Anomaly
https://coronavirus.app/
DNS tampering
Websites
Runtime: 45.5s
On April 19, 2025, 04:15 PM UTC, https://coronavirus.app/ presented signs of DNS tampering on AS52262 in Honduras.
This might mean that https://coronavirus.app/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
generic_timeout_error
DNS Experiment
null
Control
null
DNS Queries
Resolver:
186.2.134.158
Query:
IN A coronavirus.app
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
190.4.63.209
TCP Connections
Connection to 190.4.63.209:443 failed.
HTTP Requests
No Data
Resolver
Resolver ASN
AS52262
Resolver IP
186.2.134.158
Resolver Network Name
Telefónica Celular S.A
Report ID
20250419T160701Z_webconnectivity_HN_52262_n1_cMRZ7Adt4xoCSQyp
Platform
linux
Software Name
ooniprobe-cli-unattended (3.25.0)
Measurement Engine
ooniprobe-engine (3.25.0)