Apublic recursive name server (also calledpublic DNS resolver) is aname server service that networked computers may use to query theDomain Name System (DNS), the decentralized Internet naming system, in place of (or in addition to) name servers operated by the localInternet service provider (ISP) to which the devices are connected. Reasons for using these services include:
Public DNS resolver operators often cite increased privacy as an advantage of their services; critics of public DNS services have cited the possibility of mass data collection targeted at the public resolvers as a potential risk of using these services. Most services now support secure DNS lookup transport services such asDNS over TLS (DoT),DNS over HTTPS (DoH) andDNS over QUIC (DoQ).
Public DNS resolvers are operated either by commercial companies, offering their service for free use to the public, or by private enthusiasts to help spread new technologies and support non-profit communities.
| Provider | Privacy policy | DNS over UDP/TCP (Do53) | DNSSEC | DNS over TLS (DoT) | DNS over HTTPS (DoH) | DNS over QUIC (DoQ) | EDNS Padding | DNSCrypt | Hostname | IPv4 addresses | IPv6 addresses | Filters | Remarks |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| AdGuard | Yes[6] | Yes | Yes[7] | Yes | Yes[8] | Yes[9] | No | Yes[10] | dns.adguard-dns.com[11] | 94.140.14.14 94.140.15.15 | 2a10:50c0::ad1:ff 2a10:50c0::ad2:ff | Default: ads and trackers[11] | |
| family.adguard-dns.com | 94.140.14.15 94.140.15.16 | 2a10:50c0::bad1:ff 2a10:50c0::bad2:ff | Family: ads, trackers, and adult content[11] | ||||||||||
| unfiltered.adguard-dns.com | 94.140.14.140 94.140.14.141 | 2a10:50c0::1:ff 2a10:50c0::2:ff | None[11] | ||||||||||
| Alibaba | ? | Yes | No | Yes | Yes | Yes | No | No | dns.alidns.com | 223.5.5.5 223.6.6.6 | 2400:3200::1 2400:3200:baba::1 | ? | Chinese regulations |
| Cloudflare | Yes[12] | Yes | Yes[13] | Yes[14] | Yes[15] | No[16] | Yes | No | one.one.one.one[17] 1dot1dot1dot1.cloudflare-dns.com | 1.1.1.1 1.0.0.1 | 2606:4700:4700::1111 2606:4700:4700::1001 | None | |
| security.cloudflare-dns.com | 1.1.1.2 1.0.0.2 | 2606:4700:4700::1112 2606:4700:4700::1002 | Malware, Phishing | ||||||||||
| family.cloudflare-dns.com | 1.1.1.3 1.0.0.3 | 2606:4700:4700::1113 2606:4700:4700::1003 | Malware, Phishing, Adult content | ||||||||||
| dns64.cloudflare-dns.com | — | 2606:4700:4700::64 2606:4700:4700::6400 | None | Intended to be IPv6-only.[18] SeeNAT64 andDNS64. | |||||||||
| DNS4EU | ? | Yes | Yes | Yes | Yes | No | Yes | No | protective.joindns4.eu | 86.54.11.1 86.54.11.201 | 2a13:1001::86:54:11:1 2a13:1001::86:54:11:201 | Malware, phishing | Developed forEU citizens |
| child-noads.joindns4.eu | 86.54.11.11 86.54.11.211 | 2a13:1001::86:54:11:11 2a13:1001::86:54:11:211 | Malware, phishing, adult content, ads | ||||||||||
| child.joindns4.eu | 86.54.11.12 86.54.11.212 | 2a13:1001::86:54:11:12 2a13:1001::86:54:11:212 | Malware, phishing, adult content | ||||||||||
| noads.joindns4.eu | 86.54.11.13 86.54.11.213 | 2a13:1001::86:54:11:13 2a13:1001::86:54:11:213 | Malware, phishing, ads | ||||||||||
| unfiltered.joindns4.eu | 86.54.11.100 86.54.11.200 | 2a13:1001::86:54:11:100 2a13:1001::86:54:11:200 | None | ||||||||||
| Yes[19] | Yes | Yes | Yes | Yes[20] | No | Yes | No | dns.google[21] | 8.8.8.8 8.8.4.4 | 2001:4860:4860::8888 2001:4860:4860::8844 | None | ||
| dns64.dns.google | — | 2001:4860:4860::6464 2001:4860:4860::64 | None | Intended for networks with NAT64 gateway.[22] | |||||||||
| Gcore | Yes[23] | Yes | Yes | No | No | No | No | No | — | 95.85.95.85 2.56.220.2 | 2a03:90c0:999d::1 2a03:90c0:9992::1 | None | |
| Mullvad | Only for VPN service available[24] | No[25] | Yes | Yes[25] | Yes[25] | No | Yes | No | dns.mullvad.net[25] | 194.242.2.2 | 2a07:e340::2 | None | Can be used without its VPN service |
| adblock.dns.mullvad.net | 194.242.2.3 | 2a07:e340::3 | Ads, and trackers | ||||||||||
| base.dns.mullvad.net | 194.242.2.4 | 2a07:e340::4 | Ads, trackers, and malware | ||||||||||
| extended.dns.mullvad.net | 194.242.2.5 | 2a07:e340::5 | Ads, trackers, malware, and social media | ||||||||||
| all.dns.mullvad.net | 194.242.2.9 | 2a07:e340::9 | Ads, trackers, malware, social media, gambling and adult content | ||||||||||
| Vercara (formerlyNeustar Security Services) | Yes[26] | Yes | Yes | No | No | No | No | No | ? | 64.6.64.6 64.6.65.6 | 2620:74:1b::1:1 2620:74:1c::2:2 | None | Verisign transferred its public DNS to Neustar.[27] |
| 156.154.70.1 156.154.71.1 | 2610:a1:1018::1 2610:a1:1019::1 | ||||||||||||
| 156.154.70.2 156.154.71.2 | 2610:a1:1018::2 2610:a1:1019::2 | Malware, ransomware, spyware, phishing | |||||||||||
| 156.154.70.3 156.154.71.3 | 2610:a1:1018::3 2610:a1:1019::3 | Low security + gambling, pornography, violence, hate | |||||||||||
| 156.154.70.4 156.154.71.4 | 2610:a1:1018::4 2610:a1:1019::4 | Medium security + gaming, adult, drugs, alcohol, anonymous proxies | |||||||||||
| 156.154.70.5 156.154.71.5 | 2610:a1:1018::5 2610:a1:1019::5 | None | Will not redirect non-existent domains to a landing page. | ||||||||||
| Cisco Umbrella (OpenDNS) | Yes[28] | Yes | Yes[29] | Yes | Yes[30] | No | Yes | Yes[31] | dns.opendns.com dns.umbrella.com[32] | 208.67.222.222 208.67.220.220 | 2620:119:35::35 2620:119:53::53 | Basic Security filtering + user defined policies | |
| familyshield.opendns.com | 208.67.222.123 208.67.220.123 | 2620:119:35::123 2620:119:53::123 | FamilyShield: adult content | ||||||||||
| sandbox.opendns.com | 208.67.222.2 208.67.220.2 | 2620:0:ccc::2 2620:0:ccd::2 | None | Sandbox addresses that provide no filtering. | |||||||||
| Oracle (formerlyDyn) | Yes[33] | Yes | Yes | No | No | No | No | No | resolver1.dyndnsinternetguide.com resolver2.dyndnsinternetguide.com rdns.dynect.net | 216.146.35.35 216.146.36.36 | — | None | |
| Quad9 | Yes[34][35] | Yes | Yes[36] | Yes[37] | Yes[38] | No | No | Yes[39] | dns.quad9.net | 9.9.9.9 149.112.112.112 | 2620:fe::9 2620:fe::fe | Phishing, malware, and exploit kit domains | |
| Yes[36] | dns11.quad9.net | 9.9.9.11 149.112.112.11 | 2620:fe::11 2620:fe::fe:11 | Phishing, malware, and exploit kit domains | PassesEDNS Client Subnet. | ||||||||
| No[40] | dns10.quad9.net | 9.9.9.10 149.112.112.10 | 2620:fe::10 2620:fe::fe:10 | None | |||||||||
| Tencent | ? | Yes | Yes | Yes | Yes | Yes | No | No | dns.pub | 119.29.29.29 | 2402:4e00:: | ? | Chinese regulations |
| Wikimedia | Informal[41] | No[42] | Yes[43] | Yes[44] | Yes[45] | No | No[46] | No | wikimedia-dns.org[47] | 185.71.138.138[47] | 2001:67c:930::1[47] | None[48] | |
| Yandex | No[49] | Yes | No | Yes | Yes | No | Yes | Yes | common.dot.dns.yandex.net | 77.88.8.8 77.88.8.1 | 2a02:6b8::feed:0ff 2a02:6b8:0:1::feed:0ff | None | |
| safe.dot.dns.yandex.net | 77.88.8.88 77.88.8.2 | 2a02:6b8::feed:bad 2a02:6b8:0:1::feed:bad | Safe: fraudulent / infected / bot sites | ||||||||||
| family.dot.dns.yandex.net | 77.88.8.7 77.88.8.3 | 2a02:6b8::feed:a11 2a02:6b8:0:1::feed:a11 | Family: fraudulent / infected / bot / adult sites |