Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 4, 2022 at 2:53:51 PM UTC
VERIFY
Anomaly
https://meduza.io/
DNS tampering
Russia
AS41733 JSC "ER-Telecom Holding"
Websites
Websites
Web Connectivity Test
Runtime:
1.6s
Share on
Facebook
or
Twitter
On March 4, 2022 at 2:53:51 PM UTC,
https://meduza.io/
presented signs of DNS tampering on AS41733 in Russia. This might mean that
https://meduza.io/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_refused
DNS Experiment
null
Control
null
DNS Queries
Resolver:
188.134.0.170
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
188.186.157.49
AS31483 (JSC "ER-Telecom Holding")
TCP Connections
188.186.157.49:443
: failed (connection_refused)
HTTP Requests
No data
Resolver
Resolver ASN
AS41733
Resolver IP
188.134.0.170
Resolver Network Name
JSC "ER-Telecom Holding"
Measurement UID
20220304145353.007646_RU_webconnectivity_f871093e4e0538c7
Report ID
20220304T123324Z_webconnectivity_RU_41733_n1_hMUoDB5yQdIYa19Q
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)
Raw Measurement Data
Download JSON
Expand All
Loading…