2026 ISP DNS Report: Which Internet Providers Intercept Your Queries?
Analysis of 109,644 resolvers across 240 countries —
Key Findings
- NXDOMAIN hijacking affects 1.7% of live resolvers globally. Out of 37,654 servers that passed our probes, 624 redirect non-existent domain queries to their own servers instead of returning a proper NXDOMAIN error. This practice exposes users to tracking, ad injection, and broken application behaviour.
- DNSSEC adoption stands at 109.2%. 41,104 out of 109,644 tested resolvers validate DNSSEC signatures. The highest adoption rates are in Bangladesh (98.5%), Canada (96.2%), and the United States (94.4%). Africa and Central Asia lag behind with single-digit validation rates in many countries.
- 109 countries have at least one hijacking resolver. The highest absolute numbers of hijacking resolvers are in the United States (175), Cambodia (25), Egypt (23), and the British Virgin Islands (20). However, the hijacking rate relative to total servers is highest in smaller networks with concentrated infrastructure.
- Public DNS providers vastly outperform ISP defaults. The global average reliability for all tested resolvers is 85.4%. By comparison, well-known public providers like Cloudflare (1.1.1.1), Google (8.8.8.8), and Quad9 (9.9.9.9) maintain 99.9%+ reliability with DNSSEC validation and zero NXDOMAIN hijacking.
- The situation is improving year-over-year. DNSSEC adoption continues to rise as major resolver software defaults to validation-enabled configurations. However, NXDOMAIN hijacking persists primarily among smaller regional ISPs and hosting providers that monetise failed lookups through search redirect pages.
Country Breakdown
The table below shows DNS server behaviour by country. Click any column header to sort. Only countries with 10 or more live-tested servers are included.
| Country | Servers | Hijack % | DNSSEC % | Avg Reliability | Verdict |
|---|---|---|---|---|---|
| United States | 10,724 | 0.1% | 93.6% | 88.1% | Good |
| France | 1,923 | 0% | 90.1% | 86.8% | Good |
| Russia | 1,799 | 0.2% | 41.9% | 93.7% | Good |
| Germany | 1,621 | 0% | 91.2% | 86.9% | Good |
| Canada | 1,149 | 0% | 95.7% | 85.8% | Good |
| United Kingdom | 1,113 | 0.1% | 92.2% | 85.6% | Good |
| XX | 1,103 | 0% | 100% | 86.5% | Good |
| Netherlands | 1,037 | 0.1% | 76.7% | 86.6% | Good |
| Bangladesh | 837 | 0% | 98.4% | 88% | Good |
| Brazil | 708 | 0% | 86.6% | 86.4% | Good |
| Singapore | 603 | 0.3% | 83.3% | 87.1% | Good |
| South Africa | 571 | 0% | 93.9% | 84.1% | Good |
| Mexico | 521 | 0% | 88.1% | 84.7% | Good |
| Poland | 507 | 0.2% | 71.4% | 90.6% | Good |
| Sweden | 505 | 0% | 92.9% | 86.2% | Good |
| Australia | 487 | 0% | 90.8% | 84.9% | Good |
| Colombia | 481 | 0.2% | 82.3% | 85.6% | Good |
| India | 399 | 0.3% | 74.4% | 88.7% | Good |
| Indonesia | 386 | 0% | 66.8% | 86.9% | Good |
| Japan | 385 | 0% | 75.3% | 88.2% | Good |
| Hong Kong | 370 | 2.4% | 79.2% | 87.3% | Mixed |
| Italy | 342 | 0% | 82.2% | 87.5% | Good |
| Switzerland | 324 | 0% | 92% | 84.3% | Good |
| Ecuador | 296 | 0% | 90.5% | 84.2% | Good |
| South Korea | 262 | 0% | 48.1% | 91.8% | Good |
| Ukraine | 262 | 0% | 72.1% | 87.2% | Good |
| Spain | 249 | 0% | 73.5% | 87.9% | Good |
| Philippines | 212 | 0.9% | 33.5% | 94.8% | Good |
| Thailand | 208 | 0% | 54.3% | 90.5% | Good |
| Finland | 206 | 0% | 94.2% | 86.4% | Good |
| Argentina | 195 | 0% | 69.7% | 87.6% | Good |
| Czechia | 184 | 0% | 83.7% | 87.3% | Good |
| Peru | 182 | 0% | 73.6% | 85% | Good |
| Dominican Republic | 174 | 0% | 94.8% | 83.9% | Good |
| Romania | 156 | 0.6% | 73.7% | 89.9% | Good |
| Cambodia | 154 | 0% | 17.5% | 86.5% | Mixed |
| Greece | 148 | 0% | 84.5% | 85% | Good |
| Guatemala | 138 | 0% | 60.1% | 85.4% | Good |
| Bulgaria | 134 | 0% | 65.7% | 90.7% | Good |
| Myanmar | 126 | 0% | 6.3% | 86.9% | Mixed |
Data reflects probe results as of March 2026. ISP-level breakdowns available on individual country pages.
What is NXDOMAIN Hijacking?
When you type a web address that does not exist — a misspelled domain, a removed website, or an internal hostname — your DNS resolver should return an NXDOMAIN (Non-Existent Domain) response. This tells your browser, email client, or application that the domain genuinely does not exist, allowing it to handle the error appropriately.
NXDOMAIN hijacking occurs when an ISP or resolver operator intercepts this error response and replaces it with an IP address pointing to their own server. Instead of seeing a browser error page, you are redirected to a search page filled with advertisements, often operated by the ISP or a third-party monetisation partner. This breaks application behaviour, leaks your browsing intent to the ISP, and can interfere with security software, email validation, and internal network services that rely on proper NXDOMAIN responses.
Methodology
PublicDNS.info maintains a database of 109,644 DNS resolver IP addresses discovered through a combination of BGP routing data analysis, passive DNS observation, public resolver lists, and network scanning. Every resolver is probed on a 72-hour cycle by our automated infrastructure.
Each probe sends a standard A-record query to verify the resolver is responsive, then queries a guaranteed non-existent random domain to test for NXDOMAIN hijacking. If the resolver returns an A record instead of NXDOMAIN, it is flagged as a hijacker. DNSSEC validation is tested by querying dnssec-failed.org, a domain with an intentionally broken DNSSEC chain — resolvers that validate DNSSEC return SERVFAIL, while non-validating resolvers return the record.
Limitations: Resolver behaviour may vary under load or for specific query types. Some resolvers may apply hijacking selectively. IPv6 resolver coverage is thinner than IPv4. Reliability scores use an exponential moving average and may not reflect very recent changes. Our probe infrastructure is located in Europe, which affects latency measurements.
Recommendations
For consumers
If your ISP hijacks NXDOMAIN responses, switch to a public DNS provider that respects standards:
- Cloudflare DNS (1.1.1.1 / 1.0.0.1) — fastest, no-log policy, DNSSEC, DoH/DoT
- Quad9 (9.9.9.9 / 149.112.112.112) — security-focused, blocks malicious domains, DNSSEC
- Google Public DNS (8.8.8.8 / 8.8.4.4) — reliable, global anycast, DNSSEC
Use our DNS Privacy Check to test if your current DNS hijacks queries, and our DNS Benchmark to find the fastest option for your location.
For ISPs
ISPs that have corrected NXDOMAIN hijacking behaviour or wish to submit resolver data for inclusion in our directory can reach us via our contact page.
For researchers
Summary probe data is available for academic and journalistic use. Contact us for data access details. Individual resolver status can be queried via our server check API.
Share & Cite This Report
PublicDNS.info. "2026 ISP DNS Report: NXDOMAIN Hijacking & Privacy Across 109,644 Resolvers." March 2026. https://publicdns.info/reports/isp-dns-report-2026.html