Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 6:30:31 PM UTC
VERIFY
Anomaly
https://ru.krymr.com/radio/schedule/103/
DNS tampering
Russia
AS42387 Limited Company Svyazservice
Websites
Websites
Web Connectivity Test
Runtime:
219ms
Share on
Facebook
or
Twitter
On March 5, 2022 at 6:30:31 PM UTC,
https://ru.krymr.com/radio/schedule/103/
presented signs of DNS tampering on AS42387 in Russia. This might mean that
https://ru.krymr.com/radio/schedule/103/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
217.77.53.237
Query:
IN A ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
23.53.55.87
AS1299 (Telia Company AB)
Query:
IN AAAA ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001:2030:21:183::3e9
AS1299 (Telia Company AB)
@
IN
AAAA
2001:2030:21:1a7::3e9
AS1299 (Telia Company AB)
TCP Connections
2001:2030:21:183::3e9:443
: failed (unknown_failure: dial tcp [scrubbed]: socket: address family not supported by protocol)
2001:2030:21:1a7::3e9:443
: failed (unknown_failure: dial tcp [scrubbed]: socket: address family not supported by protocol)
23.53.55.87:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS42387
Resolver IP
217.77.53.237
Resolver Network Name
Limited Company Svyazservice
Measurement UID
20220305183032.733588_RU_webconnectivity_eb37d231568bbda2
Report ID
20220305T182728Z_webconnectivity_RU_42387_n1_Yr04DMl3hViKNVut
Platform
linux
Software Name
iThena-ooniprobe (1.0.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)
Raw Measurement Data
Download JSON
Expand All
Loading…