Getting Started
How DNSAFE works
Every time a device loads a website or app, it first asks a DNS resolver to look up the domain name. DNSAFE acts as that resolver — before returning an answer, it checks the domain against threat intelligence databases covering malware, phishing, ransomware, ads, trackers, and more.
Blocked domains receive a non-routable response, so the connection never happens. Everything else resolves normally. There is no software to install, no VPN tunnel, and no latency penalty for allowed traffic.
DNS resolver addresses
Use any of the three resolver protocols below. All three apply the same filtering policy tied to your registered device IPs.
Quick start
3.12.124.91. See the platform guides below for step-by-step instructions per device type.
Platform Guides
Select your platform to see step-by-step DNS configuration instructions.
Windows 10 / 11
Win + I → Network & Internet → Wi-Fi (or Ethernet) → click your active connection name.3.12.124.91. Leave Alternate DNS blank or set a public fallback.https://api.dnsafe.net/dns-query.
macOS
3.12.124.91 → click OK.sudo dscacheutil -flushcache; sudo killall -HUP mDNSResponderiOS / iPadOS
3.12.124.91. Remove any existing servers you want to replace.Android
Android 9+ supports system-wide Private DNS (DNS-over-TLS), which is the easiest way to use DNSAFE on Android.
api.dnsafe.net and tap Save.This uses DNS-over-TLS on port 853 and applies to all network interfaces (Wi-Fi and cellular).
3.12.124.91 per Wi-Fi network: long-press your Wi-Fi network → Manage network settings → Advanced → IP settings: Static → set DNS 1.
Router (whole-network setup)
Setting DNS at the router level protects every device on your network automatically — phones, TVs, game consoles — without configuring each one individually.
192.168.1.1 or 192.168.0.1.3.12.124.91. Set Secondary DNS to a public fallback such as 1.1.1.1 if desired.DNS-over-HTTPS & DNS-over-TLS
Standard DNS (UDP port 53) is unencrypted — your ISP and anyone on the same network can see every domain you look up. Encrypted DNS protocols prevent this.
| Protocol | Port | Best for |
|---|---|---|
| Standard DNS | 53 (UDP/TCP) | Routers, older devices, simple setup |
| DoH Recommended | 443 (HTTPS) | Browsers, Windows 11, macOS 12+, apps |
| DoT | 853 (TLS) | Android Private DNS, Linux systemd-resolved |
DNS-over-HTTPS (DoH)
DoH endpoint: https://api.dnsafe.net/dns-query
Firefox
https://api.dnsafe.net/dns-query → click OK.Chrome / Edge / Brave
https://api.dnsafe.net/dns-query.Windows 11 (system-wide DoH)
3.12.124.91 — then under DNS over HTTPS, choose On (automatic template) or enter the template manually: https://api.dnsafe.net/dns-query.DNS-over-TLS (DoT)
DoT hostname: api.dnsafe.net — Port: 853
Android (Private DNS)
See the Android platform guide above — Private DNS uses DoT automatically.
Linux — systemd-resolved
Edit /etc/systemd/resolved.conf:
[Resolve]
DNS=3.12.124.91
DNSOverTLS=yes
Then restart: sudo systemctl restart systemd-resolved
Custom Rules
Custom rules let you override the default filtering policy for specific domains. An allow rule forces a domain to resolve normally even if DNSAFE would otherwise block it. A block rule prevents a domain from resolving even if it isn't on a default block list.
Allow rules — unblocking a domain
Use an allow rule when DNSAFE is blocking a site you want to access.
example.com).Block rules — blocking a specific domain
Use a block rule to prevent access to a domain not covered by the default block lists.
ads.example.com, not https://ads.example.com/path. Custom rules do not support wildcards, but blocking a parent domain (e.g. example.com) blocks all subdomains too.
How rules interact with block lists
| Scenario | Result |
|---|---|
| Domain on a block list, no custom rule | Blocked |
| Domain on a block list, allow rule added | Allowed (rule wins) |
| Domain not on any block list, block rule added | Blocked (rule wins) |
| Domain not on any block list, no custom rule | Allowed |