When people think about DNS security, they think about phishing and ad blocking. But the DNS layer is exploited by attackers in ways most people have never heard of. These aren't theoretical attacks — they happen every day, to millions of devices.
Here are 10 DNS-based threats and how modern DNS filtering stops each one.
Attackers send DNS queries of type ANY to open resolvers, spoofing the victim's IP address. The DNS server replies with a massive response (sometimes 50x larger than the query) — flooding the victim with traffic. It's one of the most common DDoS amplification vectors.
Even if you're not the target, your DNS server can be used as a weapon in these attacks if it responds to ANY queries.
This is the sneakiest tracking technique on the web. Instead of loading trackers from tracker.adcompany.com (which ad blockers easily block), websites create a CNAME record like analytics.yourfavoritesite.com that points to tracker.adcompany.com behind the scenes.
To your browser and most ad blockers, it looks like a first-party request — same domain as the website you're visiting. But the data goes straight to a third-party tracker. Companies like Criteo, Adobe Analytics, and Eulerian use this technique extensively.
This attack targets devices on your local network — your router, NAS, security cameras, smart home hubs. Here's how it works:
evil-site.com in your browser192.168.1.1 (your router's local IP)evil-site.com is your router — and sends requests to itThis bypasses firewalls entirely because the request originates from inside your network.
When malware infects a device, it needs to contact its command-and-control (C2) server to receive instructions. If the C2 uses a fixed domain, security teams can block it easily. So modern malware uses algorithms to generate thousands of random-looking domains every day:
a8f3kx9p2m.com, xk29vm4pql.net, p3mx8fka2v.org...
The attacker registers just one of these domains. The malware tries all of them until it finds the active one. This makes traditional blocklists useless — by the time you block one domain, the malware has moved to another.
DNS tunneling hides data inside DNS queries. Attackers encode stolen data (passwords, files, credit card numbers) as subdomains:
dGhpcyBpcyBzdG9sZW4gZGF0YQ.evil-server.com
The DNS query looks normal to firewalls, but the subdomain is actually base64-encoded stolen data. The attacker's DNS server decodes it on the other end. This technique can also be used to tunnel entire network connections through DNS — bypassing corporate firewalls and captive portals.
Legitimate websites have stable IP addresses — google.com resolves to the same IPs for hours or days. Fast-flux domains change their IP addresses every few minutes, rotating through hundreds of compromised machines worldwide.
This makes it nearly impossible to shut down phishing sites, malware distribution networks, and botnets. By the time law enforcement contacts one hosting provider, the domain has moved to a different IP in a different country.
Studies consistently show that a disproportionate number of malicious domains are brand new. Attackers register domains, use them for phishing or malware distribution for a few hours or days, then abandon them.
Legitimate businesses rarely need you to visit a domain that was registered yesterday. Blocking domains less than 30 days old eliminates a huge percentage of phishing and scam sites before they even appear on traditional blocklists.
Your operating system constantly talks to its maker — Windows sends data to Microsoft, macOS to Apple, Android to Google. This telemetry includes:
You can disable some of this in settings, but many telemetry domains are hardcoded and ignore your preferences.
Modern browsers and operating systems use "canary domains" to detect whether DNS filtering is active — and then bypass it. Firefox checks use-application-dns.net. If it resolves, Firefox assumes no DNS filtering is in place and enables its own DNS-over-HTTPS to Cloudflare, completely bypassing your network's DNS filter.
Apple's iCloud Private Relay does the same with mask.icloud.com — routing all DNS and web traffic through Apple's relay, invisible to your network's security.
use-application-dns.net is blocked, Firefox falls back to your configured DNS. When iCloud Private Relay domains are blocked, Safari uses your DNS normally.Not all top-level domains are equal. Some TLDs have extremely high abuse rates. According to Spamhaus, TLDs like .top, .xyz, .buzz, .rest, and .surf are disproportionately used for spam, phishing, and malware — often because they're cheap to register and have minimal verification.
Blocking entire TLDs is aggressive but effective. If you never need to visit a .top or .buzz website (and you almost certainly don't), blocking them eliminates thousands of potential threats.
Every protection listed above is built in — most enabled by default. No hardware, no software, just change your DNS and you're protected.
Get Started FreeDNS is the first thing that happens when you connect to anything on the internet. It's also the most underprotected layer in most networks. Attackers know this — that's why DNS-based attacks keep evolving.
The good news: by filtering DNS, you block threats at the earliest possible point. Before the connection. Before the download. Before the exploit. One setting, ten layers of protection.