DoH SPLIT-BRAIN

The DNS resolver that lies to trackers

Every website you visit starts with a DNS query. Trackers abuse this to follow you everywhere.
DoH Split-Brain answers honestly for real websites and sends trackers into a black hole.

Set Up in 30 Seconds How It Works
163K+
Domains blocked
<7ms
Average latency
RFC 8484
Full compliance
0
Logs of your queries

Split-Brain: Two Faces, One Resolver

The same DNS server gives different answers depending on who's asking for what.

Legitimate domains → Real IPs

wikipedia.org198.35.26.96
github.com140.82.121.4
python.org151.101.0.223
freebsd.org96.47.72.84
example.com93.184.216.34

Trackers → Black hole (0.0.0.0)

google-analytics.com0.0.0.0
doubleclick.net0.0.0.0
facebook-tracking.com0.0.0.0
ads.yahoo.com0.0.0.0
telemetry.mozilla.org0.0.0.0

Features

Tracker Blackholing

163,000+ tracker, telemetry, malware, and ad domains return 0.0.0.0 (IPv4) or :: (IPv6). The request never reaches the tracker.

Subdomain Matching

Block doubleclick.net and every subdomain is automatically blocked: stats.g.doubleclick.net, ad.doubleclick.net, etc.

Zero Logging

We don't log your legitimate DNS queries. Only blocked tracker queries are logged for threat intelligence — and those contain the tracker's name, not yours.

Threat Intel Feed

Every blocked query generates a threat intel entry: timestamp, domain, query type. Aggregated data reveals which trackers are most aggressive across our user base.

RFC 8484 Compliant

Standard DNS-over-HTTPS. Works with every browser and OS that supports DoH. GET with base64url, POST with wire format. Proper application/dns-message responses.

SIGHUP Reload

Blocklist updates without downtime. Send SIGHUP and the new list is loaded in-memory instantly. No restart, no dropped queries.

Threat Intelligence Log

Every blocked query is recorded. This data reveals tracking patterns across the internet.

2026-02-12T10:30:15Z 2a0d:5600::12 google-analytics.com A BLOCKED
2026-02-12T10:30:16Z 93.121.172.161 doubleclick.net AAAA BLOCKED
2026-02-12T10:30:18Z 2001:db8::1 ads.yahoo.com A BLOCKED
2026-02-12T10:30:19Z 198.51.100.42 pixel.facebook.com A BLOCKED
2026-02-12T10:30:21Z 2a02:c207::1 telemetry.mozilla.org A BLOCKED

Setup — 30 Seconds

Configure your browser or OS to use our DoH resolver. All DNS queries go through HTTPS — encrypted and filtered.

Browser (Firefox)

Settings → Privacy & Security → DNS over HTTPS → Custom
URL: https://synthetic-context.net/v1/doh/dns-query

Browser (Chrome / Edge)

Settings → Privacy and Security → Use secure DNS → Custom
URL: https://synthetic-context.net/v1/doh/dns-query

macOS / iOS

# Install a DNS profile pointing to:
https://synthetic-context.net/v1/doh/dns-query

Linux (systemd-resolved)

# /etc/systemd/resolved.conf
[Resolve]
DNS=synthetic-context.net
DNSOverTLS=yes

API Reference

GET — Base64url encoded query

# Resolve example.com (A record)
curl -s "https://synthetic-context.net/v1/doh/dns-query?dns=AAABAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE"

POST — Wire format

# Send DNS wire-format query
curl -s -X POST "https://synthetic-context.net/v1/doh/dns-query" \
  -H "Content-Type: application/dns-message" \
  --data-binary @query.bin

Health check

curl -s "https://synthetic-context.net/v1/doh/health"
# {"status":"ok","blocklist_size":163181,"stats":{"total":...,"blocked":...}}

Comparison

DoH Split-BrainCloudflare 1.1.1.1AdGuard DNSNextDNS
Tracker blocking163K domainsNoYesYes
Threat intel feedYesNoNoNo
RFC 8484FullFullFullFull
Query loggingBlocked onlyOptionalOptionalYes (dashboard)
Open sourcePythonNoNoNo
Self-hostableYesNoNoNo
Account requiredNoNoNoYes
PriceFreeFreeFree/PaidFree/Paid

Blocklist Sources

Our blocklist is compiled from Steven Black's unified hosts, covering:

Advertising & Tracking

Google Analytics, DoubleClick, Facebook Pixel, Twitter tracking, LinkedIn Insight, and thousands more ad networks.

Telemetry

Microsoft telemetry, Mozilla telemetry, Adobe activation, app analytics SDKs, crash reporters that phone home.

Malware & Phishing

Known malicious domains, phishing sites, cryptojacking scripts, and command-and-control servers.