Anomaly
https://www.currenttime.tv/
DNS tampering
Russia
Country
AS42387
Network
March 05, 2022, 03:20 PM UTC
Date & Time
Websites
Websites
Runtime: 413ms

On March 05, 2022, 03:20 PM UTC, https://www.currenttime.tv/ presented signs of DNS tampering on AS42387 in Russia.

This might mean that https://www.currenttime.tv/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
217.77.53.237
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
95.101.133.40
@
IN
A
95.101.133.17
Query:
IN AAAA www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2001:2030:0:4e::50ef:9653
@
IN
AAAA
2001:2030:0:4e::50ef:964b

TCP Connections

Connection to 2001:2030:0:4e::50ef:9653:443 failed.
Connection to 2001:2030:0:4e::50ef:964b:443 failed.
Connection to 95.101.133.17:443 succeeded.
Connection to 95.101.133.40:443 succeeded.

HTTP Requests

No Data

Resolver

Resolver ASN
AS42387
Resolver IP
217.77.53.237
Resolver Network Name
Limited Company Svyazservice
Report ID
20220305T152037Z_webconnectivity_RU_42387_n1_ZX3rfOjwwrUDZO72
Platform
linux
Software Name
iThena-ooniprobe (1.0.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading