Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 12:58:34 PM UTC
VERIFY
Anomaly
https://meduza.io/
DNS tampering
Russia
AS51547 LLC "Telekonika"
Websites
Websites
Web Connectivity Test
Runtime:
33.3s
Share on
Facebook
or
Twitter
On March 5, 2022 at 12:58:34 PM UTC,
https://meduza.io/
presented signs of DNS tampering on AS51547 in Russia. This might mean that
https://meduza.io/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
194.190.127.82
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
80.76.104.20
AS51547 (LLC "Telekonika")
TCP Connections
80.76.104.20:443
: failed (generic_timeout_error)
HTTP Requests
No data
Resolver
Resolver ASN
AS42385
Resolver IP
194.190.127.82
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Measurement UID
20220305125910.438917_RU_webconnectivity_3e054ccf467b8550
Report ID
20220305T124938Z_webconnectivity_RU_51547_n1_Dt81YkysiPEZGVjl
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)
Raw Measurement Data
Download JSON
Expand All
Loading…