Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 9:30:56 PM UTC
VERIFY
Anomaly
https://www.currenttime.tv/tv/schedule/92/
DNS tampering
Russia
AS25513 PJSC Moscow city telephone network
Websites
Websites
Web Connectivity Test
Runtime:
456ms
Share on
Facebook
or
Twitter
On March 5, 2022 at 9:30:56 PM UTC,
https://www.currenttime.tv/tv/schedule/92/
presented signs of DNS tampering on AS25513 in Russia. This might mean that
https://www.currenttime.tv/tv/schedule/92/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
ssl_invalid_hostname
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.68.9.88
Query:
IN A www.currenttime.tv
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
62.115.252.57
AS1299 (Telia Company AB)
@
IN
A
62.115.252.40
AS1299 (Telia Company AB)
TCP Connections
62.115.252.57:443
: succeeded
62.115.252.40:443
: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS13335
Resolver IP
172.68.9.88
Resolver Network Name
Cloudflare, Inc.
Measurement UID
20220305213058.486028_RU_webconnectivity_aa37435a18f73da9
Report ID
20220305T212911Z_webconnectivity_RU_25513_n1_0hhxDeyRoJqTYj61
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)
Raw Measurement Data
Download JSON
Expand All
Loading…