If your iptables
output matches mine, you wont need to alter with iptables
because your rules already allow all.
Below is a good tool to test DNS from a client before you make alterations to your router settings.
You can also run this one on Pi-hole itself to test:
nslookup pi.hole 192.168.1.84
First check if the pihole-FTL
daemon is actually listening on DNS ports 53 UDP/TCP (and others used by Pi-hole) with below:
sudo netstat -nltup | grep 'Proto\|:53 \|:67 \|:80 \|:547 \|:471[1-8] '
If that checks out ok, check interface/IP configured for Pi-hole:
grep 'PIHOLE_INTERFACE\|IPV[4,6]_ADDRESS\|DNSMASQ_LISTENING' /etc/pihole/setupVars.conf
See if it matches with the actual interface that holds the 192.168.1.84
IP:
ip -4 -br a
If that checks out ok, it might be that your router is doing a thing called "DNS rebind protection":
EDIT: forgot to mention but sometimes AV software can mangle DNS lookups: