Anomaly
https://root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net/
DNS tampering
Zambia
Country
Network
January 16, 2025, 01:34 PM UTC
Date & Time
Websites
Websites
Runtime: 2.7s
On January 16, 2025, 01:34 PM UTC, https://root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net/ presented signs of DNS tampering on AS37532 in Zambia. This might mean that https://root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net/ was blocked, but false positives can occur. Please explore the network measurement data below.

Failures

HTTP Experiment
null
DNS Experiment
android_dns_cache_no_data
Control
null

DNS Queries

Resolver:
154.47.30.251
Query:
IN A root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net
Engine:
system
android_dns_cache_no_data
Query:
IN AAAA root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net
Engine:
system
android_dns_cache_no_data

TCP Connections

No data.

HTTP Requests

No Data

Resolver

Resolver ASN
AS212238
Resolver IP
154.47.30.251
Resolver Network Name
Datacamp Limited
Report ID
20250116T132734Z_webconnectivity_ZM_37532_n1_G1oyGsrRpJ8rYoKP
Platform
android
Software Name
ooniprobe-android-unattended (4.0.2)
Measurement Engine
ooniprobe-engine (3.24.0)

Raw Measurement Data

Loading