Best Free DNS Servers

Discover the world's most popular and reliable free public DNS services

Google DNS Very Fast

Primary: 8.8.8.8
Secondary: 8.8.4.4
IPv6: 2001:4860:4860::8888

The world's most popular free DNS service, developed by Google. Offers high speed, reliability and is globally available.

  • Exceptional speed
  • 99.9% uptime
  • Full IPv6 support
  • No censorship or filtering

Cloudflare DNS Very Fast

Primary: 1.1.1.1
Secondary: 1.0.0.1
IPv6: 2606:4700:4700::1111

The world's fastest DNS according to multiple benchmarks. Cloudflare focuses on privacy and doesn't log your personal IP address.

  • Fastest globally
  • Privacy focused
  • No personal IP logging
  • Anti-malware protection

Quad9 DNS (IBM) Secure

Primary: 9.9.9.9
Secondary: 149.112.112.112
IPv6: 2620:fe::fe

IBM's free DNS service focused on security that automatically blocks malicious domains, phishing and botnets.

  • Automatic malware blocking
  • Phishing protection
  • No user logs
  • IBM backed

OpenDNS (Cisco) Parental Control

Primary: 208.67.222.222
Secondary: 208.67.220.220
IPv6: 2620:119:35::35

Cisco's DNS service with excellent parental control options and customizable content filtering.

  • Advanced parental controls
  • Content filtering
  • Usage statistics
  • Phishing blocking

AdGuard DNS Ad-Free

Primary: 94.140.14.14
Secondary: 94.140.15.15
IPv6: 2a10:50c0::ad1:ff

DNS that blocks ads, trackers and malicious domains. Perfect for browsing without annoying advertisements.

  • Ad blocking
  • Anti-tracking
  • Malware protection
  • No browsing logs

Yandex DNS Family

Basic: 77.88.8.8 / 77.88.8.1
Safe: 77.88.8.88 / 77.88.8.2
Family: 77.88.8.7 / 77.88.8.3

DNS from popular Russian search engine Yandex with three modes: basic, safe and family with additional filters.

  • Three operation modes
  • Family mode with filters
  • Good speed in Europe
  • Basic malware protection

NextDNS Customizable

Primary: 45.90.28.0
Secondary: 45.90.30.0
IPv6: 2a07:a8c0::/32

Modern DNS with advanced configuration, detailed analytics and granular control over content filtering.

  • Custom configuration
  • Detailed analytics
  • Multiple blocklists
  • Developer API

CleanBrowsing Filtering

Family: 185.228.168.168
Adult: 185.228.169.168
Security: 185.228.168.9

DNS specialized in content filtering with different protection levels for families and businesses.

  • Three filtering levels
  • Family protection
  • Malware blocking
  • No activity logs
โ†‘ Back to top

Speed and Features Comparison

Provider Speed Privacy Malware Blocking Parental Control Ad-Free IPv6
Google DNS Excellent Basic No No No โœ“
Cloudflare Excellent Excellent Yes No No โœ“
Quad9 Good Excellent Yes No No โœ“
OpenDNS Good Good Yes Yes No โœ“
AdGuard Good Excellent Yes Yes Yes โœ“
NextDNS Good Excellent Configurable Configurable Configurable โœ“
โ†‘ Back to top

What are DNS? - Complete Guide

The Domain Name System (DNS) is a fundamental Internet infrastructure that acts as a digital "phone book". Its main function is to translate domain names that we easily remember (like google.com) into the numerical IP addresses that computers need to communicate with each other.

Complete Technical Definition

DNS is a hierarchical decentralized naming system for devices connected to IP networks like the Internet or a private network. This system associates various information with domain names assigned to each of the participants connected to the network.

The DNS server uses a distributed and hierarchical database that stores information associated with domain names on networks like the Internet. Although as a database DNS is capable of associating different types of information to each name, the most common uses are:

  • Mapping domain names to IP addresses (A and AAAA records)
  • Locating email servers (MX records)
  • Authenticity verification (TXT records for SPF, DKIM)
  • Service addressing (SRV records)
  • Domain aliases (CNAME records)

How Do DNS Work? - Detailed Process

When you type a URL in your browser, a complex DNS resolution process occurs involving multiple levels:

1

Local Query (DNS Cache)

Your device first checks its local DNS cache to see if it already knows the IP of the requested domain. If found and not expired, it's used immediately.

2

Recursive DNS Server

If not in cache, the query is sent to the recursive DNS server (configured on your device). This server acts as an intermediary and has its own cache.

3

Root Servers Query

If the recursive server doesn't know the answer, it queries the 13 global Root Server clusters that know the location of top-level domain servers (.com, .org, etc.).

4

TLD Servers

Root Servers redirect the query to appropriate Top Level Domain (TLD) servers (.com, .es, .org), which know the authoritative servers for each domain.

5

Authoritative Server

Finally, the specific domain's authoritative DNS server is queried, which contains definitive information and returns the actual IP address.

6

Response and Cache

The response is sent back through the entire chain, each server caches the information according to the configured TTL (Time To Live) for future queries.

Main DNS System Components

๐Ÿ–ฅ๏ธ DNS Clients (Resolvers)

Client programs that run on user devices and generate DNS name resolution requests to DNS servers. Include operating system libraries and applications like web browsers.

๐ŸŒ Recursive DNS Servers

Servers that accept client queries and do the work of resolving names by querying other DNS servers if necessary. They maintain caches to improve performance.

๐Ÿ›๏ธ Authoritative DNS Servers

Servers that have authority over specific zones of the DNS namespace and provide definitive answers for domains under their control.

๐Ÿ“

Authority Zones

Parts of the domain namespace over which a DNS server has authority. Each zone contains DNS records that define information associated with domains in that zone.

Main DNS Record Types

Type Function Example
A Maps a name to an IPv4 address example.com โ†’ 192.168.1.1
AAAA Maps a name to an IPv6 address example.com โ†’ 2001:db8::1
CNAME Alias from one name to another www.example.com โ†’ example.com
MX Specifies mail servers example.com โ†’ mail.example.com
TXT Arbitrary text information SPF, DKIM, verifications
NS Specifies authoritative name servers example.com โ†’ ns1.provider.com
โ†‘ Back to top

Complete History of the DNS System

The Early Days: The HOSTS File

In the early days of the Internet (then ARPANET), name resolution was performed using a centralized file called HOSTS that contained all known host names and their corresponding IP addresses. This file was maintained by SRI International (formerly Stanford Research Institute) and distributed manually to all computers connected to the network.

The system worked similar to a physical phone book: each computer had a local copy of the file that it consulted to resolve names. However, the explosive growth of ARPANET made this centralized system impractical for several reasons:

  • The file grew constantly and was difficult to keep updated
  • Name conflicts were common
  • Manual distribution was slow and inefficient
  • There was no scalability for future growth

The Birth of Modern DNS (1983-1987)

Recognizing the limitations of the HOSTS system, Jon Postel began working on a more scalable solution. In November 1983, Postel published RFC 881 that outlined the basic concepts of what would become DNS.

Subsequently, Paul Mockapetris, working at the University of Southern California, developed with Postel the foundational DNS documents:

๐Ÿ“„

RFC 882 and RFC 883 (1983)

These documents defined the basic DNS architecture, including the concept of hierarchical namespace and database distribution.

๐Ÿ“‹

RFC 920 (October 1984)

After extensive discussions and refinements, this RFC was published defining the requirements for domain registration in the new system.

๐Ÿ—๏ธ

RFC 1034 and RFC 1035 (1987)

These documents replaced the previous RFCs and established the definitive DNS specifications that still form the basis of the current system.

The Master-Slave Replication Era

In early DNS implementations, a master-slave replication model was adopted to provide redundancy and availability:

  • Master Server: Contained the authoritative copy of zone data
  • Slave Servers: Maintained copies of data and periodically queried the master
  • Zone Transfers: Slaves synchronized their data through complete transfers
  • Periodic Verification: Slaves regularly checked if data had changed

Evolution and Improvements (1995-2000)

Approximately 10 years after initial implementation, significant improvements were made to the DNS protocol to make it more efficient and dynamic:

๐Ÿ””

NOTIFY (RFC 1996)

Revolutionized synchronization by allowing the master server to actively notify slaves about changes, eliminating the need for constant periodic queries.

๐Ÿ“ˆ

IXFR - Incremental Transfers (RFC 1995)

Allowed only changed records to be transferred, instead of transferring the entire zone, significantly improving network efficiency.

๐Ÿ”„

Dynamic DNS - DDNS (RFC 2136)

Introduced the ability to update DNS records automatically, allowing administrators to make changes without manually editing zone files.

๐Ÿ”ง

EDNS - Extension Mechanisms (RFC 2671)

Modernized the DNS protocol allowing larger messages and new functionalities, paving the way for future extensions.

The Internationalization Era (2003-2010)

With the global expansion of the Internet, the need arose to support non-ASCII characters in domain names:

๐ŸŒ

IDN - Internationalized Domain Names

RFC 5890 and RFC 5891 (2010) defined how to include characters from other languages in domain names, allowing domains in Arabic, Chinese, Cyrillic and other alphabets.

๐Ÿ”’

DNSSEC - Security Extensions

DNS security extensions were developed to provide authentication and integrity of DNS data, protecting against cache poisoning attacks.

Root Servers: The Heart of DNS

The Root Servers are the foundation of the entire global DNS system. There are 13 root server clusters (labeled A through M) distributed globally that maintain information about all top-level domains (TLD) like .com, .org, .es, etc.

These servers are operated by different organizations and are critical to the functioning of the Internet. The security of these servers is maintained through DNSSEC and highly secure key signing ceremonies.

To learn more about the root server security process, you can consult detailed information about the DNSSEC root zone key signing ceremony.

DNS in the Modern Era (2010-2025)

โ˜๏ธ

Cloud DNS

Major providers like Google, Cloudflare, and Amazon have launched public DNS services with massive global infrastructure and advanced security features.

๐Ÿ”

DNS over HTTPS (DoH) and DNS over TLS (DoT)

New protocols that encrypt DNS queries to improve user privacy and security.

๐Ÿค–

Smart DNS

Modern implementations include geographic load balancing, service health detection, and adaptive responses based on user location.

๐Ÿ›ก๏ธ

DNS Filtering and Security

Modern DNS services include malware filtering, ad blocking, and parental controls integrated directly into DNS resolution.

โ†‘ Back to top

How to Configure DNS on Different Devices

We show you step by step how to configure custom DNS servers on major operating systems and devices.

๐Ÿ–ฅ๏ธ Windows 10/11

1

Open Network Settings

Go to Settings > Network & Internet > Change adapter options or press Windows + R, type "ncpa.cpl" and press Enter.

2

Connection Properties

Right-click on your active connection (WiFi or Ethernet) and select "Properties".

3

Configure IPv4

Select "Internet Protocol Version 4 (TCP/IPv4)" and click "Properties".

4

Enter Custom DNS

Check "Use the following DNS server addresses" and enter:
โ€ข Preferred DNS: 1.1.1.1 (Cloudflare)
โ€ข Alternate DNS: 8.8.8.8 (Google)

๐Ÿง Linux (Ubuntu/Debian)

1

GUI Method - Network Manager

Click the network icon in the top bar, select "WiFi Settings" or "Network Settings".

2

Edit Connection

Click the gear icon โš™๏ธ next to your active connection to edit it.

3

Configure DNS

Go to the "IPv4" tab, change method to "Manual" and in the DNS field enter: 1.1.1.1, 8.8.8.8

4

Terminal Method (Alternative)

Edit the resolv.conf file:
sudo nano /etc/resolv.conf
Add:
nameserver 1.1.1.1
nameserver 8.8.8.8

๐ŸŽ macOS

1

Open System Preferences

Click the Apple menu ๐ŸŽ and select "System Preferences" (or "System Settings" on macOS Ventura+).

2

Access Network

Click "Network" and select your active connection (WiFi or Ethernet) from the left list.

3

Advanced Settings

Click "Advanced..." in the bottom right of the window.

4

Configure DNS Servers

Go to the "DNS" tab, click the "+" button and add:
โ€ข 1.1.1.1
โ€ข 8.8.8.8
Click "OK" then "Apply".

๐Ÿ“ฑ Android

1

WiFi Settings

Go to Settings > WiFi and long press your connected WiFi network.

2

Modify Network

Select "Modify network" or "Manage network settings".

3

Advanced Options

Tap "Advanced options" and change "IP settings" to "Static".

4

Configure DNS

In the DNS fields, enter:
โ€ข DNS 1: 1.1.1.1
โ€ข DNS 2: 8.8.8.8
Save changes.

๐Ÿ“ฑ iPhone (iOS)

1

Open WiFi Settings

Go to Settings > WiFi and tap the info icon (โ„น๏ธ) next to your connected network.

2

Configure DNS

Scroll down and tap "Configure DNS".

3

Change to Manual

Select "Manual" instead of "Automatic".

4

Add DNS Servers

Remove existing DNS entries and add new ones by tapping "Add Server":
โ€ข 1.1.1.1
โ€ข 8.8.8.8
Tap "Save" in the top right corner.

๐Ÿ  Router (Global Configuration)

1

Access Admin Panel

Open your browser and go to your router's IP (usually 192.168.1.1 or 192.168.0.1). Log in with admin credentials.

2

Find DNS Settings

Look for sections like "Internet Settings", "WAN", "DNS" or "Advanced Settings".

3

Change ISP DNS

Change from "Obtain automatically" to "Use these DNS servers" or similar.

4

Configure Custom DNS

Enter desired DNS servers:
โ€ข Primary DNS: 1.1.1.1
โ€ข Secondary DNS: 8.8.8.8
Save and restart router if necessary.

๐Ÿ’ก Additional Tips

๐Ÿ”„ Clear DNS Cache

Windows: ipconfig /flushdns
macOS: sudo dscacheutil -flushcache
Linux: sudo systemctl restart systemd-resolved

๐Ÿงช Test Configuration

Use tools like nslookup google.com or visit 1.1.1.1/help to verify changes work correctly.

๐Ÿ”ง Device vs Router Configuration

Router: Affects all devices on the network.
Individual device: Only affects that specific device and takes priority over router configuration.

โšก Multiple DNS for Redundancy

Always configure at least 2 different DNS servers (e.g.: Cloudflare + Google) to ensure redundancy in case one fails.

โ†‘ Back to top

Frequently Asked Questions

Is it safe to use free public DNS?

Yes, public DNS from recognized providers like Google, Cloudflare and Quad9 are safe and reliable. In fact, many offer better security than your ISP's default DNS, including protection against malware and phishing.

Does changing DNS really improve internet speed?

Changing to a faster DNS can significantly improve web page loading times, especially initial domain name resolution. However, it won't increase your download speed or total bandwidth.

What DNS is best for gaming?

For gaming, we recommend Cloudflare (1.1.1.1) or Google DNS (8.8.8.8) for their low latency and high availability. Avoid DNS with extensive filtering as they may add additional latency.

Do free DNS services log my activity?

It depends on the provider. Cloudflare and Quad9 have strict no-logs policies, while Google may retain certain information. Always review the privacy policy of the DNS provider you choose.

Can I use different DNS for different devices?

Absolutely. You can configure different DNS on each device according to your needs. For example, use DNS with parental controls on children's devices and speed-focused DNS for gaming.

โ†‘ Back to top

Benefits of Using Public DNS

๐Ÿš€ Higher Speed

Public DNS are usually faster than your ISP's defaults, reducing web page loading times.

๐Ÿ›ก๏ธ Better Security

Many public DNS offer protection against malware, phishing and malicious websites.

๐ŸŒ Greater Availability

Major providers have global infrastructure with high availability and redundancy.

๐Ÿ”’ Privacy Control

Some public DNS offer better privacy policies than local ISPs.

โ†‘ Back to top

References and Additional Reading

To delve deeper into the world of DNS, we recommend these specialized resources covering technical, historical and security aspects:

๐Ÿ“š Technical Articles and Analysis

๐Ÿ”— An hour without Internet due to Cloudflare DNS

Detailed analysis on the importance of using multiple DNS servers and why you shouldn't depend on a single provider, even if it's Cloudflare.

๐Ÿ”— DNS: The backbone of the Internet, its history and evolution

Complete guide on the history, operation and evolution of the DNS system from its origins to modern implementations.

๐Ÿ”— What is a good TTL for DNS?

Technical explanation about TTL (Time To Live) values in DNS and how to configure them correctly to optimize performance and flexibility.

๐Ÿ”— NSLookup: The essential tool for DNS diagnosis

Complete tutorial on using NSLookup and other DNS diagnostic tools for troubleshooting and configuration analysis.

๐Ÿ›ก๏ธ DNS Security and Threats

๐Ÿ”— How to defend against relentless DNS attacks

Comprehensive analysis of major DNS threats and defense strategies for system administrators and advanced users.

๐Ÿ”— DNSSEC root zone key signing ceremony

Detailed description of the Internet's most critical security process: the DNSSEC key signing ceremony that protects root servers.

๐Ÿ‡ช๐Ÿ‡บ Sovereign DNS and New Initiatives

๐Ÿ”— DNS4EU launches server in Spain

Information about the new European public DNS DNS4EU and its impact on the European Union's digital sovereignty, with its first server activated in Spain.

๐Ÿ“– Additional Recommended Resources

  • RFC 1034 and 1035: Foundational DNS documents (Domain Names - Concepts and Facilities)
  • IANA Root Zone Database: Official Internet root zone database
  • DNS-OARC: DNS Operations, Analysis and Research Center
  • ISC BIND Documentation: Documentation for the most widely used DNS software
  • Cloudflare Learning Center: Educational resources on DNS and web technologies
โ†‘ Back to top