Anomaly
https://www.currenttime.tv/tv/schedule/92/
DNS tampering
Russia
Country
Network
March 05, 2022, 07:50 PM UTC
Date & Time
Websites
Websites
Runtime: 1.3s

On March 05, 2022, 07:50 PM UTC, https://www.currenttime.tv/tv/schedule/92/ presented signs of DNS tampering on AS12389 in Russia.

This might mean that https://www.currenttime.tv/tv/schedule/92/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
83.239.129.4
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
80.239.254.22
@
IN
A
80.239.254.44
Query:
IN AAAA www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2001:2030:21::50ef:89a2
@
IN
AAAA
2001:2030:21::3e73:fc39

TCP Connections

Connection to 2001:2030:21::50ef:89a2:443 failed.
Connection to 2001:2030:21::3e73:fc39:443 failed.
Connection to 80.239.254.22:443 succeeded.
Connection to 80.239.254.44:443 succeeded.

HTTP Requests

No Data

Resolver

Resolver ASN
AS33934
Resolver IP
83.239.129.4
Resolver Network Name
PJSC Rostelecom
Report ID
20220305T194202Z_webconnectivity_RU_12389_n1_WSmQCN89HUI5zaHk
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)

Raw Measurement Data

Loading