peerglass_dns_censorship
Detect DNS censorship by comparing domain responses from global and country-specific resolvers to identify NXDOMAIN injection, IP poisoning, or DPI blocking.
Instructions
Probe for DNS censorship by querying a domain from multiple resolver vantage points — neutral global resolvers (Cloudflare, Google, Quad9) and optionally country-specific ISP resolvers.
Detects: • NXDOMAIN injection — domain exists globally but ISP returns NXDOMAIN • IP poisoning — ISP returns a different (block-page) IP • DPI block — timeout / connection refused
Args: params (CensorshipProbeInput): - domain (str): Domain to probe e.g. 'twitter.com' - country_code (str, optional): ISO code for country-specific resolvers - response_format (str): 'markdown' (default) or 'json'
Returns: str: Censorship status, technique, and per-resolver response table.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| params | Yes |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |