Anomaly
https://bogus.d2a8n1.rootcanary.net/
DNS tampering
Oman
Country
Network
April 19, 2025, 07:04 AM UTC
Date & Time
Websites
Websites
Runtime: 3.8s

On April 19, 2025, 07:04 AM UTC, https://bogus.d2a8n1.rootcanary.net/ presented signs of DNS tampering on AS50010 in Oman.

This might mean that https://bogus.d2a8n1.rootcanary.net/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
null
DNS Experiment
android_dns_cache_no_data
Control
null

DNS Queries

Resolver:
188.135.0.26
Query:
IN A bogus.d2a8n1.rootcanary.net
Engine:
system
android_dns_cache_no_data
Query:
IN AAAA bogus.d2a8n1.rootcanary.net
Engine:
system
android_dns_cache_no_data

TCP Connections

No data.

HTTP Requests

No Data

Resolver

Resolver ASN
AS50010
Resolver IP
188.135.0.26
Resolver Network Name
Omani Qatari Telecommunication Company SAOC
Report ID
20250419T065821Z_webconnectivity_OM_50010_n1_sRSziaSuwAhKLKs1
Platform
android
Software Name
ooniprobe-android-unattended (5.0.5)
Measurement Engine
ooniprobe-engine (3.24.0)

Raw Measurement Data

Loading