: failed (unknown_failure: dial tcp [scrubbed]: socket: address family not supported by protocol)
2606:4700:3036::ac43:8f6b:443: failed (unknown_failure: dial tcp [scrubbed]: socket: address family not supported by protocol)
104.21.27.178:443: succeeded
172.67.143.107:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS42387
Resolver IP
217.77.53.237
Resolver Network Name
Limited Company Svyazservice
Measurement UID
20220303225953.115197_RU_webconnectivity_2e6c8b3ee0111195
Report ID
20220303T225518Z_webconnectivity_RU_42387_n1_MkSZoetstbYm3WoM
Platform
linux
Software Name
iThena-ooniprobe (1.0.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading…