Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 12:18:26 AM UTC
VERIFY
Anomaly
https://www.currenttime.tv/tv/schedule/92/
DNS tampering
Russia
AS41733 JSC "ER-Telecom Holding"
Websites
Websites
Web Connectivity Test
Runtime:
1.4s
Share on
Facebook
or
Twitter
On March 5, 2022 at 12:18:26 AM UTC,
https://www.currenttime.tv/tv/schedule/92/
presented signs of DNS tampering on AS41733 in Russia. This might mean that
https://www.currenttime.tv/tv/schedule/92/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
188.134.0.170
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
139.45.207.99
AS9002 (RETN Limited)
@
IN
A
139.45.207.67
AS9002 (RETN Limited)
Query:
IN AAAA www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf63
AS9002 (RETN Limited)
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf43
AS9002 (RETN Limited)
TCP Connections
2a02:2d8:3:805::8b2d:cf43:443
: failed (network_unreachable)
2a02:2d8:3:805::8b2d:cf63:443
: failed (network_unreachable)
139.45.207.67:443
: succeeded
139.45.207.99:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS41733
Resolver IP
188.134.0.170
Resolver Network Name
JSC "ER-Telecom Holding"
Measurement UID
20220305001828.409548_RU_webconnectivity_61857d23c723e295
Report ID
20220304T233125Z_webconnectivity_RU_41733_n1_PP2WXd4D7pctx1Jn
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)
Raw Measurement Data
Download JSON
Expand All
Loading…