A public recursive name server (also called public DNS resolver) is a name server service that networked computers may use to query the Domain Name System (DNS), the decentralized Internet naming system, in place of (or in addition to) name servers operated by the local Internet service provider (ISP) to which the devices are connected. Reasons for using these services include:
Public DNS resolver operators often cite increased privacy as an advantage of their services; critics of public DNS services have cited the possibility of mass data collection targeted at the public resolvers as a potential risk of using these services. Most services now support secure DNS lookup transport services such as DNS over TLS (DoT), DNS over HTTPS (DoH) and DNS over QUIC (DoQ).
Public DNS resolvers are operated either by commercial companies, offering their service for free use to the public, or by private enthusiasts to help spread new technologies and support non-profit communities.
Provider | Privacy policy | DNS over UDP/TCP (Do53) | DNSSEC | DNS over TLS (DoT) | DNS over HTTPS (DoH) | DNS over QUIC (DoQ) | EDNS Padding | DNSCrypt | Hostname | IPv4 addresses | IPv6 addresses | Filters | Remarks |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AdGuard | Yes [6] | Yes | Yes [7] | Yes | Yes [8] | Yes [9] | No | Yes [10] | dns.adguard-dns.com [11] | 94.140.14.14 94.140.15.15 | 2a10:50c0::ad1:ff 2a10:50c0::ad2:ff | Default: ads and trackers [11] | |
family.adguard-dns.com | 94.140.14.15 94.140.15.16 | 2a10:50c0::bad1:ff 2a10:50c0::bad2:ff | Family: ads, trackers, and adult content [11] | ||||||||||
unfiltered.adguard-dns.com | 94.140.14.140 94.140.14.141 | 2a10:50c0::1:ff 2a10:50c0::2:ff | None [11] | ||||||||||
Alibaba | ? | Yes | ? | Yes | Yes | No | ? | No | dns.alidns.com | 223.5.5.5 223.6.6.6 | 2400:3200::1 2400:3200:baba::1 | ? | Chinese regulations |
CleanBrowsing | Yes [12] | Yes | Yes | Yes [13] | Yes [14] | No | Yes | Yes [15] | family-filter-dns.cleanbrowsing.org | 185.228.168.168 185.228.169.168 | 2a0d:2a00:1:: 2a0d:2a00:2:: | Family | Designed to be used on devices of kids under 13. |
adult-filter-dns.cleanbrowsing.org | 185.228.168.10 185.228.169.11 | 2a0d:2a00:1::1 2a0d:2a00:2::1 | Adult | ||||||||||
security-filter-dns.cleanbrowsing.org | 185.228.168.9 185.228.169.9 | 2a0d:2a00:1::2 2a0d:2a00:2::2 | Security | ||||||||||
Cloudflare | Yes [16] | Yes | Yes [17] | Yes [18] | Yes [19] | No [20] | Yes | No | one.one.one.one [21] 1dot1dot1dot1.cloudflare-dns.com | 1.1.1.1 1.0.0.1 | 2606:4700:4700::1111 2606:4700:4700::1001 | None | |
security.cloudflare-dns.com | 1.1.1.2 1.0.0.2 | 2606:4700:4700::1112 2606:4700:4700::1002 | Malware, Phishing | ||||||||||
family.cloudflare-dns.com | 1.1.1.3 1.0.0.3 | 2606:4700:4700::1113 2606:4700:4700::1003 | Malware, Phishing, Adult content | ||||||||||
dns64.cloudflare-dns.com | — | 2606:4700:4700::64 2606:4700:4700::6400 | None | Intended to be IPv6-only. [22] See NAT64 and DNS64. | |||||||||
Yes [23] | Yes | Yes | Yes | Yes [24] | No | Yes | No | dns.google [25] | 8.8.8.8 8.8.4.4 | 2001:4860:4860::8888 2001:4860:4860::8844 | None | ||
dns64.dns.google | — | 2001:4860:4860::6464 2001:4860:4860::64 | None | Intended for networks with NAT64 gateway. [26] | |||||||||
Gcore | Yes [27] | Yes | Yes | No | No | No | No | No | — | 95.85.95.85 2.56.220.2 | 2a03:90c0:999d::1 2a03:90c0:9992::1 | None | |
Mullvad | Only for VPN service available [28] | No [29] | Yes | Yes [29] | Yes [29] | No | No | No | dns.mullvad.net [29] | 194.242.2.2 | 2a07:e340::2 | None | Can be used without its VPN service |
adblock.dns.mullvad.net | 194.242.2.3 | 2a07:e340::3 | Ads, and trackers | ||||||||||
base.dns.mullvad.net | 194.242.2.4 | 2a07:e340::4 | Ads, trackers, and malware | ||||||||||
extended.dns.mullvad.net | 194.242.2.5 | 2a07:e340::5 | Ads, trackers, malware, and social media | ||||||||||
all.dns.mullvad.net | 194.242.2.9 | 2a07:e340::9 | Ads, trackers, malware, social media, gambling and adult content | ||||||||||
Vercara (formerly Neustar Security Services) | Yes [30] | Yes | Yes | No | No | No | No | No | ? | 64.6.64.6 64.6.65.6 | 2620:74:1b::1:1 2620:74:1c::2:2 | None | Verisign transferred its public DNS to Neustar. [31] |
156.154.70.1 156.154.71.1 | 2610:a1:1018::1 2610:a1:1019::1 | ||||||||||||
156.154.70.2 156.154.71.2 | 2610:a1:1018::2 2610:a1:1019::2 | Malware, ransomware, spyware, phishing | |||||||||||
156.154.70.3 156.154.71.3 | 2610:a1:1018::3 2610:a1:1019::3 | Low security + gambling, pornography, violence, hate | |||||||||||
156.154.70.4 156.154.71.4 | 2610:a1:1018::4 2610:a1:1019::4 | Medium security + gaming, adult, drugs, alcohol, anonymous proxies | |||||||||||
156.154.70.5 156.154.71.5 | 2610:a1:1018::5 2610:a1:1019::5 | None | Will not redirect non-existent domains to a landing page. | ||||||||||
Cisco Umbrella (OpenDNS) | Yes [32] | Yes | Yes [33] | Yes | Yes [34] | No | Yes | Yes [35] | dns.opendns.com dns.umbrella.com [36] | 208.67.222.222 208.67.220.220 | 2620:119:35::35 2620:119:53::53 | Basic Security filtering + user defined policies | |
familyshield.opendns.com | 208.67.222.123 208.67.220.123 | 2620:119:35::123 2620:119:53::123 | FamilyShield: adult content | ||||||||||
sandbox.opendns.com | 208.67.222.2 208.67.220.2 | 2620:0:ccc::2 2620:0:ccd::2 | None | Sandbox addresses that provide no filtering. | |||||||||
Oracle (formerly Dyn) | Yes [37] | Yes | Yes | No | No | No | No | No | resolver1.dyndnsinternetguide.com resolver2.dyndnsinternetguide.com rdns.dynect.net | 216.146.35.35 216.146.36.36 | — | None | |
Quad9 | Yes [38] [39] | Yes | Yes [40] | Yes [41] | Yes [42] | No | No | Yes [43] | dns.quad9.net | 9.9.9.9 149.112.112.112 | 2620:fe::9 2620:fe::fe | Phishing, malware, and exploit kit domains | |
Yes [40] | dns11.quad9.net | 9.9.9.11 149.112.112.11 | 2620:fe::11 2620:fe::fe:11 | Phishing, malware, and exploit kit domains | Passes EDNS Client Subnet. | ||||||||
No [44] | dns10.quad9.net | 9.9.9.10 149.112.112.10 | 2620:fe::10 2620:fe::fe:10 | None | |||||||||
Wikimedia | Informal [45] | No [46] | Yes [47] | Yes [48] | Yes [49] | No | No [50] | No | wikimedia-dns.org [51] | 185.71.138.138 [51] | 2001:67c:930::1 [51] | None [52] | |
Yandex | No [53] | Yes | No | Yes | Yes | No | Yes | Yes | common.dot.dns.yandex.net | 77.88.8.8 77.88.8.1 | 2a02:6b8::feed:0ff 2a02:6b8:0:1::feed:0ff | None | |
safe.dot.dns.yandex.net | 77.88.8.88 77.88.8.2 | 2a02:6b8::feed:bad 2a02:6b8:0:1::feed:bad | Safe: fraudulent / infected / bot sites | ||||||||||
family.dot.dns.yandex.net | 77.88.8.7 77.88.8.3 | 2a02:6b8::feed:a11 2a02:6b8:0:1::feed:a11 | Family: fraudulent / infected / bot / adult sites | ||||||||||
The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System has been an essential component of the functionality of the Internet since 1985.
The DNS root zone is the top-level DNS zone in the hierarchical namespace of the Domain Name System (DNS) of the Internet.
The Domain Name System Security Extensions (DNSSEC) is a suite of extension specifications by the Internet Engineering Task Force (IETF) for securing data exchanged in the Domain Name System (DNS) in Internet Protocol (IP) networks. The protocol provides cryptographic authentication of data, authenticated denial of existence, and data integrity, but not availability or confidentiality.
DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e.g. an IP address. This results in traffic being diverted to any computer that the attacker chooses.
This article presents a comparison of the features, platform support, and packaging of many independent implementations of Domain Name System (DNS) name server software.
OpenDNS is an American company providing Domain Name System (DNS) resolution services—with features such as phishing protection, optional content filtering, and DNS lookup in its DNS servers—and a cloud computing security product suite, Umbrella, designed to protect enterprise customers from malware, botnets, phishing, and targeted online attacks. The OpenDNS Global Network processes an estimated 100 billion DNS queries daily from 85 million users through 25 data centers worldwide.
Opportunistic TLS refers to extensions in plain text communication protocols, which offer a way to upgrade a plain text connection to an encrypted connection instead of using a separate port for encrypted communication. Several protocols use a command named "STARTTLS" for this purpose. It is a form of opportunistic encryption and is primarily intended as a countermeasure to passive monitoring.
Unbound is a validating, recursive, and caching DNS resolver product from NLnet Labs. It is distributed free of charge in open-source form under the BSD license.
DNSCurve is a proposed secure protocol for the Domain Name System (DNS), designed by Daniel J. Bernstein. It encrypts and authenticates DNS packets between resolvers and authoritative servers.
Google Public DNS is a Domain Name System (DNS) service offered to Internet users worldwide by Google. It functions as a recursive name server. Google Public DNS was announced on December 3, 2009, in an effort described as "making the web faster and more secure." As of 2018, it is the largest public DNS service in the world, handling over a trillion queries per day. Google Public DNS is not related to Google Cloud DNS, which is a DNS hosting service.
DNSCrypt is a network protocol that authenticates and encrypts Domain Name System (DNS) traffic between the user's computer and recursive name servers. DNSCrypt wraps unmodified DNS traffic between a client and a DNS resolver in a cryptographic construction, preventing eavesdropping and forgery by a man-in-the-middle.
Knot DNS is an open-source authoritative-only server for the Domain Name System. It was created from scratch and is actively developed by CZ.NIC, the .CZ domain registry. The purpose of this project is to supply an alternative open-source implementation of an authoritative DNS server suitable for TLD operators to increase overall security, stability and resiliency of the Domain Name System. It is implemented as a multi-threaded daemon, using a number of programming techniques and data structures to make the server very fast, notably Read-copy-update or a special kind of a radix tree.
DNS-based Authentication of Named Entities (DANE) is an Internet security protocol to allow X.509 digital certificates, commonly used for Transport Layer Security (TLS), to be bound to domain names using Domain Name System Security Extensions (DNSSEC).
QUIC is a general-purpose transport layer network protocol initially designed by Jim Roskind at Google. It was first implemented and deployed in 2012 and was publicly announced in 2013 as experimentation broadened. It was also described at an IETF meeting. The Chrome web browser, Microsoft Edge, Firefox, and Safari all support it. In Chrome, QUIC is used by more than half of all connections to Google's servers.
DNS over HTTPS (DoH) is a protocol for performing remote Domain Name System (DNS) resolution via the HTTPS protocol. A goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data by man-in-the-middle attacks by using the HTTPS protocol to encrypt the data between the DoH client and the DoH-based DNS resolver. By March 2018, Google and the Mozilla Foundation had started testing versions of DNS over HTTPS. In February 2020, Firefox switched to DNS over HTTPS by default for users in the United States. In May 2020, Chrome switched to DNS over HTTPS by default.
EDNS Client Subnet (ECS) is an option in the Extension Mechanisms for DNS that allows a recursive DNS resolver to specify the subnetwork for the host or client on whose behalf it is making a DNS query. This is generally intended to help speed up the delivery of data from content delivery networks (CDNs), by allowing better use of DNS-based load balancing to select a service address near the client when the client computer is not necessarily near the recursive resolver.
DNS over TLS (DoT) is a network security protocol for encrypting and wrapping Domain Name System (DNS) queries and answers via the Transport Layer Security (TLS) protocol. The goal of the method is to increase user privacy and security by preventing eavesdropping and manipulation of DNS data via man-in-the-middle attacks. The well-known port number for DoT is 853.
Quad9 is a global public recursive DNS resolver that aims to protect users from malware and phishing. Quad9 is operated by the Quad9 Foundation, a Swiss public-benefit, not-for-profit foundation with the purpose of improving the privacy and cybersecurity of Internet users, headquartered in Zürich. Quad9 is entirely subject to Swiss privacy law, and the Swiss government extends that protection of the law to Quad9's users throughout the world, regardless of citizenship or country of residence.
1.1.1.1 is a free Domain Name System (DNS) service by the American company Cloudflare in partnership with APNIC. The service functions as a recursive name server, providing domain name resolution for any host on the Internet. The service was announced on April 1, 2018. On November 11, 2018, Cloudflare announced a mobile application of their 1.1.1.1 service for Android and iOS. On September 25, 2019, Cloudflare released WARP, an upgraded version of their original 1.1.1.1 mobile application.
A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geo-blocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks.