DNS outage with Pi-hole-DoT-DoH-V6 container after 24 hours

I believe I’m experiencing the same issue.
I’m running Pi-hole as a Docker container on Unraid.

Pi-hole worked reliably for several months, but recently it intermittently stops resolving DNS. When this happens, the entire network loses internet access. DNS queries fail, while direct IP connectivity (e.g. pinging external IP addresses) continues to work without any issues. Local network traffic is unaffected, and the Pi-hole web interface remains accessible during the outage. Other Docker containers and Unraid services continue to function normally.

No changes were made around the time the issue started occurring — neither hardware changes nor configuration changes on Unraid or Pi-hole.

Restarting the Pi-hole Docker container does not resolve the issue, nor does rebooting the entire Unraid system. The only workaround that temporarily restores functionality is a complete reinstallation of the Pi-hole Docker container, which resolves the problem for approximately 24 hours before it reoccurs.

As upstream DNS resolvers, I am using Cloudflare. I am running the Pi-hole-DoT-DoH-V6 container, in case this is relevant.

Debug log:
https://tricorder.pi-hole.net/hif3MeJj/

However, when opening the debug link, it only shows a blank page. Is this expected behavior, or does it indicate that the debug upload failed?

Thank you very much in advance for your support and any insights you can provide.

This is expected.

Only Pi-hole team members are allowed to access uploaded files.


If you want to see your own log, it was saved on your machine: /var/log/pihole/pihole_debug.log.

I had already thought something like that

That doesn't sound like you are using Pi-hole's official image for Docker.
I've moved your posts to a separate topic.

What's the exact image you are using?


I am using the Pi-hole-DoT-DoH-V6 Docker image from ZappyZap’s Repository on Unraid.

This is not developed by Pi-hole team.

Please try to ask for help on ZappyZap’s Repository.

I switched from the Pi-hole DoT-DoH-V6 image to the Pi-hole DoT-DoH image from the same developer. So far it’s been running well for about 24 hours. Let’s see how it looks tomorrow.

But thanks for the support so far.

I'm not familiar with that image nor where to get that from, so can't tell what component's it would use apart from Pi-hole.

If its DoH support would be based on cloudflared's package, then they may have to change to some other DoH software, as cloudflare has removed its dns-proxy from it, see cloudflared proxy-dns command will be removed starting February 2, 2026 · Changelog.

To analyse your issue, you could run some nslookups to specific DNS server IPs from within your Pi-hole container.

To determine your DoH server, you could use:

pihole-FTL --config dns.upstreams

I'd expect this to return something like [ 1.2.3.4#5321 ], which should match your DoH server IP and port.
Then run an nslookup to that DoH server:

nslookup -port=5321 discourse.pi-hole.net 1.2.3.4

where you substitute 5321 and 1.2.3.4 as appropriate, of course.

If that doesn't come back with a reply, run another nslookup to a public DNS server, e.g.

nslookup discourse.pi-hole.net 9.9.9.9

If that also fails, you may have a general connectivity issue to public IPs.
If it doesn't, that would suggest that your issue is specific to your DoH server.


Here are the results.

When I execute:

nslookup -p 5321 discourse.pi-hole.net 1.2.3.4

the nslookup binary returns an error indicating that the -p option is not supported / recognized.

Additionally, the container has been running stable for the past 48 hours without any crashes or restarts. However, currently only three PCs are using Pi-hole for DNS filtering. The Pi-hole IP address is not yet configured as the DNS server in the DHCP settings of the Fritz!Box, so the deployment is not fully integrated into the network at this time.

Pi-hole DNS timeouts after 3 days – wrong interface binding (resolved after reinstall)

I was experiencing intermittent DNS timeouts when querying my Pi-hole at 192.168.178.2.

At one point, ss -tulpen | grep :53 showed that pihole-FTL (dnsmasq) was not listening on the LAN IP. Instead, it was bound to a different internal interface (192.168.122.1), which is not part of my LAN (192.168.178.0/24).

Because of that, DNS queries to:

192.168.178.2:53

resulted in:

DNS request timed out
no servers could be reached

So the container was running, but nothing was listening on the correct LAN interface.


After Reinstallation

After a fresh reinstallation of the container, everything is now working again.

Current output of:

ss -tulpen | grep :53

udp   UNCONN 0 0 0.0.0.0:53        0.0.0.0:*    users:(("pihole-FTL",pid=217))
udp   UNCONN 0 0 [::]:53           [::]:*       users:(("pihole-FTL",pid=217))

tcp   LISTEN 0 32 0.0.0.0:53       0.0.0.0:*    users:(("pihole-FTL",pid=217))
tcp   LISTEN 0 32 [::]:53          [::]:*       users:(("pihole-FTL",pid=217))

Unbound is running locally and listening on:

127.0.0.1:5335 (UDP and TCP)


Current Setup

  • Docker container

  • Custom bridge network: br0

  • Static IP: 192.168.178.2

  • Upstream DNS: local Unbound

  • Pi-hole now correctly listening on:

    • 0.0.0.0:53

    • [::]:53

External queries to 192.168.178.2 are now working again, and blocking behaves as expected.


If anyone has insight into why FTL previously bound itself to the wrong interface (192.168.122.1 instead of 192.168.178.2), I would appreciate the explanation to prevent this in the future.

Stop using Docker Containers made by others and build them yourself like Docker was meant to be used by design :slight_smile:

One of the reasons I don’t use Docker is because I don’t feel like doing that myself each time there is an update of my favorite software…

Another reason is that I don’t want to be part of this whole “New version of the old KaZaA Lite P2P Network” as I call it :
People just share and download images from eachother and 98% of them don’t even know what’s inside the Container that they just downloaded !! LOL! :rofl:

It hasn't:

paraserver-dnsmasq

Pihole's process would identify as pihole-FTL, so your screenshot shows that it was indeed dnsmasq binding that port, i.e. there really was a dnsmasq instance running on your machine. And when that is up, it may prevent other processes from binding port 53 (including pihole-FTL).

Since you are running your Pi-hole as a Docker container, I'd anyway expect docker to show up rather than pihole-FTL, unless you'd be running your container in host mode.

This topic was automatically closed 21 days after the last reply. New replies are no longer allowed.