Roskomnazdor, Tele2 and binary options
Often being outside the home region, I have to work through the mobile Internet as a result of my work. And for the second time, I notice how the mobile Internet operator on the page blocking Internet resources banned in the Russian Federation, places not only ugly black words about blocking the resource. I don’t remember exactly what was the first time, but definitely something related to paid subscriptions, forcing me to call and unsubscribe. Then I talked with Tele2 support, which they advised me to check my PC for malware, and disowned this problem. But this time I decided to fix this fact for the purpose of further study, in order to finally understand on whose side the problem is, and if it is authorized by the operator, then humanly, and possibly by law, this is bad,
The scenario is like this: on the blocking page, a block is inserted with a link to a third-party resource on cloudflare, when you click on it, a 302 redirect to the target site with binary options occurs.
Just in case, I recorded all IP addresses and whois information at the time of the incident.
Screenshots and voting under the cut.
Resource blocking page with ad insertion
We study the blocking page 1
We study the blocking page 3
We study the blocking page 3
JavaScript in the code of the blocking page
t2rkn.com http browser
302 redirect from rk.represenrate.com to options
After clicking on the link to the options
My IP
nslookup t2rkn .com
whois from IP (nslookup t2rkn.com)
nslookup rk.represenrate.com
whois from IP (nslookup rk.represenrate.com)
whois t2rkn.com
whois represenrate.com I
suggest you participate in the survey and leave comments below.
The scenario is like this: on the blocking page, a block is inserted with a link to a third-party resource on cloudflare, when you click on it, a 302 redirect to the target site with binary options occurs.
Just in case, I recorded all IP addresses and whois information at the time of the incident.
Screenshots and voting under the cut.
Resource blocking page with ad insertion
We study the blocking page 1
We study the blocking page 3
We study the blocking page 3
JavaScript in the code of the blocking page
t2rkn.com http browser
302 redirect from rk.represenrate.com to options
After clicking on the link to the options
My IP
nslookup t2rkn .com
whois from IP (nslookup t2rkn.com)
nslookup rk.represenrate.com
whois from IP (nslookup rk.represenrate.com)
whois t2rkn.com
whois represenrate.com I
suggest you participate in the survey and leave comments below.
Only registered users can participate in the survey. Please come in.
Have you encountered similar situations on the part of Tele2?
- 27.1% Yes 48
- 72.8% No 129
Who is responsible for advertising?
- 87.6% Operator 198
- 3% User 7
- 9.2% Intruder 21