Router Security DNS Providers Website by     
Michael Horowitz 
Home Site Index Bugs News Security Checklist Tests DNS Resources Stats Search Popular Pages
Also see my Defensive Computing Checklist website
 
DNS Providers Below (on this page)
Quad9  NextDNS Cloudflare  Mullvad 
OpenDNS  AdGuard Control D Clean Browsing
dns0.eu Privacy DNS Canadian Shield PDNS
Other DNS Pages
Test Your DNS   Long DNS Explanation  Still More To Say

Suggested DNS Providers

There are many choices for DNS providers and the normal default, using DNS servers from an ISP, is typically the worst option. The list below of DNS providers is far from complete, it is just those I would feel comfortable using.

Most of these providers offer more than plain vanilla DNS resolution. They offer ad blocking, tracker blocking and/or malware blocking. Many people get some of this by installing a browser extension such as uBlock Origin. DNS offers another solution to the same problem and they can both work concurrently. Also, DNS can work at the OS level, something no browser extension can do.

Old insecure DNS is specified with IP addresses (normally two of them). New Secure DNS is specified with a server name. If you are not familiar with Old vs. new DNS, see the DNS Long Explanation page. Typically a company offers one server for DoH and another for DoT. That said, the two secure DNS flavors use different TCP ports, so it is possible for both to be available on a single server.

OTHER LISTS OF DNS PROVIDERS

GOVERNMENTS AND DNS

TESTING DNS SERVICES

URLhaus is in the business of collecting, tracking and sharing malware URLs. Their Statistics page (in the Blocklist Comparison section) compares DNS providers in terms of blocking malware domains (they do not test ad or tracker blocking). Sadly the data is undated. When I checked in January 2025, the best were OpenBLD, Spamhaus DBL, ProtonDNS and dns0.eu DNS. Among the worst were SURBL, AdGuard DNS and Cloudflare DNS.

Nexxwave
Here too, the test is against malware domains, no ad blocking, no tracker blocking.

  1. September 9, 2024: Public DNS malware filters tested in September 2024 by Kris Lowet. In brief: ControlD was the best. Quad9, DNS0 and CleanBrowsing were excellent. Cloudflare for Families was miserable.
  2. June 5, 2023: Public DNS malware filters tested by Kris Lowet. The worst was Comodo Secure DNS which blocked nothing. Cloudflare for Families (1.1.1.2) was very bad, blocking only 13%. Quad9 blocked 78%. CleanBrowsing Security Filter blocked 87%. The two best services were dns0.eu and dns0.eu ZERO which both blocked 94%.

Years back there was an issue with the old insecure DNS system that let bad guys intercept an outbound request and forge a response. A fix was created that introduced more randomness in the source port and/or transaction ID of these old insecure DNS requests. Steve Gibson created a DNS spoofability test that evaluates how well a DNS server does in regard to this randomness. The test is a web page with no creation date and no last update date, but the bug/problem/issue first came to light in 2008. The test is not aware of the new secure DNS system, so probably best not to run it from a browser using secure DNS. That said, I tested it with Firefox v114 (June 2023 on Windows) that was using NextDNS for secure DNS. The tester picked up three NextDNS servers and they all tested very well.



Top 
Page Created: March 13, 2022      
Last Updated: February 11, 2025 5PM CT
Viewed 51,243 times
(48/day over 1,076 days)     
Website by Michael Horowitz      
Feedback: routers __at__ michaelhorowitz dot com  
Changelog
Copyright 2015 - 2025