Anomaly
https://www.currenttime.tv/tv/schedule/92/
DNS tampering
Russia
Country
AS41733
Network
March 05, 2022, 12:18 AM UTC
Date & Time
Websites
Websites
Runtime: 1.5s

On March 05, 2022, 12:18 AM UTC, https://www.currenttime.tv/tv/schedule/92/ presented signs of DNS tampering on AS41733 in Russia.

This might mean that https://www.currenttime.tv/tv/schedule/92/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
188.134.0.170
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
139.45.207.99
@
IN
A
139.45.207.67
Query:
IN AAAA www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf63
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf43

TCP Connections

Connection to 2a02:2d8:3:805::8b2d:cf43:443 failed.
Connection to 2a02:2d8:3:805::8b2d:cf63:443 failed.
Connection to 139.45.207.67:443 succeeded.
Connection to 139.45.207.99:443 succeeded.

HTTP Requests

No Data

Resolver

Resolver ASN
AS41733
Resolver IP
188.134.0.170
Resolver Network Name
JSC "ER-Telecom Holding"
Report ID
20220304T233125Z_webconnectivity_RU_41733_n1_PP2WXd4D7pctx1Jn
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)

Raw Measurement Data

Loading