Hi all,
I’m running into an issue where Pi-hole is fully functional but does not receive any DNS queries during normal browsing, even though clients are configured to use it via DHCP.
I’ve done quite a bit of debugging and would appreciate confirmation on whether this is router-side DNS interception or if I’m missing something.
Setup
-
Device: Raspberry Pi Zero 2 W
-
OS: Raspberry Pi OS (64-bit)
-
Pi-hole + Unbound (local recursive resolver)
-
Pi-hole IP:
192.168.1.17 -
Router LAN IP:
192.168.1.1 -
Router firmware:
0.8.3(ISP-provided AP-AX3000CV2)
Router DHCP configuration:
-
DNS Server 1:
192.168.1.17 -
DNS Server 2:
192.168.1.17 -
IPv6 DNS disabled on WAN
What Works
- Direct queries to Pi-hole work:
nslookup google.com 192.168.1.17
Returns valid results.
pihole status:
[✓] FTL is listening on port 53
[✓] UDP (IPv4)
[✓] TCP (IPv4)
[✓] UDP (IPv6)
[✓] TCP (IPv6)
-
ss -lunp | grep :53shows Pi-hole listening on0.0.0.0:53and*:53. -
Unbound is running on
127.0.0.1:5335.
So Pi-hole appears correctly bound and reachable.
The Problem
During normal web browsing:
-
pihole -tshows no new queries -
Query log shows only old timestamps
-
Ads are not blocked
Yet clients are configured correctly.
Client Verification
On macOS:
ipconfig getpacket en0
Shows:
domain_name_server (ip_mult): {192.168.1.17}
Running:
sudo tcpdump -n -i en0 port 53
Shows outgoing DNS traffic.
However, on the Pi-hole:
sudo tcpdump -n -i wlan0 port 53
Shows no incoming DNS packets from clients during browsing.
This suggests DNS traffic is not reaching the Pi-hole at all.
Firewall
-
ufw status→ inactive -
No iptables rules added
-
No firewall enabled on the Pi
So this does not appear to be a local firewall issue.
Suspected Cause
I suspect the router is intercepting or proxying DNS traffic on port 53 and ignoring the DHCP-provided DNS server.
There are no visible options in the router UI to disable:
-
DNS proxy
-
DNS relay
-
DNS interception
-
Secure DNS
DHCP cannot be fully disabled from the UI.
Question
Does this behavior align with known cases of ISP router DNS interception?
Is there any additional Pi-hole-side diagnostic I should run to definitively confirm interception vs. misconfiguration?
At this point, everything suggests the router is transparently redirecting DNS before it reaches the Pi-hole.
Thanks in advance.

