nslookup archive.is 1.1.1.1
Server: 1.1.1.1
Address: 1.1.1.1#53
Non-authoritative answer:
Name: archive.is
Address: 134.119.220.26 dig @1.1.1.1 archive.is
; <<>> DiG 9.14.1 <<>> @1.1.1.1 archive.is
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 46862
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1452
;; QUESTION SECTION:
;archive.is. IN A
;; ANSWER SECTION:
archive.is. 2998 IN A 127.0.0.4
;; Query time: 52 msec
;; SERVER: 1.1.1.1#53(1.1.1.1)
;; WHEN: Sat May 04 21:03:36 CEST 2019
;; MSG SIZE rcvd: 55
dig @8.8.8.8 archive.is
; <<>> DiG 9.14.1 <<>> @8.8.8.8 archive.is
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 5893
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;archive.is. IN A
;; ANSWER SECTION:
archive.is. 299 IN A 94.16.117.236
;; Query time: 79 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Sat May 04 21:04:28 CEST 2019
;; MSG SIZE rcvd: 55 Server: 1.1.1.1
Address: 1.1.1.1#53
Non-authoritative answer:
Name: archive.is
Address: 127.0.0.4https://www.dnsleaktest.com/what-is-transparent-dns-proxy.ht...
And if they sound acceptable run https://ooni.torproject.org/install/
It'll show you more about likely interception of your traffic.
A few days ago it was a customers compromised router doing it.
I couldn't figure out if this was plain incompetency, an attempt to enforce DNS-based website blocking, or some programmer willfully implementing the latter with the former so that it would be reasonably easy to circumvent.
Also Italian residential providers really, really like to mess with NXDOMAIN instead returning a helpful error page with affiliate links instead. You might think you can imagine how much shit this breaks; you probably don't.