March 6, 2022 at 5:36:46 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Runtime: 809ms
On March 6, 2022 at 5:36:46 PM UTC, https://ru.krymr.com/radio/schedule/103/ presented signs of DNS tampering on AS12389 in Russia.
This might mean that https://ru.krymr.com/radio/schedule/103/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
5.141.95.254
Query:
IN A ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
23.53.55.87
AS1299 (Telia Company AB)
Query:
IN AAAA ru.krymr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001:2030:15:1a9::3e9
AS1299 (Telia Company AB)
@
IN
AAAA
2001:2030:15:189::3e9
AS1299 (Telia Company AB)
TCP Connections
2001:2030:15:189::3e9:443: failed (network_unreachable)
2001:2030:15:1a9::3e9:443: failed (network_unreachable)
23.53.55.87:443: succeeded
HTTP Requests
No data
Resolver
Resolver ASN
AS12389
Resolver IP
5.141.95.254
Resolver Network Name
PJSC Rostelecom
Measurement UID
20220306173649.344487_RU_webconnectivity_4b208438945e9f15
Report ID
20220306T173211Z_webconnectivity_RU_12389_n1_8PDlzroN7NPcOfUN
Platform
android
Software Name
ooniprobe-android (3.6.0)
Measurement Engine
ooniprobe-engine (3.14.1)