Anomaly
https://www.angelfire.lycos.com/
DNS tampering
Libya
Country
Network
April 04, 2025, 10:24 AM UTC
Date & Time
Websites
Websites
Runtime: 3.9s

On April 04, 2025, 10:24 AM UTC, https://www.angelfire.lycos.com/ presented signs of DNS tampering on AS21003 in Libya.

This might mean that https://www.angelfire.lycos.com/ was blocked, but false positives can occur.

Please explore the network measurement data below.

Failures

HTTP Experiment
host_unreachable
DNS Experiment
null
Control
null

DNS Queries

Resolver:
41.208.117.232
Query:
IN A www.angelfire.lycos.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
41.208.70.30

TCP Connections

Connection to 41.208.70.30:443 failed.

HTTP Requests

No Data

Resolver

Resolver ASN
AS21003
Resolver IP
41.208.117.232
Resolver Network Name
General Post and Telecommunication Company (GPTC)
Report ID
20250404T102025Z_webconnectivity_LY_21003_n1_g4v899HvKO2Zjr9t
Platform
android
Software Name
ooniprobe-android-unattended (5.0.5)
Measurement Engine
ooniprobe-engine (3.24.0)

Raw Measurement Data

Loading