DNS over HTTPS (DoH) Lookup - Test Encrypted DNS

All queries encrypted via HTTPS • No logs stored

Query DNS records via encrypted HTTPS connections from 5 major DoH providers. Compare response times and consistency from Cloudflare, Google, OpenDNS, AdGuard, and NextDNS.

Free DoH Provider Testing Tool

RFC 8484 Protocol
5 DoH Providers
Response Timing
100% Free

DNS over HTTPS Lookup

Query DNS records via encrypted HTTPS from 5 major providers

CF G OD AG ND

Test Encrypted DNS Queries Across 5 Major DoH Providers

DNS over HTTPS (DoH) encrypts your DNS queries using HTTPS, hiding them from ISPs and network observers. This tool queries 5 major DoH providers simultaneously—Cloudflare, Google, OpenDNS, AdGuard, and NextDNS—using the RFC 8484 wire format. Compare response times from your location and detect any DNS discrepancies between providers.

What You'll Discover

🔒
Encrypted Queries All DNS lookups sent over HTTPS using RFC 8484 wire format
⏱️
Response Timing Real-time performance comparison across all 5 providers
Consistency Check Automatic detection of DNS discrepancies between resolvers
📊
Multi-Record Types Query A, AAAA, MX, TXT, NS, and CNAME records via DoH

Can Find

  • Response times from 5 DoH providers (Cloudflare, Google, OpenDNS, AdGuard, NextDNS)
  • DNS records returned by each provider with TTL values
  • Consistency analysis showing if providers return identical results
  • Fastest DoH provider from your geographic location
  • Support for A, AAAA, MX, TXT, NS, and CNAME record types

Cannot Find

  • Whether your browser is using DoH (this tests providers, not your config)
  • DNS leak detection (use a dedicated DNS leak test)
  • DNSSEC validation status (use DNSSEC Checker)
  • Custom DoH server testing (5 pre-configured providers only)
  • Continuous monitoring (single query, not real-time)

How to Test DNS over HTTPS

Compare encrypted DNS queries across 5 providers in seconds

1

Enter Domain Name

Type the domain you want to query (e.g., google.com). URLs with https:// and www prefixes are automatically cleaned.

2

Select Record Type

Choose A (IPv4), AAAA (IPv6), MX (mail servers), TXT (text records), NS (nameservers), or CNAME (aliases).

3

Click Query

We send RFC 8484 DoH requests to all 5 providers in parallel. Encrypted queries protect your lookup from eavesdropping.

4

Compare Provider Results

View DNS records from each provider with response times. The consistency indicator shows if all providers agree on the results.

Understanding Your DoH Lookup Results

What each part of the multi-provider comparison reveals

Provider Name & IP

The DoH provider queried and their resolver IP address. We test Cloudflare (1.1.1.1), Google (8.8.8.8), OpenDNS (208.67.222.222), AdGuard (94.140.14.14), and NextDNS (45.90.28.0). Each provider has different privacy policies and features.

Example: Cloudflare (1.1.1.1)

Response Time (ms)

How long each provider took to respond to your encrypted query. Times vary by your location—providers with nearby edge servers respond faster. Use this to find the fastest DoH resolver for your network.

Example: 45ms

DNS Records

The actual DNS records returned by each provider. Most providers should return identical results, but filtering providers like AdGuard may return different results for blocked domains (ad/tracker domains).

Example: 93.184.216.34 (A record)

Consistency Status

Whether all providers returned the same DNS records. Green = all agree, Yellow = mostly consistent, Red = significant differences. Differences may indicate DNS filtering, caching variations, or geographic DNS load balancing.

Example: All Providers Agree ✓

TTL (Time To Live)

How long the DNS record is cached before refreshing. Displayed per-record with human-readable format (5m, 1h, 24h). TTL values may vary slightly between providers due to caching differences.

Example: 5m (300 seconds)

Fastest Provider

The DoH provider with the lowest response time from your location. This is your optimal choice for daily DoH usage. Response times depend on network latency to each provider's edge servers.

Example: Cloudflare (45ms)

Why Use Our DNS over HTTPS Tool

The only tool that tests 5 DoH providers simultaneously

True RFC 8484 Protocol

We use actual DNS wire format over HTTPS, not simplified JSON APIs. Your queries are encrypted exactly as they would be with a DoH-enabled browser or system.

5 Major Providers

Test Cloudflare, Google, OpenDNS, AdGuard, and NextDNS in one query. Compare response times and detect which provider serves your location fastest.

Real Response Timing

Actual response times from each provider measured from our servers. Find out which DoH resolver has the lowest latency for your queries.

Consistency Checking

Automatic detection of DNS discrepancies between providers. Spot filtering differences—AdGuard blocks ads, some may cache differently.

6 Record Types

Query A (IPv4), AAAA (IPv6), MX (mail), TXT (text), NS (nameservers), and CNAME (aliases) across all 5 DoH providers.

Export Results

Download your DoH lookup results as JSON, CSV, or plain text. Perfect for documentation, comparison reports, or API integration.

When to Use DoH Lookup

Real scenarios where testing DoH providers matters

Find Your Fastest DoH Provider

Response times vary by location. Test all 5 providers to discover which one has the lowest latency from your network. Cloudflare is often fastest, but Google or NextDNS may be faster in certain regions.

Debug DNS Inconsistencies

When DNS behaves differently across networks, test via DoH to isolate the issue. If all DoH providers return the same result, the problem is likely local DNS caching or ISP filtering.

Compare Filtering Providers

AdGuard blocks ads and trackers at DNS level. Test a suspected ad domain—if AdGuard returns no records but others do, the domain is blocked. Useful for evaluating filtering DNS options.

Learn How DoH Works

See encrypted DNS in action. Watch how RFC 8484 queries work across multiple providers. Educational tool for understanding privacy-focused DNS infrastructure.

How DNS over HTTPS Works

DoH encrypts DNS queries using HTTPS, preventing eavesdropping and manipulation. Here's what happens under the hood.

RFC 8484 Wire Format

Our tool uses true DoH as defined in RFC 8484. We build DNS wire-format query packets (transaction ID, flags, question section), then send them via HTTPS POST with Content-Type: application/dns-message. The response is a binary DNS message, not simplified JSON. This is identical to how Firefox, Chrome, and system-level DoH implementations query DNS.

Why DoH Matters for Privacy

Traditional DNS sends queries in plain text over UDP port 53. Your ISP can see every domain you look up—building a profile of your browsing. DoH wraps DNS in HTTPS encryption, making queries indistinguishable from regular web traffic. ISPs see you connecting to 1.1.1.1 or 8.8.8.8 but cannot see which domains you're querying.

Our 5 DoH Providers

We test 5 major DoH providers: Cloudflare (1.1.1.1) offers speed and privacy-first policies with no logging. Google (8.8.8.8) provides reliability and global coverage. OpenDNS (208.67.222.222) is Cisco-backed with enterprise features. AdGuard (94.140.14.14) blocks ads and trackers at DNS level. NextDNS (45.90.28.0) offers customizable security profiles.

DoH vs DoT: Key Differences

DNS over HTTPS (DoH) uses port 443 and blends with regular HTTPS traffic—harder to block. DNS over TLS (DoT) uses dedicated port 853, making it easier for networks to identify and block. DoH has native browser support; DoT requires OS-level configuration. Both encrypt DNS queries, but DoH is more firewall-resistant. Use our DNS over TLS tool to test DoT providers.

DoH Lookup Specifications

Protocol
DNS over HTTPS (RFC 8484 wire format)
Providers Tested
Cloudflare, Google, OpenDNS, AdGuard, NextDNS
Record Types
A, AAAA, MX, TXT, NS, CNAME
Query Method
Parallel multi-provider (concurrent requests)
Timeout
10 seconds per provider
Cache Duration
5 minutes (300 seconds)
Export Formats
JSON, CSV, Plain Text
API Access
Available at /api/v1/dns-over-https

Frequently Asked Questions

What is DNS over HTTPS (DoH)?

DNS over HTTPS is a protocol defined in RFC 8484 that encrypts DNS queries using HTTPS. Instead of sending DNS requests in plain text (which your ISP can see), DoH wraps queries in encrypted HTTPS connections. This protects your browsing privacy from ISPs, network operators, and anyone monitoring your traffic.

Which DoH providers does this tool test?

We query 5 major DoH providers simultaneously: Cloudflare (1.1.1.1), Google (8.8.8.8), OpenDNS (208.67.222.222), AdGuard (94.140.14.14), and NextDNS (45.90.28.0). All support RFC 8484 DNS wire format and have globally distributed infrastructure for fast responses.

Why might DoH providers return different results?

Different results typically happen due to: DNS caching differences (varying TTLs), security filtering (AdGuard blocks ads/trackers), geographic DNS load balancing (CDNs return different IPs by location), or propagation timing after DNS changes. Our consistency indicator highlights when providers disagree.

Is this a DNS leak test?

No. A DNS leak test checks if YOUR device's DNS queries are going through your VPN or leaking to your ISP. This tool directly queries DoH providers from our servers and compares their results. To test for DNS leaks, use a dedicated DNS leak testing service.

Which DoH provider is fastest?

It depends on your geographic location. Run a query and compare response times to find the fastest provider for your network. Cloudflare is often fastest due to their global edge network, but Google, NextDNS, or OpenDNS may be faster in certain regions.

What record types can I query via DoH?

This tool supports 6 DNS record types via DoH: A (IPv4 addresses), AAAA (IPv6 addresses), MX (mail servers), TXT (text records like SPF/DMARC), NS (nameservers), and CNAME (aliases). Select the record type from the dropdown before querying.

Does AdGuard return different results for ad domains?

Yes. AdGuard DNS blocks ads and trackers at the DNS level. If you query a known ad/tracking domain, AdGuard may return no records (NXDOMAIN) while other providers return the actual IP addresses. This is expected behavior—it's how DNS-based ad blocking works.

How do I enable DNS over HTTPS on my device?

For browsers: Firefox and Chrome have built-in DoH settings under Privacy/Security. For system-wide DoH: Windows 11 supports it in Network settings, macOS requires the Cloudflare 1.1.1.1 app or a configuration profile, and Linux can use systemd-resolved. This tool tests DoH providers—it doesn't configure your device.

What's the difference between DoH and DoT?

Both encrypt DNS queries, but DoH uses HTTPS on port 443 (blends with web traffic, hard to block), while DoT uses TLS on dedicated port 853 (easier for networks to identify and block). DoH has native browser support; DoT requires OS configuration. Use our DNS over TLS tool to test DoT.

How long are DoH results cached?

Our tool caches results for 5 minutes. If you query the same domain and record type within 5 minutes, you'll get cached results. Wait 5 minutes or query a different domain for fresh responses. The TTL values shown are from the DNS providers, not our cache.

Test Your DNS over HTTPS Now

Enter a domain above to query 5 major DoH providers. Compare response times, check consistency, and find the fastest encrypted DNS resolver for your location.

Try DoH Lookup