March 5, 2022 at 4:36:58 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 19.6s
Share on Facebook or Twitter
On March 5, 2022 at 4:36:58 AM UTC, https://meduza.io/ presented signs of DNS tampering on AS8427 in Russia. This might mean that https://meduza.io/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null

DNS Queries

Resolver:
188.43.239.130
Query:
IN A meduza.io
Engine:
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
TTL
CNAME
fz139.ttk.ru
Unknown AS
@
IN
TTL
A
188.43.20.67
Unknown AS

TCP Connections

fz139.ttk.ru:443: failed (generic_timeout_error)
188.43.20.67:443: failed (generic_timeout_error)

HTTP Requests

No data
No data
No data
Measurement UID
20220305043901.527504_RU_webconnectivity_29d5eda065871436
Report ID
20220305T035626Z_webconnectivity_RU_8427_n1_6zMQbsKYAsOva4L7
Platform
linux
Software Name
ooniprobe (2.1.0)
Measurement Engine
Unavailable

Raw Measurement Data

Loading…