Anomaly
https://meduza.io/
HTTP blocking (HTTP requests failed)
Websites
Runtime: 443ms
On March 04, 2022, 09:01 AM UTC, https://meduza.io/ presented signs of HTTP blocking (HTTP requests failed) on AS8402 in Russia.
This might mean that https://meduza.io/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
85.21.78.32
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
163.172.74.46
@
IN
A
151.115.45.47
@
IN
A
151.115.57.108
@
IN
A
151.115.47.200
@
IN
A
151.115.46.187
@
IN
A
151.115.46.250
TCP Connections
Connection to 151.115.46.250:443 succeeded.
Connection to 151.115.45.47:443 succeeded.
Connection to 151.115.46.187:443 succeeded.
Connection to 151.115.47.200:443 succeeded.
Connection to 163.172.74.46:443 succeeded.
Connection to 151.115.57.108:443 succeeded.
HTTP Requests
No Data
Resolver
Resolver ASN
AS8402
Resolver IP
85.21.78.32
Resolver Network Name
PJSC "Vimpelcom"
Report ID
20220304T085334Z_webconnectivity_RU_8402_n1_skvFLnjc2pfusdjS
Platform
macos
Software Name
ooniprobe-desktop-unattended (3.10.0-beta.3)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)