Anomaly
https://video.twimg.com/tweet_video/EC6DSXDXsAEhHAa.mp4
DNS tampering
Websites
Runtime: 2.7s
On September 19, 2024, 09:52 PM UTC, https://video.twimg.com/tweet_video/EC6DSXDXsAEhHAa.mp4 presented signs of DNS tampering on AS6306 in Venezuela.
This might mean that https://video.twimg.com/tweet_video/EC6DSXDXsAEhHAa.mp4 was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
connection_reset
DNS Experiment
null
Control
null
DNS Queries
Resolver:
127.0.0.2
Query:
IN A video.twimg.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
151.101.216.158
Query:
IN AAAA video.twimg.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2a04:4e42:33::158
TCP Connections
Connection to 2a04:4e42:33::158:443 was blocked.
Connection to 151.101.216.158:443 succeeded.
HTTP Requests
No Data
Resolver
Resolver ASN
AS0
Resolver IP
127.0.0.2
Resolver Network Name
Report ID
20240919T030240Z_webconnectivity_VE_6306_n1_01WWCIREthojvhH5
Platform
linux
Software Name
miniooni (3.9.0-alpha)
Measurement Engine
ooniprobe-engine (3.9.0-alpha)