Skip to content

jameshas/Public-DoH-Lists

Repository files navigation

Public DoH Lists

Automatically generated domain and IP blocklists targeting DNS-over-HTTPS (DoH) providers.

A static list of known DoH providers as at 11/2023 is augmented by regularly parsing the community maintained DNS Wiki pages of Curl and AdGuard.

Several popular list formats are provided for wide support (Adblock, Hosts, JSON and Plaintext).

Automatic updates

The Python script is scheduled to run via Github Actions every second day at midnight UTC. If a change is detected, all blocklists will be updated and published automatically in-place.

Last run output

Ran at: 2024-05-25 00:26:03.634475 UTC
Unique domains: 646
  - From file: 494 unique (494 found)
  - From Curl wiki: 147 unique (355 found)
  - From AdGuard wiki: 5 unique (78 found)
Unique IPs: 690
  - 39 domains failed to resolve
  - Resolved local to Virginia, US

Intended use case

These lists can be used to limit the availability of DoH on networks where DNS policy is enforced (e.g. PiHole, AdGuard, Unbound or other managed resolver).

The IP and Domain lists can be used in conjunction to block known DoH providers at both the network and resolver level. This combined approach is recommended, in particular above just blocking the IPs, as some providers will resolve to different server addresses based on the geolocation of the query. Blocking IPs should only be seen as a fallback for rare cases where offending applications have hardcoded a DoH server IP rather than domain.

It is also recommended that DNS-over-TLS / DNS-over-QUIC are blocked (TCP/UDP 853) and standard DNS lookups are redirected to the desired managed resolver (NATR TCP/UDP 53) on the local network.

Overlap with standard DNS

Several entries on the DoH provider lists (notably 1.1.1.1 - Cloudflare, 8.8.8.8 - Google and 9.9.9.9 - Quad9) overlap with popular standard DNS services.