Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 4, 2022 at 11:08:48 PM UTC
VERIFY
Anomaly
https://www.currenttime.tv/
DNS tampering
Russia
AS8331 JSC "ER-Telecom Holding"
Websites
Websites
Web Connectivity Test
Runtime:
20.6s
Share on
Facebook
or
Twitter
On March 4, 2022 at 11:08:48 PM UTC,
https://www.currenttime.tv/
presented signs of DNS tampering on AS8331 in Russia. This might mean that
https://www.currenttime.tv/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
195.54.192.39
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
139.45.207.99
AS9002 (RETN Limited)
@
IN
A
139.45.207.67
AS9002 (RETN Limited)
Query:
IN AAAA www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf43
AS9002 (RETN Limited)
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf63
AS9002 (RETN Limited)
TCP Connections
2a02:2d8:3:805::8b2d:cf43:443
: failed (network_unreachable)
2a02:2d8:3:805::8b2d:cf63:443
: failed (network_unreachable)
139.45.207.67:443
: succeeded
139.45.207.99:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS8331
Resolver IP
195.54.192.39
Resolver Network Name
JSC "ER-Telecom Holding"
Measurement UID
20220304230852.173098_RU_webconnectivity_af31db4000af9b6f
Report ID
20220304T230511Z_webconnectivity_RU_8331_n1_nd0DdAq7CkGmb9px
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)
Raw Measurement Data
Download JSON
Expand All
Loading…