March 4, 2022 at 4:23:45 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 2.3s
Share on Facebook or Twitter
On March 4, 2022 at 4:23:45 PM UTC, https://meduza.io/ presented signs of DNS tampering on AS51547 in Russia. This might mean that https://meduza.io/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
host_unreachable
DNS Experiment
null
Control
null

DNS Queries

Resolver:
194.190.127.82
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
80.76.104.20
AS51547 (LLC "Telekonika")

TCP Connections

80.76.104.20:443: failed (host_unreachable)

HTTP Requests

No data

Resolver

Resolver ASN
AS42385
Resolver IP
194.190.127.82
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Measurement UID
20220304162350.796482_RU_webconnectivity_780ed90665f26fd1
Report ID
20220304T162110Z_webconnectivity_RU_51547_n1_On7ebRmuv3EJRkex
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)

Raw Measurement Data

Loading…