DNS over HTTPS (DoH) Lookup - Test Encrypted DNS
All queries encrypted via HTTPS • No logs stored
Query DNS records via encrypted HTTPS connections from 5 major DoH providers. Compare response times and consistency from Cloudflare, Google, OpenDNS, AdGuard, and NextDNS.
Free DoH Provider Testing Tool
DNS over HTTPS Lookup
Query DNS records via encrypted HTTPS from 5 major providers
Test Encrypted DNS Queries Across 5 Major DoH Providers
DNS over HTTPS (DoH) encrypts your DNS queries using HTTPS, hiding them from ISPs and network observers. This tool queries 5 major DoH providers simultaneously—Cloudflare, Google, OpenDNS, AdGuard, and NextDNS—using the RFC 8484 wire format. Compare response times from your location and detect any DNS discrepancies between providers.
What You'll Discover
Can Find
- Response times from 5 DoH providers (Cloudflare, Google, OpenDNS, AdGuard, NextDNS)
- DNS records returned by each provider with TTL values
- Consistency analysis showing if providers return identical results
- Fastest DoH provider from your geographic location
- Support for A, AAAA, MX, TXT, NS, and CNAME record types
Cannot Find
- Whether your browser is using DoH (this tests providers, not your config)
- DNS leak detection (use a dedicated DNS leak test)
- DNSSEC validation status (use DNSSEC Checker)
- Custom DoH server testing (5 pre-configured providers only)
- Continuous monitoring (single query, not real-time)
How to Test DNS over HTTPS
Compare encrypted DNS queries across 5 providers in seconds
Enter Domain Name
Type the domain you want to query (e.g., google.com). URLs with https:// and www prefixes are automatically cleaned.
Select Record Type
Choose A (IPv4), AAAA (IPv6), MX (mail servers), TXT (text records), NS (nameservers), or CNAME (aliases).
Click Query
We send RFC 8484 DoH requests to all 5 providers in parallel. Encrypted queries protect your lookup from eavesdropping.
Compare Provider Results
View DNS records from each provider with response times. The consistency indicator shows if all providers agree on the results.
Understanding Your DoH Lookup Results
What each part of the multi-provider comparison reveals
Provider Name & IP
The DoH provider queried and their resolver IP address. We test Cloudflare (1.1.1.1), Google (8.8.8.8), OpenDNS (208.67.222.222), AdGuard (94.140.14.14), and NextDNS (45.90.28.0). Each provider has different privacy policies and features.
Cloudflare (1.1.1.1)
Response Time (ms)
How long each provider took to respond to your encrypted query. Times vary by your location—providers with nearby edge servers respond faster. Use this to find the fastest DoH resolver for your network.
45ms
DNS Records
The actual DNS records returned by each provider. Most providers should return identical results, but filtering providers like AdGuard may return different results for blocked domains (ad/tracker domains).
93.184.216.34 (A record)
Consistency Status
Whether all providers returned the same DNS records. Green = all agree, Yellow = mostly consistent, Red = significant differences. Differences may indicate DNS filtering, caching variations, or geographic DNS load balancing.
All Providers Agree ✓
TTL (Time To Live)
How long the DNS record is cached before refreshing. Displayed per-record with human-readable format (5m, 1h, 24h). TTL values may vary slightly between providers due to caching differences.
5m (300 seconds)
Fastest Provider
The DoH provider with the lowest response time from your location. This is your optimal choice for daily DoH usage. Response times depend on network latency to each provider's edge servers.
Cloudflare (45ms)
Why Use Our DNS over HTTPS Tool
The only tool that tests 5 DoH providers simultaneously
True RFC 8484 Protocol
We use actual DNS wire format over HTTPS, not simplified JSON APIs. Your queries are encrypted exactly as they would be with a DoH-enabled browser or system.
5 Major Providers
Test Cloudflare, Google, OpenDNS, AdGuard, and NextDNS in one query. Compare response times and detect which provider serves your location fastest.
Real Response Timing
Actual response times from each provider measured from our servers. Find out which DoH resolver has the lowest latency for your queries.
Consistency Checking
Automatic detection of DNS discrepancies between providers. Spot filtering differences—AdGuard blocks ads, some may cache differently.
6 Record Types
Query A (IPv4), AAAA (IPv6), MX (mail), TXT (text), NS (nameservers), and CNAME (aliases) across all 5 DoH providers.
Export Results
Download your DoH lookup results as JSON, CSV, or plain text. Perfect for documentation, comparison reports, or API integration.
When to Use DoH Lookup
Real scenarios where testing DoH providers matters
Find Your Fastest DoH Provider
Response times vary by location. Test all 5 providers to discover which one has the lowest latency from your network. Cloudflare is often fastest, but Google or NextDNS may be faster in certain regions.
Debug DNS Inconsistencies
When DNS behaves differently across networks, test via DoH to isolate the issue. If all DoH providers return the same result, the problem is likely local DNS caching or ISP filtering.
Compare Filtering Providers
AdGuard blocks ads and trackers at DNS level. Test a suspected ad domain—if AdGuard returns no records but others do, the domain is blocked. Useful for evaluating filtering DNS options.
Learn How DoH Works
See encrypted DNS in action. Watch how RFC 8484 queries work across multiple providers. Educational tool for understanding privacy-focused DNS infrastructure.
How DNS over HTTPS Works
DoH encrypts DNS queries using HTTPS, preventing eavesdropping and manipulation. Here's what happens under the hood.
RFC 8484 Wire Format
Our tool uses true DoH as defined in RFC 8484. We build DNS wire-format query packets (transaction ID, flags, question section), then send them via HTTPS POST with Content-Type: application/dns-message. The response is a binary DNS message, not simplified JSON. This is identical to how Firefox, Chrome, and system-level DoH implementations query DNS.
Why DoH Matters for Privacy
Traditional DNS sends queries in plain text over UDP port 53. Your ISP can see every domain you look up—building a profile of your browsing. DoH wraps DNS in HTTPS encryption, making queries indistinguishable from regular web traffic. ISPs see you connecting to 1.1.1.1 or 8.8.8.8 but cannot see which domains you're querying.
Our 5 DoH Providers
We test 5 major DoH providers: Cloudflare (1.1.1.1) offers speed and privacy-first policies with no logging. Google (8.8.8.8) provides reliability and global coverage. OpenDNS (208.67.222.222) is Cisco-backed with enterprise features. AdGuard (94.140.14.14) blocks ads and trackers at DNS level. NextDNS (45.90.28.0) offers customizable security profiles.
DoH vs DoT: Key Differences
DNS over HTTPS (DoH) uses port 443 and blends with regular HTTPS traffic—harder to block. DNS over TLS (DoT) uses dedicated port 853, making it easier for networks to identify and block. DoH has native browser support; DoT requires OS-level configuration. Both encrypt DNS queries, but DoH is more firewall-resistant. Use our DNS over TLS tool to test DoT providers.
DoH Lookup Specifications
- Protocol
- DNS over HTTPS (RFC 8484 wire format)
- Providers Tested
- Cloudflare, Google, OpenDNS, AdGuard, NextDNS
- Record Types
- A, AAAA, MX, TXT, NS, CNAME
- Query Method
- Parallel multi-provider (concurrent requests)
- Timeout
- 10 seconds per provider
- Cache Duration
- 5 minutes (300 seconds)
- Export Formats
- JSON, CSV, Plain Text
- API Access
- Available at /api/v1/dns-over-https
Frequently Asked Questions
What is DNS over HTTPS (DoH)?
DNS over HTTPS is a protocol defined in RFC 8484 that encrypts DNS queries using HTTPS. Instead of sending DNS requests in plain text (which your ISP can see), DoH wraps queries in encrypted HTTPS connections. This protects your browsing privacy from ISPs, network operators, and anyone monitoring your traffic.
Which DoH providers does this tool test?
We query 5 major DoH providers simultaneously: Cloudflare (1.1.1.1), Google (8.8.8.8), OpenDNS (208.67.222.222), AdGuard (94.140.14.14), and NextDNS (45.90.28.0). All support RFC 8484 DNS wire format and have globally distributed infrastructure for fast responses.
Why might DoH providers return different results?
Different results typically happen due to: DNS caching differences (varying TTLs), security filtering (AdGuard blocks ads/trackers), geographic DNS load balancing (CDNs return different IPs by location), or propagation timing after DNS changes. Our consistency indicator highlights when providers disagree.
Is this a DNS leak test?
No. A DNS leak test checks if YOUR device's DNS queries are going through your VPN or leaking to your ISP. This tool directly queries DoH providers from our servers and compares their results. To test for DNS leaks, use a dedicated DNS leak testing service.
Which DoH provider is fastest?
It depends on your geographic location. Run a query and compare response times to find the fastest provider for your network. Cloudflare is often fastest due to their global edge network, but Google, NextDNS, or OpenDNS may be faster in certain regions.
What record types can I query via DoH?
This tool supports 6 DNS record types via DoH: A (IPv4 addresses), AAAA (IPv6 addresses), MX (mail servers), TXT (text records like SPF/DMARC), NS (nameservers), and CNAME (aliases). Select the record type from the dropdown before querying.
Does AdGuard return different results for ad domains?
Yes. AdGuard DNS blocks ads and trackers at the DNS level. If you query a known ad/tracking domain, AdGuard may return no records (NXDOMAIN) while other providers return the actual IP addresses. This is expected behavior—it's how DNS-based ad blocking works.
How do I enable DNS over HTTPS on my device?
For browsers: Firefox and Chrome have built-in DoH settings under Privacy/Security. For system-wide DoH: Windows 11 supports it in Network settings, macOS requires the Cloudflare 1.1.1.1 app or a configuration profile, and Linux can use systemd-resolved. This tool tests DoH providers—it doesn't configure your device.
What's the difference between DoH and DoT?
Both encrypt DNS queries, but DoH uses HTTPS on port 443 (blends with web traffic, hard to block), while DoT uses TLS on dedicated port 853 (easier for networks to identify and block). DoH has native browser support; DoT requires OS configuration. Use our DNS over TLS tool to test DoT.
How long are DoH results cached?
Our tool caches results for 5 minutes. If you query the same domain and record type within 5 minutes, you'll get cached results. Wait 5 minutes or query a different domain for fresh responses. The TTL values shown are from the DNS providers, not our cache.
Test Your DNS over HTTPS Now
Enter a domain above to query 5 major DoH providers. Compare response times, check consistency, and find the fastest encrypted DNS resolver for your location.
Try DoH Lookup