Anomaly
https://www.angelfire.lycos.com/
DNS tampering
Websites
Runtime: 3.9s
On April 04, 2025, 10:24 AM UTC, https://www.angelfire.lycos.com/ presented signs of DNS tampering on AS21003 in Libya.
This might mean that https://www.angelfire.lycos.com/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
host_unreachable
DNS Experiment
null
Control
null
DNS Queries
Resolver:
41.208.117.232
Query:
IN A www.angelfire.lycos.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
41.208.70.30
TCP Connections
Connection to 41.208.70.30:443 failed.
HTTP Requests
No Data
Resolver
Resolver ASN
AS21003
Resolver IP
41.208.117.232
Resolver Network Name
General Post and Telecommunication Company (GPTC)
Report ID
20250404T102025Z_webconnectivity_LY_21003_n1_g4v899HvKO2Zjr9t
Platform
android
Software Name
ooniprobe-android-unattended (5.0.5)
Measurement Engine
ooniprobe-engine (3.24.0)