March 6, 2022 at 8:17:45 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 5.7s
Share on Facebook or Twitter
On March 6, 2022 at 8:17:45 PM UTC, https://www.kavkazr.com/ presented signs of DNS tampering on AS34533 in Russia. This might mean that https://www.kavkazr.com/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
85.113.63.236
Query:
IN A www.kavkazr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
87.245.209.168
AS9002 (RETN Limited)
@
IN
A
87.245.209.241
AS9002 (RETN Limited)
Query:
IN AAAA www.kavkazr.com
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf63
AS9002 (RETN Limited)
@
IN
AAAA
2a02:2d8:3:805::8b2d:cf43
AS9002 (RETN Limited)

TCP Connections

2a02:2d8:3:805::8b2d:cf63:443: failed (unknown_failure: dial tcp [scrubbed]: connect: network is unreachable)
2a02:2d8:3:805::8b2d:cf43:443: failed (unknown_failure: dial tcp [scrubbed]: connect: network is unreachable)
87.245.209.168:443: succeeded
87.245.209.241:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS34533
Resolver IP
85.113.63.236
Resolver Network Name
JSC "ER-Telecom Holding"
Measurement UID
20220306201752.529943_RU_webconnectivity_b904d1ac08f74a21
Report ID
20220306T185734Z_webconnectivity_RU_34533_n1_nVPNo4mkNMoH4KB9
Platform
linux
Software Name
ooniprobe-cli (3.6.0)
Measurement Engine
ooniprobe-engine (3.6.0)

Raw Measurement Data

Loading…