Browser-Accessible Dns-Over-Https Json Querying (Cors-Enabled)
Sources: 1 • Confidence: Medium • Updated: 2026-03-25 17:54
Key takeaways
- Cloudflare's 1.1.1.1 DNS resolver provides a CORS-enabled JSON API.
- Cloudflare's 1.1.1.2 resolver is positioned as blocking malware.
- Cloudflare's 1.1.1.3 resolver is positioned as blocking both malware and adult content.
- The author used Claude Code to build a UI that runs DNS queries against Cloudflare's 1.1.1.1, 1.1.1.2, and 1.1.1.3 resolvers.
Sections
Browser-Accessible Dns-Over-Https Json Querying (Cors-Enabled)
- Cloudflare's 1.1.1.1 DNS resolver provides a CORS-enabled JSON API.
- The author used Claude Code to build a UI that runs DNS queries against Cloudflare's 1.1.1.1, 1.1.1.2, and 1.1.1.3 resolvers.
Dns-Layer Policy Filtering Via Resolver Selection (Malware And Adult Content)
- Cloudflare's 1.1.1.2 resolver is positioned as blocking malware.
- Cloudflare's 1.1.1.3 resolver is positioned as blocking both malware and adult content.
Unknowns
- What is the exact DNS-over-HTTPS JSON endpoint shape (URL paths, parameters) and what CORS headers are returned under normal and error conditions?
- What are the rate limits, quotas, or acceptable-use constraints for calling the JSON API directly from client browsers at scale?
- How do the malware and adult-content filtering resolvers signal blocking (for example, NXDOMAIN vs redirected answers), and how consistent is behavior across categories and time?
- What is the provenance, availability, and reproducibility of the referenced UI (source availability, hosting, and whether it exercises the same API paths claimed)?
- Is there any direct decision-readthrough (operator, product, or investor) that is explicitly supported by this corpus beyond the narrow point that browser-based DNS tooling may be feasible?