Public recursive name server: Difference between revisions
Undid revision 1190833715 by 2001:8E0:2064:BF00:8C8F:D36C:8C2:E5F2 (talk) Criteria to appear on this list do not include encryption support |
Aadirulez8 (talk | contribs) m v2.05 - auto / Fix errors for CW project (Link equal to linktext) |
||
(21 intermediate revisions by 16 users not shown) | |||
Line 10: | Line 10: | ||
*temporary unavailability of the ISP's name server |
*temporary unavailability of the ISP's name server |
||
Public DNS resolver operators often cite increased privacy as an advantage of their services; critics of public DNS services have cited the possibility of mass data collection targeted at the public resolvers as a potential risk of using these services. |
Public DNS resolver operators often cite increased privacy as an advantage of their services; critics of public DNS services have cited the possibility of mass data collection targeted at the public resolvers as a potential risk of using these services. Most services now support secure DNS lookup transport services such as [[DNS over TLS]] (DoT), [[DNS over HTTPS]] (DoH) and [[DNS over QUIC]] (DoQ). |
||
Public DNS resolvers are operated either by commercial companies, offering their service for free use to the public, or by private enthusiasts to help spread new technologies and support non-profit communities. |
Public DNS resolvers are operated either by commercial companies, offering their service for free use to the public, or by private enthusiasts to help spread new technologies and support non-profit communities. |
||
== Notable public DNS service operators == |
== Notable public DNS service operators == |
||
{{sticky header}}{{sort under}} |
|||
{| class="sortable wikitable" style="font-size: 85%; text-align: center; width: auto;" |
|||
{{mw-datatable}} |
|||
{| class="sortable wikitable mw-datatable sticky-header sort-under" style="font-size: 85%; text-align: center;" |
|||
|- |
|- |
||
! |
! Provider |
||
! [[Privacy policy]] |
! [[Privacy policy]] |
||
! [[Domain Name System# |
! [[Domain Name System#DNS over UDP/TCP/53 (Do53)|DNS over UDP/TCP (Do53)]] |
||
! [[Domain Name System Security Extensions|DNSSEC]] |
! [[Domain Name System Security Extensions|DNSSEC]] |
||
! [[DNS over TLS|DNS over TLS (DoT)]] |
! [[DNS over TLS|DNS over TLS (DoT)]] |
||
Line 25: | Line 27: | ||
! [[DNS over QUIC|DNS over QUIC (DoQ)]] |
! [[DNS over QUIC|DNS over QUIC (DoQ)]] |
||
![[Extension Mechanisms for DNS#EDNS Padding|EDNS Padding]] |
![[Extension Mechanisms for DNS#EDNS Padding|EDNS Padding]] |
||
! [[ |
! [[DNSCrypt]] |
||
! Hostname |
|||
! Hostnames |
|||
! [[Internet Protocol version 4|IPv4]] addresses |
! [[Internet Protocol version 4|IPv4]] addresses |
||
! [[Internet Protocol version 6|IPv6]] addresses |
! [[Internet Protocol version 6|IPv6]] addresses |
||
Line 58: | Line 60: | ||
| None<ref name=":11"/> |
| None<ref name=":11"/> |
||
| |
| |
||
|- |
|||
! [[Alibaba Group|Alibaba]] |
|||
| {{dunno}} |
|||
|! {{yes}} |
|||
| {{dunno}} |
|||
|! {{yes}} |
|||
|! {{yes}} |
|||
|! {{no}} |
|||
| {{dunno}} |
|||
|! {{no}} |
|||
|dns.alidns.com |
|||
|223.5.5.5 |
|||
223.6.6.6 |
|||
|2400:3200::1 |
|||
2400:3200:baba::1 |
|||
| {{dunno}} |
|||
|Chinese regulations |
|||
|- |
|- |
||
! rowspan="3" | [[CleanBrowsing]] |
! rowspan="3" | [[CleanBrowsing]] |
||
Line 100: | Line 119: | ||
| None |
| None |
||
| |
| |
||
|- |
|||
| dns64.cloudflare-dns.com |
|||
|{{n/a}} |
|||
| {{IPaddr|2606:4700:4700::64}}<br />{{IPaddr|2606:4700:4700::6400}} |
|||
| None |
|||
| Intended to be IPv6-only.<ref>{{Cite web |url=https://developers.cloudflare.com/1.1.1.1/support-nat64/ |title=Supporting IPv6-only Networks |access-date=2019-01-20 |archive-date=2020-12-09 |archive-url=https://web.archive.org/web/20201209005501/https://developers.cloudflare.com/1.1.1.1/support-nat64 |url-status=dead }}</ref> See [[NAT64]] and [[DNS64]]. |
|||
|- |
|- |
||
| security.cloudflare-dns.com |
| security.cloudflare-dns.com |
||
Line 118: | Line 131: | ||
| Malware, Phishing,<br />Adult content |
| Malware, Phishing,<br />Adult content |
||
| |
| |
||
|- |
|||
| dns64.cloudflare-dns.com |
|||
|{{n/a}} |
|||
| {{IPaddr|2606:4700:4700::64}}<br />{{IPaddr|2606:4700:4700::6400}} |
|||
| None |
|||
| Intended to be IPv6-only.<ref>{{Cite web |url=https://developers.cloudflare.com/1.1.1.1/support-nat64/ |title=Supporting IPv6-only Networks |access-date=2019-01-20 |archive-date=2020-12-09 |archive-url=https://web.archive.org/web/20201209005501/https://developers.cloudflare.com/1.1.1.1/support-nat64 |url-status=dead }}</ref> See [[NAT64]] and [[DNS64]]. |
|||
|- |
|- |
||
! rowspan="2" | [[Google Public DNS|Google]] |
! rowspan="2" | [[Google Public DNS|Google]] |
||
Line 140: | Line 159: | ||
| Intended for networks with NAT64 gateway.<ref>[https://developers.google.com/speed/public-dns/docs/dns64 Google Public DNS64]</ref> |
| Intended for networks with NAT64 gateway.<ref>[https://developers.google.com/speed/public-dns/docs/dns64 Google Public DNS64]</ref> |
||
|- |
|- |
||
! | [[ |
! | [[Gcore]] |
||
| ! {{yes}}<ref name="gcoreprivacy"> |
| ! {{yes}}<ref name="gcoreprivacy">{{cite web | url=https://gcore.com/legal?tab=privacy_policy | title=Legal Information on Gcore Services }}</ref> |
||
| ! {{yes}} |
| ! {{yes}} |
||
| ! {{yes}} |
| ! {{yes}} |
||
Line 190: | Line 209: | ||
| Ads, trackers, malware, social media, gambling and adult content |
| Ads, trackers, malware, social media, gambling and adult content |
||
|- |
|- |
||
! rowspan=" |
! rowspan="6" | Vercara (formerly [[Neustar|Neustar Security Services]]) |
||
| rowspan="6" ! {{Yes}}<ref name="Neustar PP">{{cite web |title=Privacy Policy {{!}} Neustar |url=https://www.home.neustar/privacy/privacy-policy#data_in_products_services |website=home.neustar |language=en}}</ref> |
|||
| rowspan="6" ! {{Yes}} |
|||
| rowspan="6" ! {{Yes}} |
|||
| rowspan="6" ! {{No}} |
|||
| rowspan="6" ! {{No}} |
|||
| rowspan="6" ! {{No}} |
|||
| rowspan="6" ! {{No}} |
|||
| rowspan="6" ! {{No}} |
|||
| rowspan="6" {{dunno}} |
|||
| ''64.6.64.6''<br>''64.6.65.6'' |
|||
| ''2620:74:1b::1:1''<br>''2620:74:1c::2:2'' |
|||
| rowspan="2" | None |
|||
| Verisign transferred its public DNS to Neustar.<ref>{{Cite web|title=Verisign Public DNS Offers DNS Stability And Security – Verisign|url=https://www.verisign.com/en_US/security-services/public-dns/index.xhtml|access-date=2020-12-05|website=www.verisign.com|language=en-US|archive-date=2021-03-31|archive-url=https://web.archive.org/web/20210331041511/https://www.verisign.com/en_US/security-services/public-dns/index.xhtml|url-status=dead}}</ref> |
|||
|- |
|||
| {{IPaddr|156.154.70.1}}<br />{{IPaddr|156.154.71.1}} |
|||
| {{IPaddr|2610:a1:1018::1}}<br />{{IPaddr|2610:a1:1019::1}} |
|||
| |
|||
|- |
|||
| {{IPaddr|156.154.70.2}}<br />{{IPaddr|156.154.71.2}} |
|||
| {{IPaddr|2610:a1:1018::2}}<br />{{IPaddr|2610:a1:1019::2}} |
|||
| Malware, ransomware, spyware, phishing |
|||
| |
|||
|- |
|||
| {{IPaddr|156.154.70.3}}<br />{{IPaddr|156.154.71.3}} |
|||
| {{IPaddr|2610:a1:1018::3}}<br />{{IPaddr|2610:a1:1019::3}} |
|||
| Low security + gambling, pornography, violence, hate |
|||
| |
|||
|- |
|||
| {{IPaddr|156.154.70.4}}<br />{{IPaddr|156.154.71.4}} |
|||
| {{IPaddr|2610:a1:1018::4}}<br />{{IPaddr|2610:a1:1019::4}} |
|||
| Medium security + gaming, adult, drugs, alcohol, anonymous proxies |
|||
| |
|||
|- |
|||
| {{IPaddr|156.154.70.5}}<br />{{IPaddr|156.154.71.5}} |
|||
| {{IPaddr|2610:a1:1018::5}}<br />{{IPaddr|2610:a1:1019::5}} |
|||
| None |
|||
| Will not redirect non-existent domains to a landing page. |
|||
|- |
|||
! rowspan="3" | Cisco Umbrella ([[OpenDNS]]) |
|||
| rowspan="3" ! {{yes}}<ref name="opendnsprivacy">[https://www.cisco.com/c/en/us/about/legal/privacy-full.html Cisco Online Privacy Statement]</ref> |
| rowspan="3" ! {{yes}}<ref name="opendnsprivacy">[https://www.cisco.com/c/en/us/about/legal/privacy-full.html Cisco Online Privacy Statement]</ref> |
||
| rowspan="3" ! {{yes}} |
| rowspan="3" ! {{yes}} |
||
Line 199: | Line 257: | ||
| rowspan="3" ! {{yes}} |
| rowspan="3" ! {{yes}} |
||
| rowspan="3" ! {{yes}}<ref name="opendnscrypt">[https://support.opendns.com/hc/en-us/articles/227989147 OpenDNS: OpenDNS and DNSCrypt]</ref> |
| rowspan="3" ! {{yes}}<ref name="opendnscrypt">[https://support.opendns.com/hc/en-us/articles/227989147 OpenDNS: OpenDNS and DNSCrypt]</ref> |
||
| dns.opendns.com<br />dns.umbrella.com<ref>[https://umbrella.cisco.com/blog/enhancing-support-dns-encryption-with-dns-over-https Cisco Umbrella Enhances Support of DNS Encryption with DNS Over HTTPS]</ref> |
|||
| dns.opendns.com |
|||
| {{IPaddr|208.67.222.222}}<br />{{IPaddr|208.67.220.220}} |
| {{IPaddr|208.67.222.222}}<br />{{IPaddr|208.67.220.220}} |
||
| {{IPaddr|2620:119:35::35}}<br />{{IPaddr|2620:119:53::53}} |
| {{IPaddr|2620:119:35::35}}<br />{{IPaddr|2620:119:53::53}} |
||
Line 216: | Line 274: | ||
| None |
| None |
||
| Sandbox addresses that provide no filtering. |
| Sandbox addresses that provide no filtering. |
||
|- |
|||
! |[[Oracle Corporation|Oracle]] (formerly [[Dyn (company)|Dyn]]) |
|||
| {{yes}}<ref>{{cite web|url=https://dyn.com/legal/dyn-privacy-policy/|title=Oracle's Privacy Policy|website=dyn.com|language=en-US|access-date=2018-12-31}}</ref> |
|||
| {{yes}} |
|||
| {{yes}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| {{no}} |
|||
| resolver1.dyndnsinternetguide.com<br />resolver2.dyndnsinternetguide.com<br />rdns.dynect.net |
|||
| {{IPaddr|216.146.35.35}}<br />{{IPaddr|216.146.36.36}} |
|||
|{{n/a}} |
|||
| None |
|||
| |
|||
|- |
|- |
||
! rowspan="3" | [[Quad9]] |
! rowspan="3" | [[Quad9]] |
||
Line 228: | Line 301: | ||
| dns.quad9.net |
| dns.quad9.net |
||
| {{IPaddr|9.9.9.9}}<br />{{IPaddr|149.112.112.112}} |
| {{IPaddr|9.9.9.9}}<br />{{IPaddr|149.112.112.112}} |
||
| {{IPaddr|2620:fe:: |
| {{IPaddr|2620:fe::9}}<br />{{IPaddr|2620:fe::fe}} |
||
| Phishing, malware, and exploit kit domains |
| Phishing, malware, and exploit kit domains |
||
| |
| |
||
Line 244: | Line 317: | ||
| {{IPaddr|2620:fe::10}}<br />{{IPaddr|2620:fe::fe:10}} |
| {{IPaddr|2620:fe::10}}<br />{{IPaddr|2620:fe::fe:10}} |
||
| None |
| None |
||
| |
|||
|- |
|||
! | [[Wikimedia]] |
|||
| {{no|Informal}}<ref name="wikimedia-dns-privacy-policy">[https://meta.wikimedia.org/wiki/Wikimedia_DNS#Privacy_policy Wikimedia DNS: Privacy Policy]</ref> |
|||
| {{no}}<ref name="wikimedia-encrypted-dns">[https://wikitech.wikimedia.org/wiki/Wikimedia_DNS#Encrypted_DNS Wikimedia DNS: Encrypted DNS"]</ref> |
|||
| {{yes}}<ref name="wikimedia-dnssec">[https://wikitech.wikimedia.org/wiki/Wikimedia_DNS#DNSSEC Wikitech: Wikimedia DNS: DNSSEC]</ref> |
|||
| {{yes}}<ref name="wikimedia-tls">[https://wikitech.wikimedia.org/wiki/Wikimedia_DNS Wikitech: Wikimedia DNS]</ref> |
|||
| {{yes}}<ref name="wikimedia-https">[https://wikitech.wikimedia.org/wiki/Wikimedia_DNS Wikitech: Wikimedia DNS]</ref> |
|||
| {{no}} |
|||
| {{no}}<ref name="wikimedia-edns">[https://wikitech.wikimedia.org/wiki/Wikimedia_DNS#EDNS.280.29_Padding Wikitech: Wikimedia DNS: EDNS.280.29 Padding]</ref> |
|||
| {{no}} |
|||
| wikimedia-dns.org<ref name="wikimedia-dns-instructions">[https://meta.wikimedia.org/wiki/Wikimedia_DNS/Instructions Wikimedia DNS: Instructions]</ref> |
|||
| {{IPaddr|185.71.138.138}}<ref name="wikimedia-dns-instructions"></ref> |
|||
| {{IPaddr|2001:67c:930::1}}<ref name="wikimedia-dns-instructions"></ref> |
|||
| None<ref name="wikimedia-dns">[https://meta.wikimedia.org/wiki/Wikimedia_DNS Wikimedia DNS]</ref> |
|||
| |
| |
||
|- |
|- |
||
Line 255: | Line 343: | ||
| rowspan="3" ! {{yes}} |
| rowspan="3" ! {{yes}} |
||
| rowspan="3" ! {{yes}} |
| rowspan="3" ! {{yes}} |
||
| |
| common.dot.dns.yandex.net |
||
| {{IPaddr|77.88.8.8}}<br />{{IPaddr|77.88.8.1}} |
| {{IPaddr|77.88.8.8}}<br />{{IPaddr|77.88.8.1}} |
||
| {{IPaddr|2a02:6b8::feed:0ff}}<br />{{IPaddr|2a02:6b8:0:1::feed:0ff}} |
| {{IPaddr|2a02:6b8::feed:0ff}}<br />{{IPaddr|2a02:6b8:0:1::feed:0ff}} |
||
Line 261: | Line 349: | ||
| |
| |
||
|- |
|- |
||
| safe. |
| safe.dot.dns.yandex.net |
||
| {{IPaddr|77.88.8.88}}<br />{{IPaddr|77.88.8.2}} |
| {{IPaddr|77.88.8.88}}<br />{{IPaddr|77.88.8.2}} |
||
| {{IPaddr|2a02:6b8::feed:bad}}<br />{{IPaddr|2a02:6b8:0:1::feed:bad}} |
| {{IPaddr|2a02:6b8::feed:bad}}<br />{{IPaddr|2a02:6b8:0:1::feed:bad}} |
||
Line 267: | Line 355: | ||
| |
| |
||
|- |
|- |
||
| family. |
| family.dot.dns.yandex.net |
||
| {{IPaddr|77.88.8.7}}<br />{{IPaddr|77.88.8.3}} |
| {{IPaddr|77.88.8.7}}<br />{{IPaddr|77.88.8.3}} |
||
| {{IPaddr|2a02:6b8::feed:a11}}<br />{{IPaddr|2a02:6b8:0:1::feed:a11}} |
| {{IPaddr|2a02:6b8::feed:a11}}<br />{{IPaddr|2a02:6b8:0:1::feed:a11}} |
||
Line 279: | Line 367: | ||
== External links == |
== External links == |
||
* [https://dnscrypt.info/public-servers |
* [https://dnscrypt.info/public-servers Home page of the DNSCrypt project: Public DNS servers] |
||
[[Category:Domain Name System]] |
[[Category:Domain Name System]] |
Latest revision as of 06:34, 20 December 2024
A public recursive name server (also called public DNS resolver) is a name server service that networked computers may use to query the Domain Name System (DNS), the decentralized Internet naming system, in place of (or in addition to) name servers operated by the local Internet service provider (ISP) to which the devices are connected. Reasons for using these services include:
- speed, compared to using ISP DNS services[1]
- filtering (security, ad-blocking, porn-blocking, etc.)[2]
- reporting[3]
- avoiding censorship[4]
- redundancy (smart caching)[5]
- access to unofficial alternative top level domains not found in the official DNS root zone
- temporary unavailability of the ISP's name server
Public DNS resolver operators often cite increased privacy as an advantage of their services; critics of public DNS services have cited the possibility of mass data collection targeted at the public resolvers as a potential risk of using these services. Most services now support secure DNS lookup transport services such as DNS over TLS (DoT), DNS over HTTPS (DoH) and DNS over QUIC (DoQ).
Public DNS resolvers are operated either by commercial companies, offering their service for free use to the public, or by private enthusiasts to help spread new technologies and support non-profit communities.
Notable public DNS service operators
[edit]Provider | Privacy policy | DNS over UDP/TCP (Do53) | DNSSEC | DNS over TLS (DoT) | DNS over HTTPS (DoH) | DNS over QUIC (DoQ) | EDNS Padding | DNSCrypt | Hostname | IPv4 addresses | IPv6 addresses | Filters | Remarks |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
AdGuard | Yes[6] | Yes | Yes[7] | Yes | Yes[8] | Yes[9] | No | Yes[10] | dns.adguard-dns.com[11] | 94.140.14.14 94.140.15.15 |
2a10:50c0::ad1:ff 2a10:50c0::ad2:ff |
Default: ads and trackers[11] | |
family.adguard-dns.com | 94.140.14.15 94.140.15.16 |
2a10:50c0::bad1:ff 2a10:50c0::bad2:ff |
Family: ads, trackers, and adult content[11] | ||||||||||
unfiltered.adguard-dns.com | 94.140.14.140 94.140.14.141 |
2a10:50c0::1:ff 2a10:50c0::2:ff |
None[11] | ||||||||||
Alibaba | ? | Yes | ? | Yes | Yes | No | ? | No | dns.alidns.com | 223.5.5.5
223.6.6.6 |
2400:3200::1
2400:3200:baba::1 |
? | Chinese regulations |
CleanBrowsing | Yes[12] | Yes | Yes | Yes[13] | Yes[14] | No | Yes | Yes[15] | family-filter-dns.cleanbrowsing.org | 185.228.168.168 185.228.169.168 |
2a0d:2a00:1:: 2a0d:2a00:2:: |
Family | Designed to be used on devices of kids under 13. |
adult-filter-dns.cleanbrowsing.org | 185.228.168.10 185.228.169.11 |
2a0d:2a00:1::1 2a0d:2a00:2::1 |
Adult | ||||||||||
security-filter-dns.cleanbrowsing.org | 185.228.168.9 185.228.169.9 |
2a0d:2a00:1::2 2a0d:2a00:2::2 |
Security | ||||||||||
Cloudflare | Yes[16] | Yes | Yes[17] | Yes[18] | Yes[19] | No[20] | Yes | No | one.one.one.one[21] 1dot1dot1dot1.cloudflare-dns.com |
1.1.1.1 1.0.0.1 |
2606:4700:4700::1111 2606:4700:4700::1001 |
None | |
security.cloudflare-dns.com | 1.1.1.2 1.0.0.2 |
2606:4700:4700::1112 2606:4700:4700::1002 |
Malware, Phishing | ||||||||||
family.cloudflare-dns.com | 1.1.1.3 1.0.0.3 |
2606:4700:4700::1113 2606:4700:4700::1003 |
Malware, Phishing, Adult content |
||||||||||
dns64.cloudflare-dns.com | — | 2606:4700:4700::64 2606:4700:4700::6400 |
None | Intended to be IPv6-only.[22] See NAT64 and DNS64. | |||||||||
Yes[23] | Yes | Yes | Yes | Yes[24] | No | Yes | No | dns.google[25] | 8.8.8.8 8.8.4.4 |
2001:4860:4860::8888 2001:4860:4860::8844 |
None | ||
dns64.dns.google | — | 2001:4860:4860::6464 2001:4860:4860::64 |
None | Intended for networks with NAT64 gateway.[26] | |||||||||
Gcore | Yes[27] | Yes | Yes | No | No | No | No | No | — | 95.85.95.85 2.56.220.2 |
2a03:90c0:999d::1 2a03:90c0:9992::1 |
None | |
Mullvad | Only for VPN service available[28] | No[29] | Yes | Yes[29] | Yes[29] | No | No | No | dns.mullvad.net[29] | 194.242.2.2 | 2a07:e340::2 | None | Can be used without its VPN service |
adblock.dns.mullvad.net | 194.242.2.3 | 2a07:e340::3 | Ads, and trackers | ||||||||||
base.dns.mullvad.net | 194.242.2.4 | 2a07:e340::4 | Ads, trackers, and malware | ||||||||||
extended.dns.mullvad.net | 194.242.2.5 | 2a07:e340::5 | Ads, trackers, malware, and social media | ||||||||||
all.dns.mullvad.net | 194.242.2.9 | 2a07:e340::9 | Ads, trackers, malware, social media, gambling and adult content | ||||||||||
Vercara (formerly Neustar Security Services) | Yes[30] | Yes | Yes | No | No | No | No | No | ? | 64.6.64.6 64.6.65.6 |
2620:74:1b::1:1 2620:74:1c::2:2 |
None | Verisign transferred its public DNS to Neustar.[31] |
156.154.70.1 156.154.71.1 |
2610:a1:1018::1 2610:a1:1019::1 |
||||||||||||
156.154.70.2 156.154.71.2 |
2610:a1:1018::2 2610:a1:1019::2 |
Malware, ransomware, spyware, phishing | |||||||||||
156.154.70.3 156.154.71.3 |
2610:a1:1018::3 2610:a1:1019::3 |
Low security + gambling, pornography, violence, hate | |||||||||||
156.154.70.4 156.154.71.4 |
2610:a1:1018::4 2610:a1:1019::4 |
Medium security + gaming, adult, drugs, alcohol, anonymous proxies | |||||||||||
156.154.70.5 156.154.71.5 |
2610:a1:1018::5 2610:a1:1019::5 |
None | Will not redirect non-existent domains to a landing page. | ||||||||||
Cisco Umbrella (OpenDNS) | Yes[32] | Yes | Yes[33] | Yes | Yes[34] | No | Yes | Yes[35] | dns.opendns.com dns.umbrella.com[36] |
208.67.222.222 208.67.220.220 |
2620:119:35::35 2620:119:53::53 |
Basic Security filtering + user defined policies | |
familyshield.opendns.com | 208.67.222.123 208.67.220.123 |
2620:119:35::123 2620:119:53::123 |
FamilyShield: adult content | ||||||||||
sandbox.opendns.com | 208.67.222.2 208.67.220.2 |
2620:0:ccc::2 2620:0:ccd::2 |
None | Sandbox addresses that provide no filtering. | |||||||||
Oracle (formerly Dyn) | Yes[37] | Yes | Yes | No | No | No | No | No | resolver1.dyndnsinternetguide.com resolver2.dyndnsinternetguide.com rdns.dynect.net |
216.146.35.35 216.146.36.36 |
— | None | |
Quad9 | Yes[38][39] | Yes | Yes[40] | Yes[41] | Yes[42] | No | No | Yes[43] | dns.quad9.net | 9.9.9.9 149.112.112.112 |
2620:fe::9 2620:fe::fe |
Phishing, malware, and exploit kit domains | |
Yes[40] | dns11.quad9.net | 9.9.9.11 149.112.112.11 |
2620:fe::11 2620:fe::fe:11 |
Phishing, malware, and exploit kit domains | Passes EDNS Client Subnet. | ||||||||
No[44] | dns10.quad9.net | 9.9.9.10 149.112.112.10 |
2620:fe::10 2620:fe::fe:10 |
None | |||||||||
Wikimedia | Informal[45] | No[46] | Yes[47] | Yes[48] | Yes[49] | No | No[50] | No | wikimedia-dns.org[51] | 185.71.138.138[51] | 2001:67c:930::1[51] | None[52] | |
Yandex | No[53] | Yes | No | Yes | Yes | No | Yes | Yes | common.dot.dns.yandex.net | 77.88.8.8 77.88.8.1 |
2a02:6b8::feed:0ff 2a02:6b8:0:1::feed:0ff |
None | |
safe.dot.dns.yandex.net | 77.88.8.88 77.88.8.2 |
2a02:6b8::feed:bad 2a02:6b8:0:1::feed:bad |
Safe: fraudulent / infected / bot sites | ||||||||||
family.dot.dns.yandex.net | 77.88.8.7 77.88.8.3 |
2a02:6b8::feed:a11 2a02:6b8:0:1::feed:a11 |
Family: fraudulent / infected / bot / adult sites |
References
[edit]- ^ "How to Change Your Default DNS to Google DNS for Fast Internet Speeds". TechWorm. 2016-08-20. Retrieved 2016-10-22.
- ^ "A simple way to get around Rogers' DNS re-directing". IT Business. Retrieved 2016-10-22.
- ^ "OpenDNS Adds Centralized Reporting, IP-Layer Enforcement to Umbrella". mspmentor.net. Archived from the original on 2016-10-22. Retrieved 2016-10-22.
- ^ "Austrian Pirate Bay Blockade Censors Slovak Internet - TorrentFreak". TorrentFreak. 2015-12-03. Retrieved 2016-10-22.
- ^ Security; Iana. "DNS devastation: Top websites whacked offline as Dyn dies again". The Register. Retrieved 2016-10-22.
- ^ AdGuard DNS Privacy Notice
- ^ AdGuard DNS FAQ: What is DNSSEC?
- ^ The official release of AdGuard DNS — a new unique approach to privacy-oriented DNS
- ^ AdGuard DNS-over-QUIC
- ^ Adguard DNS now supports DNSCrypt
- ^ a b c d AdGuard DNS Setup guide
- ^ NOC.org / dcid. "CleanBrowsing Privacy and Terms of Service". Cleanbrowsing.org. Retrieved 2019-01-04.
- ^ "Parental Control with DNS over TLS Support".
- ^ NOC.org / dcid. "Parental Control with DNS Over HTTPS (DoH) Support". Cleanbrowsing.org. Retrieved 2019-01-04.
- ^ NOC.org / dcid. "Parental Control with DNSCrypt Support". Cleanbrowsing.org. Retrieved 2019-01-04.
- ^ "Privacy Policy". Cloudflare. Retrieved 2019-01-04.
- ^ "The Nitty Gritty - Cloudflare Resolver". 24 January 2023.
- ^ Cloudflare Inc (2018-03-31). "DNS over TLS - Cloudflare Resolver". Developers.cloudflare.com. Retrieved 2019-01-04.
- ^ Cloudflare Inc. "DNS over HTTPS - Cloudflare Resolver". Developers.cloudflare.com. Retrieved 2019-01-04.
- ^ "DNS over QUIC (DoQ)". Cloudflare Community. Retrieved 2022-09-12.
- ^ "Test DNS owner one.one.one.one". 2018-08-21.
- ^ "Supporting IPv6-only Networks". Archived from the original on 2020-12-09. Retrieved 2019-01-20.
- ^ Google Public DNS: Your Privacy
- ^ Google Public DNS: DNS-over-HTTPS
- ^ "Get Started | Public DNS".
- ^ Google Public DNS64
- ^ "Legal Information on Gcore Services".
- ^ "Privacy policy - Guides". Mullvad VPN. Retrieved 2023-08-27.
- ^ a b c d "DNS over HTTPS and DNS over TLS - Guides". Mullvad. 2023-08-08. Retrieved 2023-08-23.
- ^ "Privacy Policy | Neustar". home.neustar.
- ^ "Verisign Public DNS Offers DNS Stability And Security – Verisign". www.verisign.com. Archived from the original on 2021-03-31. Retrieved 2020-12-05.
- ^ Cisco Online Privacy Statement
- ^ OpenDNS: DNSSEC General Availability
- ^ OpenDNS: Querying OpenDNS using DoH
- ^ OpenDNS: OpenDNS and DNSCrypt
- ^ Cisco Umbrella Enhances Support of DNS Encryption with DNS Over HTTPS
- ^ "Oracle's Privacy Policy". dyn.com. Retrieved 2018-12-31.
- ^ Quad9: Compliance and Applicable Law
- ^ Quad9: Data and Privacy Policy
- ^ a b Quad9 FAQ: Does Quad9 implement DNSSEC?
- ^ Quad9 FAQ: Does Quad9 support DNS over TLS?
- ^ Quad9 FAQ: Does Quad9 support DNS over HTTPS (DoH)?
- ^ Quad9 FAQ: Does Quad9 support dnscrypt?
- ^ Quad9 FAQ: Is there a service that Quad9 offers that does not have the blocklist or other security?
- ^ Wikimedia DNS: Privacy Policy
- ^ Wikimedia DNS: Encrypted DNS"
- ^ Wikitech: Wikimedia DNS: DNSSEC
- ^ Wikitech: Wikimedia DNS
- ^ Wikitech: Wikimedia DNS
- ^ Wikitech: Wikimedia DNS: EDNS.280.29 Padding
- ^ a b c Wikimedia DNS: Instructions
- ^ Wikimedia DNS
- ^ Terms of use of the Yandex.DNS service