Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 4, 2022 at 3:33:41 PM UTC
VERIFY
Anomaly
https://www.currenttime.tv/tv/schedule/92/
DNS tampering
Russia
AS12389 PJSC Rostelecom
Websites
Websites
Web Connectivity Test
Runtime:
637ms
Share on
Facebook
or
Twitter
On March 4, 2022 at 3:33:41 PM UTC,
https://www.currenttime.tv/tv/schedule/92/
presented signs of DNS tampering on AS12389 in Russia. This might mean that
https://www.currenttime.tv/tv/schedule/92/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
78.85.0.92
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
80.239.254.22
AS1299 (Telia Company AB)
@
IN
A
80.239.254.44
AS1299 (Telia Company AB)
TCP Connections
80.239.254.44:443
: succeeded
80.239.254.22:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS12389
Resolver IP
78.85.0.92
Resolver Network Name
PJSC Rostelecom
Measurement UID
20220304153342.722505_RU_webconnectivity_0240588ca81376b8
Report ID
20220304T153218Z_webconnectivity_RU_12389_n1_IIoPjsGGsCH86BRI
Platform
ios
Software Name
ooniprobe-ios (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)
Raw Measurement Data
Download JSON
Expand All
Loading…