eth0 In IP (tos 0x0, ttl 3, id 0, offset 0, flags [none], proto TCP (6), length 44)
209.141.62.239.37300 > [redacted].53: Flags [S], cksum 0x003c (incorrect -> 0xe3dd), seq 3632312462, win 65535, options [mss 1400], length 0
eth0 In IP (tos 0x0, ttl 2, id 0, offset 0, flags [none], proto TCP (6), length 44)
209.141.62.239.37300 > [redacted].53: Flags [S], cksum 0x003c (incorrect -> 0xe3dd), seq 3632312462, win 65535, options [mss 1400], length 0
eth0 In IP (tos 0x0, ttl 1, id 0, offset 0, flags [none], proto TCP (6), length 44)
209.141.62.239.37300 > [redacted].53: Flags [S], cksum 0x003c (incorrect -> 0xe3dd), seq 3632312462, win 65535, options [mss 1400], length 0
I've enabled logging of invalid packets. Hopefully they will try again.For completeness sake TCP is used for a few other things on DNS these days such as falling back to TCP when the client does not support EDNS and the packet is bigger than 512 bytes which is common with DNSSEC. I do not have any large records. TCP is also used when encryption is implemented (DNS Over TLS) but that is usually on port 853 though it can be supported on 53 encryption can be opportunistic.
You have a list of established providers and then some random new provider (who also happens to tick every box for your questionable content)
It seems pretty evenhanded and not like an ad to me.