March 5, 2022 at 7:59:14 PM UTC
VERIFY
Anomaly
Websites
Websites
Runtime: 5.3s
Share on Facebook or Twitter
On March 5, 2022 at 7:59:14 PM UTC, https://www.currenttime.tv/ presented signs of DNS tampering on AS15582 in Russia. This might mean that https://www.currenttime.tv/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
188.123.230.4
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
62.115.252.57
AS1299 (Telia Company AB)
@
IN
A
80.239.137.162
AS1299 (Telia Company AB)
@
IN
A
62.115.252.40
AS1299 (Telia Company AB)
Query:
IN AAAA www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf63
AS9002 (RETN Limited)
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf43
AS9002 (RETN Limited)

TCP Connections

2a02:2d8:3:805::8b2d:cf63:443: failed (network_unreachable)
2a02:2d8:3:805::8b2d:cf43:443: failed (network_unreachable)
62.115.252.40:443: succeeded
62.115.252.57:443: succeeded
80.239.137.162:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS15582
Resolver IP
188.123.230.4
Resolver Network Name
OJSC Comcor
Measurement UID
20220305195915.596731_RU_webconnectivity_ef4953b23705539b
Report ID
20220305T195854Z_webconnectivity_RU_15582_n1_wm8dd0LgbC11dZ3p
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)

Raw Measurement Data

Loading…