DNS over HTTPS encrypts your DNS queries inside HTTPS traffic, protecting your browsing activity from eavesdropping and tampering. Learn how DoH works, why it matters, and how to set it up.
DNS over HTTPS (DoH) is a protocol that encrypts DNS queries by sending them over the HTTPS protocol — the same encryption used by secure websites. Standardized in RFC 8484 (October 2018), DoH wraps DNS requests inside regular HTTPS traffic on port 443.
Without encryption, traditional DNS queries are sent in plaintext. This means anyone monitoring your network — your ISP, a public Wi-Fi operator, or a malicious actor — can see every domain you visit. DoH solves this by encrypting the query and response between your device and the DNS resolver.
Because DoH uses the same port as all other HTTPS traffic, DNS queries blend in with normal web browsing. This makes it difficult for third parties to identify, intercept, or block DNS traffic specifically.
When you type a domain name into your browser, a DNS lookup is required to resolve it to an IP address. With DoH, this process is encrypted:
example.com).DoH supports both GET and POST request methods, and works over both IPv4 and IPv6. The entire exchange looks like normal HTTPS traffic to anyone observing the network.
Both DoH and DNS over TLS (DoT) encrypt DNS queries, but they differ in implementation:
| DNS over HTTPS (DoH) | DNS over TLS (DoT) | |
|---|---|---|
| Port | 443 (same as HTTPS) | 853 (dedicated port) |
| Protocol | HTTPS / HTTP/2 | TLS over TCP |
| Visibility | Blends with web traffic — hard to identify or block | Uses a dedicated port — easier to identify and manage |
| Best for | Individual browsers, privacy-focused users | Network-wide policies, enterprise/MDM environments |
| Browser support | Chrome, Firefox, Edge, Safari, Brave | Android 9+ (Private DNS), some routers |
In short: DoH is typically configured per-browser or per-app, while DoT is better suited for device-wide or network-wide deployment. Many organizations use both. Learn more in our Encrypted DNS overview.
DoH is not a silver bullet. It's important to understand what it does and doesn't protect:
A common concern is that DoH can bypass DNS-based content filtering. This happens when a browser uses a DoH resolver that doesn't enforce your organization's filtering rules.
The solution is to point DoH at a filtering-aware resolver like CleanBrowsing. When you configure DoH to use CleanBrowsing's endpoints, you get both encryption and content filtering — DNS queries are encrypted in transit but still filtered at the resolver.
For managed environments, you can push DoH settings via:
CleanBrowsing supports DoH across all filters with a global anycast network for fast, reliable performance. Both HTTP/2 GET and POST formats are supported.
https://doh.cleanbrowsing.org/doh/family-filter/https://doh.cleanbrowsing.org/doh/adult-filter/https://doh.cleanbrowsing.org/doh/security-filter/Paid customers get a private DoH endpoint unique to their filtering configuration:
Custom DoH URL: https://doh.cleanbrowsing.org/doh/custom-filter/[code]
Replace [code] with the unique key from your CleanBrowsing dashboard. This ensures your specific filtering preferences apply across all devices that support DoH.
For a full walkthrough of all encrypted DNS protocols we support (DoH, DoT, and DNSCrypt), see our Encrypted DNS setup guide.
DoH is supported by all major browsers and most modern operating systems. Here are our setup guides:
You can verify your DoH configuration is working by visiting our DNS Leak Test — the results should show CleanBrowsing as your DNS provider.
Learn about DoT — the other major encrypted DNS protocol using port 853.
View Guide