March 5, 2022 at 9:03:30 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 485ms
Share on Facebook or Twitter
On March 5, 2022 at 9:03:30 PM UTC, https://ru.krymr.com/ presented signs of DNS tampering on AS50923 in Russia. This might mean that https://ru.krymr.com/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
37.60.16.242
Query:
IN A ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
23.53.55.87
AS1299 (Telia Company AB)
Query:
IN AAAA ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001:2030:4e:97::3e9
AS1299 (Telia Company AB)
@
IN
AAAA
2001:2030:4e:a0::3e9
AS1299 (Telia Company AB)

TCP Connections

2001:2030:4e:97::3e9:443: failed (network_unreachable)
2001:2030:4e:a0::3e9:443: failed (network_unreachable)
23.53.55.87:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS50923
Resolver IP
37.60.16.242
Resolver Network Name
Metroset Ltd.
Measurement UID
20220305210330.749976_RU_webconnectivity_da24518252634807
Report ID
20220305T210223Z_webconnectivity_RU_50923_n1_O605lzBiQIZ2u3wB
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)

Raw Measurement Data

Loading…