I get annoyed by the hubris of DNS administration, thinking it all has to do with http requests.
The internet does a LOT more than serve web pages. DNS is used for that, as well.
My ISP (Cox) has DNS servers that are so arrogant, they assume that any name it can't resolve is a failed HTTP request, and redirects the DNS lookup to a search server.
So, a DNS lookup to "myserver.mycompany.local" (a non-existent domain on the public internet, but visible from my split-tunnel VPN connection) will result in their DNS server returning the IP address of their search server.
Since my DNS servers are ordered as:
1. CoxDNS1
2. CoxDNS2
3. 10.1.1.10 (a private DNS server for my internal company, only visible when VPN is active)
I get false DNS resolutions.
I consider that DNS hijacking. A DNS query that doesn't resolve to a valid address should ALWAYS come back with a negative response, so that the client moves on to the next DNS server.
As such, foo.com might do something completely different than
www.foo.com. Perhaps it's a VPN endpoint, or an FTP server. DNS-level redirection is a huge assumption to make.