Anomaly
https://dcard.tw/
DNS tampering
Websites
Runtime: 44.8s
On January 18, 2025, 07:30 AM UTC, https://dcard.tw/ presented signs of DNS tampering on AS4134 in China.
This might mean that https://dcard.tw/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
connection_refused
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.253.0.19
Query:
IN A dcard.tw
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
4.78.139.54
TCP Connections
Connection to 4.78.139.54:443 was blocked.
HTTP Requests
No Data
Resolver
Resolver ASN
AS15169
Resolver IP
172.253.0.19
Resolver Network Name
Google LLC
Report ID
20250118T064842Z_webconnectivity_CN_4134_n1_1QV8X61joHN30OdE
Platform
windows
Software Name
ooniprobe-desktop-unattended (3.23.0)
Measurement Engine
ooniprobe-engine (3.23.0)