Search
MAT Charts
Circumvention Charts
Countries
Networks
Domains
Findings
English
繁體中文
中文(中国)
Tiếng Việt
Türkçe
ไทย
Kiswahili
русский
português (Brasil)
မြန်မာ
français
فارسی
español
Deutsch
العربية
March 5, 2022 at 10:15:47 PM UTC
VERIFY
Anomaly
https://meduza.io/
DNS tampering
Russia
AS51547 LLC "Telekonika"
Websites
Websites
Web Connectivity Test
Runtime:
30.1s
Share on
Facebook
or
Twitter
On March 5, 2022 at 10:15:47 PM UTC,
https://meduza.io/
presented signs of DNS tampering on AS51547 in Russia. This might mean that
https://meduza.io/
was blocked, but
false positives
can occur. Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
194.190.127.82
Query:
IN A meduza.io
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
80.76.104.20
AS51547 (LLC "Telekonika")
TCP Connections
80.76.104.20:443
: failed (generic_timeout_error)
HTTP Requests
No data
Resolver
Resolver ASN
AS42385
Resolver IP
194.190.127.82
Resolver Network Name
Joint-stock company "Internet Exchange "MSK-IX
Measurement UID
20220305221620.019042_RU_webconnectivity_1b91c6157009f5d9
Report ID
20220305T221158Z_webconnectivity_RU_51547_n1_ogzBoB2bc7pb2off
Platform
android
Software Name
ooniprobe-android (3.5.0)
Measurement Engine
ooniprobe-engine (3.13.0)
Raw Measurement Data
Download JSON
Expand All
Loading…