Anomaly
https://www.currenttime.tv/tv/schedule/92/
DNS tampering
Russia
Country
AS42387
Network
March 04, 2022, 03:31 PM UTC
Date & Time
Websites
Websites
Runtime: 1.2s

On March 04, 2022, 03:31 PM UTC, https://www.currenttime.tv/tv/schedule/92/ presented signs of DNS tampering on AS42387 in Russia.

This might mean that https://www.currenttime.tv/tv/schedule/92/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
217.77.53.237
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
80.239.254.22
@
IN
A
80.239.254.44
Query:
IN AAAA www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2001:2030:0:4e::50ef:9653
@
IN
AAAA
2001:2030:0:4e::50ef:964b

TCP Connections

Connection to 2001:2030:0:4e::50ef:964b:443 failed.
Connection to 2001:2030:0:4e::50ef:9653:443 failed.
Connection to 80.239.254.44:443 succeeded.
Connection to 80.239.254.22:443 succeeded.

HTTP Requests

No Data

Resolver

Resolver ASN
AS42387
Resolver IP
217.77.53.237
Resolver Network Name
Limited Company Svyazservice
Report ID
20220304T152838Z_webconnectivity_RU_42387_n1_xLRsBKSDeYffrTSX
Platform
linux
Software Name
iThena-ooniprobe (1.0.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading