Anomaly
https://meduza.io/
DNS tampering
Russia
Country
AS51547
Network
March 04, 2022, 04:23 PM UTC
Date & Time
Websites
Websites
Runtime: 2.3s

On March 04, 2022, 04:23 PM UTC, https://meduza.io/ presented signs of DNS tampering on AS51547 in Russia.

This might mean that https://meduza.io/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
host_unreachable
DNS Experiment
null
Control
null

DNS Queries

Resolver:
194.190.127.82
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
80.76.104.20

TCP Connections

Connection to 80.76.104.20:443 failed.

HTTP Requests

No Data

Resolver

Resolver ASN
AS42385
Resolver IP
194.190.127.82
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Report ID
20220304T162110Z_webconnectivity_RU_51547_n1_On7ebRmuv3EJRkex
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)

Raw Measurement Data

Loading