Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 4:36:58 AM UTC
VERIFY
Anomaly
https://meduza.io/
DNS tampering
Russia
AS8427
Websites
Websites
Web Connectivity Test
Runtime:
19.6s
Share on
Facebook
or
Twitter
On March 5, 2022 at 4:36:58 AM UTC,
https://meduza.io/
presented signs of DNS tampering on AS8427 in Russia. This might mean that
https://meduza.io/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
188.43.239.130
Query:
IN A meduza.io
Engine:
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
TTL
CNAME
fz139.ttk.ru
Unknown AS
@
IN
TTL
A
188.43.20.67
Unknown AS
TCP Connections
fz139.ttk.ru:443
: failed (generic_timeout_error)
188.43.20.67:443
: failed (generic_timeout_error)
HTTP Requests
No data
No data
No data
Measurement UID
20220305043901.527504_RU_webconnectivity_29d5eda065871436
Report ID
20220305T035626Z_webconnectivity_RU_8427_n1_6zMQbsKYAsOva4L7
Platform
linux
Software Name
ooniprobe (2.1.0)
Measurement Engine
Unavailable
Raw Measurement Data
Download JSON
Expand All
Loading…