Anomaly
https://video.twimg.com/tweet_video/EC6DSXDXsAEhHAa.mp4
DNS tampering
Venezuela
Country
Network
September 19, 2024, 09:52 PM UTC
Date & Time
Websites
Websites
Runtime: 2.7s
On September 19, 2024, 09:52 PM UTC, https://video.twimg.com/tweet_video/EC6DSXDXsAEhHAa.mp4 presented signs of DNS tampering on AS6306 in Venezuela. This might mean that https://video.twimg.com/tweet_video/EC6DSXDXsAEhHAa.mp4 was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
connection_reset
DNS Experiment
null
Control
null

DNS Queries

Resolver:
127.0.0.2
Query:
IN A video.twimg.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
151.101.216.158
Query:
IN AAAA video.twimg.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2a04:4e42:33::158

TCP Connections

Connection to 2a04:4e42:33::158:443 was blocked.
Connection to 151.101.216.158:443 succeeded.

HTTP Requests

No Data

Resolver

Resolver ASN
AS0
Resolver IP
127.0.0.2
Resolver Network Name
Report ID
20240919T030240Z_webconnectivity_VE_6306_n1_01WWCIREthojvhH5
Platform
linux
Software Name
miniooni (3.9.0-alpha)
Measurement Engine
ooniprobe-engine (3.9.0-alpha)

Raw Measurement Data

Loading