March 6, 2022 at 8:48:07 PM UTC
VERIFY
Anomaly
DNS tampering
Websites
Websites
Runtime: 335ms
Share on Facebook or Twitter
On March 6, 2022 at 8:48:07 PM UTC, https://www.sibreal.org/ presented signs of DNS tampering on AS42387 in Russia. This might mean that https://www.sibreal.org/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
217.77.53.237
Query:
IN A www.sibreal.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
A
80.239.137.162
AS1299 (Telia Company AB)
@
IN
A
62.115.252.57
AS1299 (Telia Company AB)
Query:
IN AAAA www.sibreal.org
Engine:
system
Name
Class
TTL
Type
DATA
Answer IP Info
@
IN
AAAA
2001:2030:0:17::50ef:fe2c
AS1299 (Telia Company AB)
@
IN
AAAA
2001:2030:0:17::50ef:fe16
AS1299 (Telia Company AB)

TCP Connections

2001:2030:0:17::50ef:fe2c:443: failed (unknown_failure: dial tcp [scrubbed]: socket: address family not supported by protocol)
2001:2030:0:17::50ef:fe16:443: failed (unknown_failure: dial tcp [scrubbed]: socket: address family not supported by protocol)
62.115.252.57:443: succeeded
80.239.137.162:443: succeeded

HTTP Requests

No data

Resolver

Resolver ASN
AS42387
Resolver IP
217.77.53.237
Resolver Network Name
Limited Company Svyazservice
Measurement UID
20220306204808.678995_RU_webconnectivity_f0c4f17085108018
Report ID
20220306T204439Z_webconnectivity_RU_42387_n1_oibqKokv8pJMyxLy
Platform
linux
Software Name
iThena-ooniprobe (1.0.0)
Measurement Engine
ooniprobe-engine (3.10.0-beta.3)

Raw Measurement Data

Loading…