Anomaly
http://beyondexgay.com/
DNS tampering
Websites
Runtime: 15.8s
On April 04, 2025, 04:26 PM UTC, http://beyondexgay.com/ presented signs of DNS tampering on AS25513 in Russia.
This might mean that http://beyondexgay.com/ was blocked, but false positives can occur.
Please explore the network measurement data below.
Failures
HTTP Experiment
null
DNS Experiment
null
Control
null
DNS Queries
Resolver:
172.68.9.62
Query:
IN A beyondexgay.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
84.32.84.115
Query:
IN AAAA beyondexgay.com
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2a02:4780:84:7a7b:4dfe:b017:ef56:9bef
TCP Connections
Connection to 2a02:4780:84:7a7b:4dfe:b017:ef56:9bef:80 was blocked.
Connection to 84.32.84.115:80 was blocked.
HTTP Requests
URL
GET http://beyondexgay.com/
Response Headers
Alt-Svc:h3=":443"; ma=86400Content-Length:657Content-Type:text/htmlDate:Fri, 04 Apr 2025 16:27:02 GMTEtag:"6669aa89-291"Server:hcdnVary:Accept-EncodingX-Hcdn-Request-Id:2cf541c68c4b195c00c27c596c768e83-bnk-edge4
Response Body
<script> function parseHttpHeaders(httpHeaders) { return httpHeaders.split("\n") .map(x=>x.split(/: */,2)) .filter(x=>x[0]) .reduce((ac, x)=>{ac[x[0]] = x[1];return ac;}, {}); } var req = new XMLHttpRequest(); req.open('HEAD', document.location, false); req.send(null); var headers = parseHttpHeaders(req.getAllResponseHeaders()); </script> <center> <h1>Whoops!</h1> <h3><script>document.write(req.status);</script></h3> The server can not find the requested resource. In the browser, this means the URL is not recognized.</br></br> Request-Id: <script>document.write(headers["x-hcdn-request-id"]);</script> </center>
Resolver
Resolver ASN
AS13335
Resolver IP
172.68.9.62
Resolver Network Name
Cloudflare Inc
Report ID
20250404T161407Z_webconnectivity_RU_25513_n1_VxoPkH88CB7hxXN5
Platform
linux
Software Name
ooniprobe-cli-unattended (3.23.0)
Measurement Engine
ooniprobe-engine (3.23.0)