March 5, 2022 at 7:38:50 AM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 562ms
Share on Facebook or Twitter
On March 5, 2022 at 7:38:50 AM UTC, https://meduza.io/ presented signs of DNS tampering on AS41733 in Russia. This might mean that https://meduza.io/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_refused
DNS Experiment
null
Control
null

DNS Queries

Resolver:
195.10.195.195
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
188.186.157.49
AS31483 (JSC "ER-Telecom Holding")

TCP Connections

188.186.157.49:443: failed (connection_refused)

HTTP Requests

No data

Resolver

Resolver ASN
AS34549
Resolver IP
195.10.195.195
Resolver Network Name
meerfarbig GmbH & Co. KG
Measurement UID
20220305073852.090513_RU_webconnectivity_5337df14d593f363
Report ID
20220305T073606Z_webconnectivity_RU_41733_n1_Hxv420UkswYHcmuz
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)

Raw Measurement Data

Loading…