Anomaly
https://root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net/
DNS tampering
Websites
Runtime: 2.8s
On January 16, 2025, 01:34 PM UTC, https://root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net/ presented signs of DNS tampering on AS37532 in Zambia.
This might mean that https://root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
null
DNS Experiment
android_dns_cache_no_data
Control
null
DNS Queries
Resolver:
154.47.30.251
Query:
IN A root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net
Engine:
system
android_dns_cache_no_data
Query:
IN AAAA root-key-sentinel-is-ta-38696.d2a8n3.rootcanary.net
Engine:
system
android_dns_cache_no_data
TCP Connections
No data.
HTTP Requests
No Data
Resolver
Resolver ASN
AS212238
Resolver IP
154.47.30.251
Resolver Network Name
Datacamp Limited
Report ID
20250116T132734Z_webconnectivity_ZM_37532_n1_G1oyGsrRpJ8rYoKP
Platform
android
Software Name
ooniprobe-android-unattended (4.0.2)
Measurement Engine
ooniprobe-engine (3.24.0)