Anomaly
https://meduza.io/
HTTP blocking (HTTP requests failed)
Russia
Country
AS42610
Network
March 04, 2022, 07:03 AM UTC
Date & Time
Websites
Websites
Runtime: 1.4s

On March 04, 2022, 07:03 AM UTC, https://meduza.io/ presented signs of HTTP blocking (HTTP requests failed) on AS42610 in Russia.

This might mean that https://meduza.io/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
77.37.251.68
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
151.115.57.108
@
IN
A
151.115.45.47
@
IN
A
151.115.47.200
@
IN
A
91.227.34.40
@
IN
A
151.115.46.187
@
IN
A
88.212.240.172
@
IN
A
163.172.74.46
@
IN
A
151.115.46.250
@
IN
A
88.212.244.68

TCP Connections

Connection to 151.115.45.47:443 succeeded.
Connection to 151.115.46.187:443 succeeded.
Connection to 151.115.46.250:443 succeeded.
Connection to 163.172.74.46:443 succeeded.
Connection to 151.115.47.200:443 succeeded.
Connection to 151.115.57.108:443 succeeded.
Connection to 88.212.244.68:443 succeeded.
Connection to 88.212.240.172:443 succeeded.
Connection to 91.227.34.40:443 succeeded.

HTTP Requests

No Data

Resolver

Resolver ASN
AS42610
Resolver IP
77.37.251.68
Resolver Network Name
PJSC Rostelecom
Report ID
20220304T070235Z_webconnectivity_RU_42610_n1_wrPJbJuZdBZVQJQO
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)

Raw Measurement Data

Loading