This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

NullPrivate User Guide | NullPrivate Ad-Blocking & Anti-Addiction

Welcome to the NullPrivate Documentation Center. Learn how to block ads, trackers, and malicious sites in one click with our encrypted DNS service, providing comprehensive network security and privacy protection for you and your family, including family anti-addiction features. Detailed setup tutorials, feature introductions, and FAQs are provided.

Welcome to the World of NullPrivate – Your Personal Network Security Guardian

Still troubled by ubiquitous ads, annoying pop-ups, and potential privacy leaks?

NullPrivate provides an unbreakable digital barrier for all your connected devices. Using powerful encrypted DNS technology, we block ads, trackers, and malicious websites right at the source of every network request, giving you a clean, fast, and secure internet experience.


🚀 Why Choose NullPrivate?

We believe everyone deserves a pure and secure cyberspace.

  • Ads Gone for Good: Block ads in videos, web pages, and apps for an immersive content experience.
  • Privacy First: Prevent third-party trackers from collecting your browsing habits and safeguard your personal privacy.
  • Malware Shield: Automatically intercept phishing sites, malware, and scams to protect your home network.
  • Setup in Seconds: No software installation required—configure natively on phones, computers, or routers once and for all.
  • Cross-Platform Support: Detailed step-by-step tutorials for Windows, macOS, iOS, Android, and Linux.
  • Family Anti-Addiction: Create a healthy online environment for children and prevent excessive screen time.

Core Features

🛡️ Free Services

All users enjoy robust basic protection:

  • Public Access: Full support for IPv4 and IPv6 environments.
  • Ad Blocking: Intercept the vast majority of ad sources.
  • Privacy Protection: Block known user-behavior trackers.
  • Security Shield: Stay away from phishing and scam sites—ideal for setting up for elderly family members.
  • Family Protection: Basic anti-addiction tools to help manage household internet usage.

✨ Premium Customization (Paid)

Unlock more personalized and granular management:

  • Usage Analytics: See which sites devices on your network visit—data at your fingertips.
  • Anti-Addiction: One-click blocking of adult content and gaming sites to create a healthy environment for kids.
  • Custom Rules: Take full control of your network—block specific apps, websites, or games.
  • Internal Network Access: Custom domain resolution for easy access to your NAS or home server.
  • Multi-Device Management: Use client IDs to distinguish and manage policies and logs for each device.
  • Anti-Addiction Settings: Fine-grained time management and content filtering to prevent children from overusing the internet.

Ready to start your journey to a pure internet?

➡️ Go to Feature Details to learn more ➡️ Check out Platform-Specific Setup Tutorials and start now!

1 - User Guide

Private Service User Guide: Access logs, blocking statistics, custom rules, and authoritative resolution for enhanced ad blocking, privacy protection, and screen time management.

Main Services Provided

Basic Features

  1. Access Logs
  2. Blocking Logs
  3. Statistics
  4. Custom Upstream
  5. Custom Filter Rules
  6. Custom Resolution
  7. Whitelist Mode

Advanced Features

  1. HTTP3 Support
  2. DDNS Support
  3. ECS Support
  4. Rule-based Resolution
  5. Block Specific Applications
  6. Schedules

Access Logs

View internet access records. The private service provides 24-hour network access log query.

Access Logs

Blocking Logs

View blocking records to understand which ads were blocked and which websites were intercepted.

Blocking Logs

Statistics

The private service provides network access statistics within 24 hours to understand user browsing habits.

Statistics display most visited websites and most blocked websites.

Statistics

Custom Rules

Create custom rules within the private service to block ads in frequently used apps or allow websites you don’t consider as ads.

Users may need to check access logs and observe website query records when launching specific apps to add custom rules.

Custom Rules

Whitelist Mode

To prevent certain types of websites from being blocked, set whitelist mode to only allow access to specific websites.

Whitelist has higher priority than blacklist. Websites in the whitelist won’t be blocked. Users can add frequently used websites to the whitelist to avoid false blocking.

Whitelist Mode

Authoritative Resolution

Supports adding authoritative resolution for enterprise or home devices, resolving specified names to home device IP addresses, eliminating the need to memorize IP addresses.

Users don’t need to purchase domains or complete ICP registration. Simply add authoritative resolution rules within the private service.

Authoritative Resolution

2 - How to Configure

“NingPing” configuration guide

After the paid service expires,

  • The service will be disabled immediately, and attempting to access the admin dashboard will redirect you to the service status page.
  • Personal settings will be retained for 7 days; if you do not renew within 7 days, all service data will be permanently deleted.
  • Once the service is completely removed, your custom domain will no longer be able to access the service. Remember to update your encrypted DNS settings, otherwise you will be unable to access the Internet.

Need help?

Contact on WeChat private6688
or Send email service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.

2.1 - Android

Android Private DNS Configuration Guide: Set {device}.{username}.adguardprivate.com to enable system-level encrypted DNS, reducing latency and enhancing privacy protection.

Configuration Steps

Setup instructions for different phone brands:

Xiaomi/Redmi Phones

  1. Open Settings
  2. Select Connections & Sharing
  3. Tap Private DNS
  4. Choose Private DNS Provider Hostname
  5. Enter: xiaomi1.{xxxxxxxxxxxxxxxx}.adguardprivate.com

Samsung Phones

  1. Open Settings
  2. Select Connections
  3. Tap More Connection Settings
  4. Choose Private DNS
  5. Enter: samsung1.{xxxxxxxxxxxxxxxx}.adguardprivate.com

⚠️ Important Notes:

  • Must add device1. prefix, i.e. device1.{xxxxxxxxxxxxxxxx}.adguardprivate.com
  • Directly using {xxxxxxxxxxxxxxxx}.adguardprivate.com won’t work
  • Replace {xxxxxxxxxxxxxxxx} with your exclusive DNS server address

Verification

After configuration:

  1. System will automatically verify DNS connection status
  2. “Connected” status indicates successful setup

Troubleshooting

If configuration fails, check:

  1. Correct DNS prefix: Must use device1.{xxxxxxxxxxxxxxxx}.adguardprivate.com format
  2. Whether DNS server address is correct
  3. Network connection status
  4. Whether account is active

Setup Demo

2.2 - iPhone

iOS/iPadOS Configure DoH/DoT: Download and install the exclusive configuration profile to enable encrypted DNS at system level for safer children internet access and fewer ads.

iOS 14 and later versions natively support encrypted DNS via DNS over HTTPS (DoH) and DNS over TLS (DoT). You can enable it through the following steps:

  1. Open the Safari browser and navigate to your private service backend: Setup Guide -> DNS Privacy
  2. Download Configuration Profile
  3. Open Settings on your iPhone
  4. Tap General
  5. Tap VPN & Device Management
  6. Select your dedicated configuration to install

Configuration Demo

2.3 - Windows

Windows configuration for DoH/DoT encrypted DNS: System-level settings and browser-built-in DoH solutions to ensure stable ad-blocking and privacy protection.

Windows 11

Windows 11 (version 21H2 and later) natively supports DNS over HTTPS (DoH). You can enable it using the following method:

  1. Open Settings
  2. Navigate to Network & Internet
  3. Select Ethernet
  4. Under DNS server assignment, click Edit
    1. Select Manual
    2. For IPv4 Preferred DNS, enter 120.26.96.167. For IPv6, use 2408:4005:3de:8500:4da1:169e:dc47:1707
    3. Set DNS over HTTPS to: On (manual template)
    4. In DoH template, enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query/windows1 where {xxxxxxxxxxxxxxxx} is your encrypted DNS service username and windows1 is your OS identifier
    5. Do not check Fallback to plaintext
    6. For alternate DNS, you may optionally use 223.5.5.5 (Aliyun Public DNS) with DNS over HTTPS off and Fallback to plaintext checked

Windows 10 and Earlier Versions

Windows 10 and earlier versions don’t natively support encrypted DNS. However, modern browsers like Chrome/Edge and Chromium-based browsers (including Chinese browsers like 360/QQ) allow DoH configuration. Chrome setup instructions:

  1. Open Chrome Settings
  2. Navigate to Privacy, search, and services
  3. Scroll to Security
  4. Enable Use secure DNS
  5. Under Choose service provider, enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query/browser1 where {xxxxxxxxxxxxxxxx} is your encrypted DNS username and browser1 is your browser identifier

For other browsers, refer to their respective settings (usually under Settings > Privacy > Security).

2.4 - macOS

macOS DoH/DoT setup: download and install the configuration profile to enable system-wide encrypted DNS, block trackers & ads, and enhance network security.

macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypted DNS. You can enable it as follows:

  1. Open the built-in Safari browser and navigate to the NullPrivate service dashboard, Setup GuideDNS Privacy.
  2. Download the profile.
  3. Open System Settings.
  4. Go to Privacy & Security.
  5. Select Profiles.
  6. Choose your dedicated profile and install it.

2.5 - Browser

Enable DoH in Chrome/Edge and other Chromium browsers: Activate “Secure DNS”, fill in your dedicated DoH endpoint for enhanced privacy and stable resolution.

Chromium 79+ browsers support DoH. Here’s how to configure Chromium-based browsers (Chrome/Edge/360/QQ etc.):

  1. Open Chrome browser Settings
  2. Navigate to Privacy, search, and services
  3. Scroll to Security
  4. Enable Use secure DNS to specify how to look up website network addresses
  5. In Choose service provider, enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query/browser1, where {xxxxxxxxxxxxxxxx} is your dedicated encrypted DNS username, and browser1 is your browser ID.

3 - Feature Description

NullPrivate - Professional ad-blocking and privacy-protection solution

Product Overview

NullPrivate is a powerful network ad-blocking tool focused on providing comprehensive network privacy protection and content-filtering services. With advanced filtering technology, it helps users achieve a safer, faster, and cleaner web-browsing experience.

Core Features

  • Smart Encryption Service

    • Supports DoT/DoH encryption protocols
    • High-performance domain name resolution
    • Intelligent caching mechanism
  • Comprehensive Ad Blocking

    • Precise ad identification
    • Pop-up and tracker blocking
    • Custom filtering rules
  • Privacy Protection

    • Encrypted queries
    • Logging options
    • Anti-tracking protection
  • Advanced Features

    • Real-time statistical analysis
    • Anti-addiction
    • Schedule settings
    • Whitelist & blacklist management
    • Custom rewriting

Please use the left-hand table of contents to view detailed instructions for each feature.

3.1 - Web Ad Blocking

NullPrivate effectively blocks web ads through intelligent analysis and filtering technology, providing a cleaner browsing experience. It not only significantly improves webpage loading speed but also reduces bandwidth consumption and protects your online privacy.

Basic Principles of Ad Blocking

“NullScreen” employs DNS filtering technology to monitor and analyze network requests in real-time. When detecting ad-related domain requests, the system automatically returns a null address or local loopback address, effectively blocking ad content loading. This method is both efficient and transparent to users, without affecting normal browsing experience.

Intelligent Blacklist System

NullPrivate adopts a multi-level blacklist management mechanism:

  • Automatic Updates: The system regularly fetches the latest ad domain lists from trusted sources
  • Category Management: Classifies domains into different categories such as ads, trackers, and malware
  • Performance Optimization: Uses efficient matching algorithms to ensure quick responses
  • Statistical Analysis: Provides detailed blocking statistics to help

3.2 - Mobile Ad Blocking

Effectively block ads in the mobile OS and apps, boosting device performance and user experience

Problem Overview

Many Android devices ship with pre-installed adware that:

  • Pops up ads at inappropriate moments
  • Continuously collects user data in the background
  • Consumes system resources, causing performance degradation
  • Generates unnecessary network traffic
  • Significantly shortens battery life

AdGuard Solution

“NingPing” protects your device by:

  • Blocking network requests from adware
  • Preventing malicious tracking
  • Optimizing device performance
  • Extending battery life
  • Reducing mobile data usage

3.3 - Privacy Protection

Intercept privacy leakage requests to protect user privacy.

The Relationship Between Privacy and Advertising

Advertisers’ revenue primarily comes from ad conversions. To improve conversion rates, platforms need to:

  1. Increase user retention
  2. Deliver personalized ads

This requires collecting vast amounts of user privacy data. Platforms circumvent legal restrictions through:

  • Complex user agreements
  • Data exchanges with partners
  • Disguised data anonymization

Priority of Privacy Protection

Privacy protection is more important than mere ad blocking:

  • AdGuard’s Chinese region tracking blocking rules (>400,000) far exceed ad rules (<100,000)
  • Some platforms generate more revenue through privacy data despite having fewer ads

Privacy list count

Behind Platforms’ “Thoughtfulness”

So-called personalized recommendations often don’t truly understand user needs, but rather serve as marketing strategies:

  • “You might like this” actually means “We want to sell this”
  • Seemingly thoughtful services mask continuous data collection

How to Protect Yourself

Learn “cyber discretion” – control privacy leaks to avoid accurate profiling by platforms. AdGuard Private Service can help you achieve this goal.

3.4 - Malware Blocking

Intercept malware through multi-layer protection mechanisms to safeguard devices and data security

What is Malware?

Malware is a category of software designed to damage or gain unauthorized access to computer systems. It may:

  • Steal personal information and sensitive data
  • Disrupt system functions and files
  • Encrypt data for ransom
  • Recruit devices into botnets

How Malware Spreads

Hackers typically spread malware through the following methods:

  • Download links disguised as legitimate software
  • Attachments in phishing emails
  • Vulnerable websites
  • Infected advertisements

How AdGuard Protects You

“NingPing” provides comprehensive malware protection:

  • Blocks known malware download links
  • Prevents communication between malware and command-and-control servers
  • Identifies and stops suspicious data exfiltration
  • Regularly updates malware signature databases

It is recommended that you also adopt additional security measures, such as keeping your system and software up to date and exercising caution when downloading and opening attachments.

3.5 - Adult Content Blocking

“NullPrivate” provides powerful adult content filtering, using intelligent recognition and blocking mechanisms to effectively shield against inappropriate content, creating a safe network environment for families and enterprise users.

Feature Overview

“NullPrivate” employs a multi-layer content filtering mechanism that can effectively identify and block:

  • Pornographic and adult content sites
  • Violent content
  • Gambling-related sites
  • Other harmful information

How It Works

The system achieves content blocking through:

  1. DNS-level blocking: Prevents domain resolution of known harmful sites
  2. Intelligent categorization: Classification system based on multiple trusted data sources
  3. Real-time updates: Regularly updated blocking rules to ensure protection effectiveness

Configuration Guide

Basic Settings

Add the blocklist Link to the filter blacklist

Advanced Options

  • Custom rules: Add specific sites to the blocklist
  • Exception management: Set up whitelists to avoid false positives
  • Access logs: View blocking records

Application Scenarios

  • Family protection: Create a safe browsing environment for minors
  • Enterprise management: Ensure employee access to work-appropriate sites
  • Public spaces: Suitable for public networks in libraries, schools, etc.

Notes

  1. Recommended to use in conjunction with anti-addiction features
  2. Regularly check and update filtering rules
  3. If false positives occur, promptly add to whitelist
  4. If circumvention is detected, submit feedback

3.6 - Social Network Blocking

Protect your online privacy by blocking social network trackers and embedded components

Risks of Social Network Tracking

Social network platforms collect user data through various means:

  • Social plugins and share buttons
  • Embedded content and widgets
  • Third-party cookies and trackers
  • Cross-site user behavior analysis

How AdGuard Protects You

“NingPing” safeguards your privacy by:

  • Blocking social media trackers
  • Preventing unauthorized data collection
  • Filtering social network ads
  • Stopping user profiling analysis
  1. Enable the social network filter
  2. Regularly check the blocking log
  3. Set up a whitelist as needed
  4. Keep filtering rules updated

With these measures, you can continue using the core features of social networks while protecting yourself from unwanted tracking and data collection.

3.7 - Phishing Site Blocking

Blocks phishing site requests, safeguards users’ personal assets, and provides all-around network security protection.

What is a phishing site?

A phishing site is a fraudulent website that masquerades as a legitimate one in order to obtain sensitive information such as personal details and account passwords. These sites usually imitate:

  • Banks and payment platforms
  • Social networks
  • E-commerce sites
  • Government agency websites

Main risks

  • Stealing user accounts and passwords
  • Pilfering bank card and payment information
  • Spreading malware
  • Causing personal privacy leaks
  • Leading to financial loss

How AdGuard protects you

“NingPing” offers protection through:

  1. Real-time URL safety checks
  2. Blocking known phishing sites
  3. Preventing malicious domain resolution
  4. Providing safe-browsing alerts

Safe-usage recommendations

  • Enable AdGuard’s phishing protection
  • Pay attention to the authenticity of the URL
  • Do not click links from unknown sources
  • Regularly update the AdGuard rule database

3.8 - Tracking Protection

Block tracking requests to fully protect user privacy and enhance the browsing experience.

What is Tracking?

Tracking is the practice of websites and applications collecting user data. Common tracking methods include:

  • Cookie tracking
  • Tracking pixels
  • Browser fingerprinting
  • Device identifier collection
  • Behavioral analysis scripts

Impact of Tracking

Tracking activities have the following negative effects:

  • Violate user privacy by exposing personal behavioral data
  • Increase network traffic consumption
  • Reduce device battery life
  • Slow down webpage loading speeds

How AdGuard Protects You

“NingPing” fully protects your privacy by:

  • Intelligently identifying and blocking tracking requests
  • Preventing third-party cookies
  • Removing tracking parameters
  • Blocking common analytics scripts

By using AdGuard, you can enjoy a safer, faster, and more energy-efficient web experience.

3.9 - Malicious Traffic Interception

Prevent malicious traffic hijacking and content tampering through encrypted DNS and traffic protection, ensuring secure network access

Malicious Traffic Interception

Problem Background

In daily internet usage, you may encounter the following security risks:

  • ISP DNS hijacking that redirects you to fake websites
  • Public WiFi hotspots injecting advertising content
  • Man-in-the-middle attacks tampering with web content
  • Unencrypted traffic being monitored and hijacked

Solution

Through the following technical means, we can effectively protect against these threats:

  1. Enable encrypted DNS queries
  2. Use HTTPS encrypted connections
  3. Establish private secure channels
  4. Real-time monitoring of abnormal traffic

These protection measures can ensure your network access is safe and reliable, preventing various malicious hijacking and content tampering.

3.10 - Access Request Logs

Through detailed request logs and statistical data, help you comprehensively understand and manage network traffic.

Complete Access Request Logs

Request Logs

Access request logs provide the following detailed information:

  • Time: The specific time when the request occurred
  • Client: The IP address of the device initiating the request
  • Request Target: The domain name or IP address being accessed
  • Response Status: The processing result of the request
  • Filter Rule: The triggered filter rule (if any)

You can use the search box to filter logs by domain name, IP, or rule name. Logs are retained for 3 days by default.

Top Requested Domains

Top Requested Domains

Domain access statistics display:

  • Most frequently accessed domains
  • Request count per domain
  • Generated upstream/downstream traffic
  • Last access time

Supports sorting by request count or traffic volume to help identify high-frequency accessed websites.

Top Blocked Domains

Top Blocked Domains

Blocking statistics show:

  • List of blocked domains
  • Block count statistics
  • Triggered filter rules
  • Last blocking time

You can directly perform in the list:

  • Add mistakenly blocked domains to whitelist
  • View specific rules causing blocks
  • Export statistical data for analysis

3.11 - Statistics

Comprehensive DNS query statistical analysis to help you understand network usage.

DNS Query Statistics

AdGuard private service provides detailed DNS query statistical analysis to help you better understand network usage.

Top Requested Domains

Top Requested Domains

Statistics include:

  • Domain access frequency statistics
  • Request count per domain
  • View trends by time period
  • Support search and filtering

Blocking Records Analysis

Top Blocked Domains

Detailed display:

  • List of blocked domains
  • Blocking rule matching details
  • Blocking reason explanations
  • Blocking time records

Data Applications

Statistical data helps you:

  • Identify potential security threats
  • Optimize ad filtering rules
  • Analyze network usage habits
  • Adjust network access policies

3.12 - Supported Platforms

“NingPing” supported platforms and configuration guide

Supported Protocols

“NingPing” supports the following encrypted DNS protocols:

  • DoT (DNS over TLS) - DNS queries encrypted via TLS
  • DoH (DNS over HTTPS) - DNS queries encrypted via HTTPS

Supported Platforms

Windows 11

  • Supports system-level DoH configuration
  • Configure via Settings -> Network & Internet -> DNS server

macOS (Big Sur and above)

  • Supports system-level DoH/DoT configuration
  • Can be configured via System Preferences -> Network

iOS (14.0 and above)

  • Supports system-level DoH/DoT configuration
  • Can be configured in Settings -> General -> VPN & Device Management

Android (9.0 and above)

  • Supports system-level Private DNS (DoT)
  • Configure in Settings -> Network & Internet -> Private DNS

Browser Support

  • Chrome/Edge/Brave: Supports DoH
  • Firefox: Supports DoH/DoT
  • Safari: Follows system DNS settings

For detailed configuration instructions, please refer to the specific configuration guides for each platform.

3.13 - Configuration Guide

Detailed configuration instructions for “Ning Screen”, including quick start, advanced settings, and FAQ.

Quick Start

“Ning Screen” adopts a “ready-to-use” design philosophy:

  • Pre-configured optimized settings
  • Intelligent rule management
  • Automatic update maintenance

Configuration Methods

Secure Connection Options

Provides two secure encryption methods:

  1. TLS Encryption

    • Higher performance
    • Suitable for mobile devices
    • Supports DNS-over-TLS
  2. HTTPS Encryption

    • Broader compatibility
    • Suitable for browsers
    • Supports DNS-over-HTTPS

Device Configuration Guide

Browser Configuration

  • Link: https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query/browser1
  • Supports all major browsers
  • No additional plugins required

Android Devices

  • Server: android1.xxxxxxxxxxxxxxxx.adguardprivate.com
  • Supports system-level configuration
  • Compatible with third-party DNS apps

iOS Devices

  • Provides dedicated configuration profile
  • Supports system-level settings
  • Automatically configures required parameters

Advanced Settings

Custom Rules

  • Supports importing custom filtering rules
  • Configurable rule priorities
  • Supports regular expressions

Performance Optimization

  • DNS cache settings
  • Response timeout configuration

3.14 - Open Source Information

Transparent and verifiable privacy commitment: built on AdGuard Home, licensed under GPL-3.0, full source code and change logs are public for better security and auditability.

This project is inherited from an open-source project and follows the same open-source license GPL-3.0.

3.15 - Custom Rules

NullPrivate supports multiple custom rule formats, allowing flexible configuration to meet your needs.

NullPrivate supports multiple custom rule formats, allowing flexible configuration to meet your needs. Below are the commonly used rule formats and examples:

Rule FormatExampleDescription
Domain Block||example.org^Blocks example.org and all its subdomains
Allowlist@@||example.org^Adds example.org and all its subdomains to the allowlist
DNS Redirect127.0.0.1 example.orgResolves example.org to the specified IP
Comment! comment or # commentAdds rule comments without affecting actual filtering
Regex/REGEX/Matches domains using regular expressions

Advanced Usage

  • You can combine multiple rule types
  • Rule priority: Allowlist > Blocklist > DNS Redirect
  • Supports importing third-party rule lists

For detailed information, please refer to the AdGuard Home Hosts Blocklists documentation.

3.16 - Custom DNS Resolution

With custom DNS resolution, you can configure friendly domain names for LAN devices, simplifying network device management and enhancing user experience.

Feature Overview

Custom DNS resolution allows you to:

  • Configure custom domain names for LAN devices
  • Implement private domain name resolution
  • Securely and conveniently access internal network services

Application Scenarios

Network Device Access

  • NAS device: nas.home → 192.168.1.100
  • Router: router.home → 192.168.1.1
  • Printer: printer.home → 192.168.1.200

Development & Testing Environments

  • Local service: api.local → 127.0.0.1
  • Test environment: test.local → 192.168.1.50
  • Container: redis.local → 172.17.0.2

Resolve to NAS

Configuration Guide

Basic Syntax

Domain RecordType TargetAddress
home A 192.168.1.2
*.home A 192.168.1.2

Supported Record Types

  • A record: IPv4 address resolution
  • AAAA record: IPv6 address resolution
  • CNAME record: Domain alias

Security Features

  • Only effective on configured devices
  • Won’t expose internal IP addresses
  • Supports wildcard domain configuration
  • Takes effect immediately without restart

Usage Recommendations

  1. Choose intuitive domain naming
  2. Recommended to use .home suffix
  3. Track internal IP changes
  4. Regularly check resolution configurations

3.17 - Custom Block List

With the custom block list feature, you can precisely control network access and achieve personalized content filtering and ad blocking.

Feature Overview

Custom block lists provide:

  • Precise domain blocking control
  • Flexible rule import/export
  • Real-time update mechanism
  • Convenient list management interface

Supported List Formats

Standard Format

||example.com^
||ads.example.com^

Mainstream Subscription Sources

  • AdGuard format
  • HOSTS format
  • Domain format

Custom Block List

System Preset Lists

We offer the following optimized lists:

  • Mobile Manufacturer Ads Blocking: Specifically targets brand-specific system ads
  • General Ad Blocking: Covers common advertising networks
  • Privacy Protection: Blocks trackers and data collection

Usage Recommendations

  1. List Selection

    • Add lists from trusted sources
    • Avoid duplicate rules
    • Regularly update rule sources
  2. Performance Optimization

    • Control list quantity
    • Remove invalid rules
    • Monitor blocking effectiveness
  3. Troubleshooting

    • Log blocking activities
    • Verify rule syntax
    • Address false positives promptly

3.18 - Quick Response

Respond to requests quickly and boost network speed.

Quick Response

“NingPing” employs a high-performance server cluster to deliver an ultra-fast web browsing experience. Outstanding performance is achieved through the following approaches:

Optimized Network Architecture

  • Dedicated server deployment
  • Optimized network routing
  • Fewer intermediary nodes
  • Low-latency connections

Technical Advantages

  • High-performance caching system
  • Intelligent DNS resolution
  • Load balancing
  • Rapid failover

Performance Improvements

  • Significantly reduced access latency
  • Faster page load times
  • Optimized DNS lookup duration
  • Enhanced overall browsing experience

3.19 - Setting Internet Access Schedules

Configure and manage family members’ internet access time through AdGuard Private Service

Feature Description

AdGuard Private Service offers flexible internet schedule management to help parents better regulate children’s online time. You can set independent internet access rules for different devices to ensure healthy internet usage for family members.

Setup Steps

  1. Log in to AdGuard Private Service management interface
  2. Navigate to Filters -> Blocked Services
  3. Click the “Internet Schedule” option
  4. Set allowed or restricted internet access time periods

Usage Recommendations

  • Set age-appropriate internet schedules for school children
  • Configure different policies for weekdays and weekends
  • Recommended to set unified bedtime restrictions

Setting Internet Schedule

Important Notes

  • Changes take effect immediately
  • Schedule adjustments can be made anytime
  • Supports temporary restriction removal

4 - Public Services

Free public service guide: encrypted DNS access rules for basic ad-blocking and privacy protection, selection advice, and enabled subscription lists.

We provide free public services and have curated a set of widely-used domain lists.

Public Service Rules

The public service employs balanced ad-blocking rules; false positives or misses may occur. The rule lists are:

Some users configure extra protection for elderly family members, so we also include security-blocking rules:

Additionally, the public service includes the following rules to block stubborn ads on certain phones that cannot be removed by conventional means:

# huawei search && browser
hisearch-drcn.dt.dbankcloud.com
uc-drcn.hispace.dbankcloud.cn
connect-drcn.hispace.hicloud.com
adx-drcn.op.dbankcloud.cn
hisearch-static-drcn.dbankcdn.com
||configserver.hicloud.com
||configserver.platform.hicloud.com
||configdownload.dbankcdn.cn
||browsercfg-drcn.cloud.dbankcloud.cn

Usage Notes

Because the public service is intended for the general population, it cannot accommodate personalized needs. Some users complain that ad-blocking is insufficient, while others report that false positives prevent game logins. We apologize that the public service cannot satisfy everyone; content that some view as ads may be useful information to others. In such cases, we tend to prioritize users who consider it useful.

When a false positive prevents WeChat or Alipay mini-programs from loading, simply disable the phone’s encrypted DNS setting temporarily to access the required service. However, based on our operational experience, many users do not know what to do when a service fails to work properly, so we must consider non-technical users’ experience.

Users familiar with DNS who encounter false positives or insufficient blocking should consider purchasing a private service.

Private services offer access logs, blocking logs, statistics, custom rules, authoritative resolution, and more to meet individual needs.

For other common requests,

Need help?

Contact on WeChat private6688
or Send email service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.

Setup Instructions by Platform

Android

Android has natively supported DNS over TLS (DoT) since Android 9; phones released after 2019 are compatible. Enable it as follows:

  1. Open Settings
  2. Go to More connections
  3. Open Private DNS
  4. Choose Private DNS provider hostname and enter: public.adguardprivate.com

Self-hosted DNS can be implemented in many ways (e.g., AdGuard, dnsmasq, clash), but only native DoT has zero impact on phone performance. It requires no third-party apps, no permissions, no resources, and does not affect battery life. Therefore, native DoT encrypted DNS is recommended.

iPhone

iOS 14 and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:

  1. Open Safari, download the profile: dot.mobileconfig
  2. Open Settings
  3. Go to General
  4. Open VPN & Device Management
  5. Select Install Profile

macOS

macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:

  1. Open Safari, download the profile: dot.mobileconfig
  2. Open System Preferences
  3. Go to Network
  4. Select VPN & Device Management
  5. Choose Install Profile

4.1 - Android

Detailed instructions on configuring DNS encryption for various Android phone brands

Feature Description

Android 9 and above natively support DNS over TLS (DoT) encryption, protecting DNS queries from eavesdropping and tampering.

Setup Methods

Setup paths may vary across different phone brands. Here are specific steps for common brands:

Xiaomi/Redmi Phones

  1. Open Settings
  2. Select Connections & Sharing
  3. Click Private DNS
  4. Choose Private DNS provider hostname
  5. Enter: public.adguardprivate.com

Samsung Phones

  1. Open Settings
  2. Select Connections
  3. Click More connection settings
  4. Choose Private DNS
  5. Select Private DNS provider hostname
  6. Enter: public.adguardprivate.com

OPPO/OnePlus Phones

  1. Open Settings
  2. Select Wi-Fi & Network
  3. Click Private DNS
  4. Choose Private DNS provider hostname
  5. Enter: public.adguardprivate.com

Other Brands

Find related settings through:

  • Searching “DNS” or “Private DNS” in Settings
  • Checking network settings or advanced network options

FAQs

How to verify if settings are effective?

  1. After setup, the system automatically verifies DNS server
  2. If showing “Connected” or checkmark, the setup is successful

Troubleshooting Failed Setup

  1. Ensure the entered domain name is completely correct
  2. Check network connection status
  3. Confirm Android version compatibility (requires Android 9+)

Setup Demo

4.2 - iPhone

Detailed guide on configuring DNS encryption on iPhone

Feature Overview

Starting from iOS 14, iPhone natively supports encrypted DNS features including:

  • DNS over HTTPS (DoH) - Encrypts DNS queries via HTTPS protocol
  • DNS over TLS (DoT) - Encrypts DNS queries via TLS protocol

These features effectively protect your network privacy and prevent DNS hijacking.

Configuration Steps

1. Download Configuration File

Use Safari browser to download the configuration file: dot.mobileconfig

2. Install Configuration File

  1. Open the Settings app
  2. Go to General > VPN & Device Management
  3. Select and install the public.adguardprivate.com DoT configuration profile

Special Notes

If you have enabled iCloud Private Relay, you need to:

⚠️ Security Warning
Exercise extreme caution when installing configuration profiles. The profiles provided on this site are solely for legitimate privacy protection and ad-blocking services.
Do not install configuration profiles from unknown sources as this may compromise your device security.

Configuration Demo Video

4.3 - macOS

Detailed instructions on how to configure DNS encryption on macOS

macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). You can enable encrypted DNS as follows:

  1. Open the built-in Safari browser and download the configuration file: dot.mobileconfig
  2. Open System Settings
  3. Go to Privacy & Security
  4. Select Profiles
  5. Under “Downloaded,” choose public.adguardprivate.com DoT to install

Please note that this is an unconventional way to modify system settings. We generally advise iPhone users not to install configuration files from unknown sources unless you are certain of their origin. This site provides legitimate personal-privacy protection and ad-blocking services and will never perform any actions that are harmful or objectionable to users. This disclaimer is intended to remind you that, even if you trust me, you should not readily trust configuration files provided by other websites. I will cover the potential risks of modifying system DNS settings in this manner in another article.

The complete contents of the configuration file are shown below. You can copy the text and paste it into your iPhone’s settings, or simply click the link above to download the file.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
	<dict>
		<key>PayloadContent</key>
		<array>
			<dict>
				<key>DNSSettings</key>
				<dict>
					<key>DNSProtocol</key>
					<string>TLS</string>
					<key>ServerName</key>
					<string>public.adguardprivate.com</string>
				</dict>
				<key>PayloadDescription</key>
				<string>Configures device to use NullPrivate</string>
				<key>PayloadDisplayName</key>
				<string>public.adguardprivate.com DoT</string>
				<key>PayloadIdentifier</key>
				<string>com.apple.dnsSettings.managed.11b4d48d-8e9b-4e15-b7c1-45cb1c564c99</string>
				<key>PayloadType</key>
				<string>com.apple.dnsSettings.managed</string>
				<key>PayloadUUID</key>
				<string>e9819f0c-250e-49b7-ad89-c0db078c72f0</string>
				<key>PayloadVersion</key>
				<integer>1</integer>
			</dict>
		</array>
		<key>PayloadDescription</key>
		<string>Adds NullPrivate to macOS Big Sur and iOS 14 or newer systems</string>
		<key>PayloadDisplayName</key>
		<string>public.adguardprivate.com DoT</string>
		<key>PayloadIdentifier</key>
		<string>e0b7d7db-e0d1-4bce-bcf4-8ada45d2f5a3</string>
		<key>PayloadRemovalDisallowed</key>
		<false/>
		<key>PayloadType</key>
		<string>Configuration</string>
		<key>PayloadUUID</key>
		<string>0404cb98-3621-4f97-9530-b18288633d40</string>
		<key>PayloadVersion</key>
		<integer>1</integer>
	</dict>
</plist>

5 - Advanced Features

Advanced features tutorial: ECS/client subnets, quick response, rules and filter lists, device naming, and other advanced configurations and best practices.

Here we will introduce some advanced usage tips for private services.

5.1 - Blocked Application List

App-level blocking list: one-click ban of social/gaming apps with schedule support, region-based preset lists, helping minors avoid addiction and boosting productivity.

It is important not to confuse this with blacklists, which are usually used to block ads, privacy trackers, malware, etc. The Blocked Application List is for completely preventing the use of specified applications.

It is typically combined with a schedule to build personal habits and avoid addiction. Commonly used for minors’ habit formation—for example, prohibiting social media and games during study hours. It can also be used for adult self-discipline, such as banning social media and games during work hours.

This service provides pre-configured rules based on popular apps in each country. Because popular culture changes and companies evolve, these lists may become outdated, but we are committed to ongoing maintenance.

If you find that an app in the list is not fully blocked, or if you need to add a recently popular app, please contact us and we will handle it promptly.

Need help?

Contact on WeChat private6688
or Send email service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.

Country/RegionApplication List
GlobalGlobal Application List
Mainland ChinaMainland China Application List

5.2 - ECS Boosts CDN Access Speed

ECS (Extended Client Subnet) acceleration: pass subnet information upstream to improve CDN hit rates and enable closer resolution, delivering faster and more stable access.

NullPrivate supports ECS, delivering more precise resolution and optimizing your network experience.

What is ECS (Extended Client Subnet)?

ECS (Extended Client Subnet) is a DNS protocol extension that allows a DNS resolver (such as your NullPrivate server) to pass part of the client’s IP address information to the authoritative DNS server. This enables the authoritative server to provide more accurate DNS responses based on the client’s network location.

How ECS Works

  1. Traditional DNS Query: Without ECS, the DNS resolver only sends its own IP address to the authoritative DNS server. This forces the authoritative server to make resolution decisions based on the resolver’s location (usually a data center), which can yield sub-optimal results.

  2. ECS-enabled DNS Query: When ECS is enabled, the DNS resolver includes a portion of the client’s IP address (the subnet) in the DNS query. For example, if the client’s IP is 203.0.113.45, the resolver might send 203.0.113.0/24 as ECS information.

  3. Authoritative Server Response: Upon receiving a query containing ECS information, the authoritative DNS server can use it to select the IP address best suited to the client—typically the server geographically closest to the client.

Benefits of ECS

  • Faster Response Times: By directing clients to the nearest server, ECS reduces latency and improves application responsiveness.
  • Enhanced User Experience: Faster response times create a smoother, more enjoyable online experience.
  • More Effective CDN Usage: Content Delivery Networks (CDNs) can leverage ECS to direct users to the optimal content server, boosting efficiency and lowering costs.
  • Bypass Local Resolver Limitations: Some local ISP DNS servers may have issues such as resolution errors or domain hijacking. ECS can bypass these limitations to obtain more accurate resolution results.

Why Use ECS with NullPrivate?

As a private DNS server, NullPrivate can be configured to use upstream DNS servers for domain resolution. With ECS enabled, NullPrivate can pass your client subnet information to those upstream servers, yielding more accurate resolution results.

5.3 - DDNS Dynamic Resolution

Use NullPrivate to implement convenient DDNS dynamic resolution service

What is DDNS?

DDNS (Dynamic DNS) allows you to bind a fixed domain name to a dynamic IP address, suitable for home broadband users accessing internal network devices such as NAS, smart home controllers, etc.

Feature Highlights

  • Easy to use: Only requires a single script to achieve automatic updates
  • Zero additional cost: No need to purchase a domain
  • High reliability: Built on NullPrivate’s DNS infrastructure
  • Fast propagation: DNS records take effect immediately after update, no DNS propagation wait required

Usage Guide

explorer_VIZAwW9wSO

You can find the DDNS script download address under Filters->DNS Rewriting.

FAQ

How to verify if it’s working?

Check if resolution points correctly to your current IP address using the ping your-domain.name command.

Or log in to the service backend and view records under Filters->DNS Rewriting.

How to schedule automatic updates?

Windows Task Scheduler

  1. Open Task Scheduler
  2. Create Basic Task
  3. Set execution frequency (recommended 15-30 minutes)
  4. Select PowerShell as program location, enter full script command in parameters

Linux Cron Job

Add the following to crontab (executes every 15 minutes):

*/15 * * * * /path/to/update_dns.sh https://xxxxxxxx.adguardprivate.com admin:password123 nas.home

Important Notes

  • Keep your username and password secure to prevent leakage
  • Recommended to add update script to system scheduled tasks for automatic execution
  • If resolution doesn’t take effect promptly, check network connection and credential validity

5.4 - DNS Split-Horizon Configuration Guide

A detailed walkthrough on optimizing network access via DNS split-horizon, including domestic and overseas DNS server setup and rule configuration.

DNS Split-Horizon Overview

DNS split-horizon routes resolution requests for different domains to distinct DNS servers, greatly improving network access. A well-designed setup can:

  • Accelerate domain resolution
  • Increase website stability
  • Optimize cross-border access
  • Avoid DNS pollution

NullPrivate Split-Horizon Configuration

Basic Example

# Domestic DNS servers
223.5.5.5                                    # Alibaba DNS
2400:3200::1                                 # Alibaba DNS IPv6
public0.adguardprivate.svc.cluster.local    # Private DNS, mainland upstream

# Overseas DNS servers
tls://1.0.0.1                               # Cloudflare DNS
tls://[2606:4700:4700::1001]               # Cloudflare DNS IPv6
public2.adguardprivate.svc.cluster.local    # Private DNS, other upstream

# Split-horizon rules
[/google.com/bing.com/github.com/stackoverflow.com/]tls://1.0.0.1 public2.adguardprivate.svc.cluster.local
[/cn/xhscdn.com/tencentclb.com/tencent-cloud.net/aliyun.com/alicdn.com/]223.5.5.5 2400:3200::1 public0.adguardprivate.svc.cluster.local

Domestic Carrier DNS Servers

China Telecom DNS Servers

NamePrimary DNS ServerSecondary DNS Server
Anhui CT61.132.163.68202.102.213.68
Beijing CT219.142.76.3219.141.140.10
Chongqing CT61.128.192.6861.128.128.68
Fujian CT218.85.152.99218.85.157.99
Gansu CT202.100.64.6861.178.0.93
Guangdong CT202.96.128.86202.96.128.166
Guangxi CT202.103.225.68202.103.224.68
Guizhou CT202.98.192.67202.98.198.167
Henan CT222.88.88.88222.85.85.85
Heilongjiang CT219.147.198.230219.147.198.242
Hubei CT202.103.24.68202.103.0.68
Hunan CT222.246.129.8059.51.78.211
Jiangsu CT218.2.2.2218.4.4.4
Jiangxi CT202.101.224.69202.101.226.68
Inner Mongolia CT219.148.162.31222.74.39.50
Shandong CT219.146.1.66219.147.1.66
Shaanxi CT218.30.19.4061.134.1.4
Shanghai CT202.96.209.133116.228.111.118
Sichuan CT61.139.2.69218.6.200.139
Tianjin CT219.150.32.132219.146.0.132
Yunnan CT222.172.200.6861.166.150.123
Zhejiang CT202.101.172.3561.153.177.196
Tibet CT202.98.224.68202.98.224.69

China Unicom DNS Servers

NamePrimary DNS ServerSecondary DNS Server
Beijing CU123.123.123.123123.123.123.124
Chongqing CU221.5.203.98221.7.92.98
Guangdong CU210.21.196.6221.5.88.88
Hebei CU202.99.160.68202.99.166.4
Henan CU202.102.224.68202.102.227.68
Heilongjiang CU202.97.224.69202.97.224.68
Jilin CU202.98.0.68202.98.5.68
Jiangsu CU221.6.4.66221.6.4.67
Inner Mongolia CU202.99.224.68202.99.224.8
Shandong CU202.102.128.68202.102.152.3
Shanxi CU202.99.192.66202.99.192.68
Shaanxi CU221.11.1.67221.11.1.68
Shanghai CU210.22.70.3210.22.84.3
Sichuan CU119.6.6.6124.161.87.155
Tianjin CU202.99.104.68202.99.96.68
Zhejiang CU221.12.1.227221.12.33.227
Liaoning CU202.96.69.38202.96.64.68

China Mobile DNS IPs

NamePrimary DNS ServerSecondary DNS Server
Beijing CM221.130.33.60221.130.33.52
Guangdong CM211.136.192.6211.139.136.68
Jiangsu CM221.131.143.69112.4.0.55
Anhui CM211.138.180.2211.138.180.3
Shandong CM218.201.96.130211.137.191.26

Public DNS IPs

NamePrimary DNS ServerSecondary DNS Server
114 DNS114.114.114.114114.114.115.115
CNNIC SDNS1.2.4.8210.2.4.8
Alibaba Public223.5.5.5223.6.6.6
DNSPod DNS+119.29.29.29119.29.29.29
Google DNS8.8.8.88.8.4.4

Configuration Tips

  1. Prefer geographically close DNS servers
  2. Configure both IPv4 and IPv6 DNS
  3. Set up backup DNS for critical domains
  4. Update split-horizon rules regularly
  5. Monitor DNS response times

Precautions

  • Record original DNS settings before changes
  • Avoid untrusted DNS servers
  • Periodically verify DNS resolution
  • Keep rule lists concise and effective

Proper DNS split-horizon configuration can significantly improve network access. Choose DNS servers and rules according to your actual needs.

References

5.5 - Using Custom Device Names

Customize device identification names: distinguish endpoints via extended domain names/URL paths, accurately view “Client Rankings” and logs, and facilitate rule and schedule management.

If you directly use the service’s listening address, such as:

  • tls://xxxxxxxx.adguardprivate.com
  • https://xxxxxxxx.adguardprivate.com/dns-query

The IPs seen in the Client Rankings in the backend are the cluster IPs of the load balancer, which are meaningless to users and cannot distinguish between different devices.

Client Rankings

You can identify different devices by using extended domain names and adding URL paths.

Custom Client Name

  • For DoT, use the extended domain name method, e.g., tls://device1.xxxxxxxx.adguardprivate.com
  • For DoH, use the added URL path method, e.g., https://xxxxxxxx.adguardprivate.com/dns-query/device2

Note:

  • Android devices do not require entering the protocol prefix tls:// during setup; simply input device1.xxxxxxxx.adguardprivate.com
  • Apple devices follow setup instructions by entering a client ID and downloading a configuration file for setup, without manual input

Apple Device Setup Instructions

All devices under personal service share the service’s query limit of 30 requests per second.

5.6 - Faster Request Response

Faster Request Response: Properly configure cache TTL, upstream mode, and region selection to reduce first-packet latency and retry rate, significantly improving perceived speed.

Paid users utilize AdGuard’s private service. The DNS request path is as follows:

DNS Request Path

The fastest response solution can be analyzed based on this path.

Local Cache Hit

The fastest response is a local cache hit. Since the local cache operates at memory level, it’s extremely fast—taking only a few microseconds.

This is controlled by the DNS response’s TTL (Time to Live) value, typically ranging from minutes to hours, indicating that query results remain valid during this period and don’t require re-querying.

You can set the minimum TTL value at Control Panel -> Settings -> DNS Settings -> DNS Cache Configuration -> Override Minimum TTL Value. Increasing this value extends cache duration, allowing the system to utilize local cache more frequently. The typical TTL value is 600 seconds.

However, since our service also includes filtering capabilities, if a required service is mistakenly blocked by ad-blocking rules, temporarily disabling encrypted DNS won’t immediately grant access because the local cached result has been modified by filtering rules. Therefore, setting it to 60 seconds is a safer value, ensuring that in rare cases users won’t wait too long after disabling encrypted DNS due to accidental blocking.

AdGuard DNS Servers

We currently use Alibaba Cloud servers located in Hangzhou, which can meet low-latency needs for most users in eastern China. As business grows, we will expand server coverage nationwide in the future.

Server Cache Hit

By default, each user is allocated 4MB of DNS cache, which experience shows is sufficient for household usage. Free modification of this setting may lead to forced service termination, so we’ve disabled user access to modify this setting.

Upstream DNS Servers

Using Alibaba Cloud services, we’ve selected Alibaba’s DNS service as the upstream provider, which typically returns results within milliseconds.

Users have three methods to request upstream DNS servers:

  1. Load Balancing: Enabled by default, automatically selects the fastest server to return results.
  2. Parallel Requests: Currently unrestricted in our service.
  3. Fastest IP Address: Currently a meaningless setting; modification entry has been disabled.

Explanation why “Fastest IP Address” is meaningless: The truly fastest IP should be selected by the device actually accessing the service. When AdGuard operates in Hangzhou while the user is in Beijing, AdGuard might consider Hangzhou IPs fastest, but in reality Beijing-based services would be quicker for the user. Selecting Hangzhou IPs would actually increase latency. Therefore, we’ve disabled this setting modification. This setting might be useful in home networks but meaningless in public services.

Many factors affect network experience: server bandwidth, network congestion, server load, network quality, etc. Selecting the “fastest IP” doesn’t guarantee the fastest response—latency is just one factor among many. To prevent user misconfiguration from degrading service quality, we’ve disabled this setting.

Rule Filtering

The most common mode is blacklisting, where users can select from preset blacklists. Blacklist hits use hash algorithms—hit time remains O(1) regardless of rule volume, so users needn’t worry about performance degradation from large rule sets.

However, rules are stored in memory after computation. Each user’s service is limited to 300MB memory usage, sufficient for most needs. Excessively large rule sets may cause memory shortages, leading to repeated service restarts and interruptions.

We’ve temporarily disabled third-party rules to prevent users from importing oversized rule sets. Third-party rule support will be reinstated when better restriction methods become available.

Summary

To achieve faster request responses, users can:

  1. Appropriately increase the minimum TTL value to improve local cache hit rate.
  2. Set appropriate DNS cache size (preset value already configured).
  3. Select geographically closest cities when creating services (pending business expansion).
  4. Use load balancing for domestic needs; use parallel requests for overseas needs.
  5. Use appropriate blacklist rules, avoiding oversized rule sets.

5.7 - Setting Up Trusted DNS Providers

When creating a paid service, it defaults to using faster domestic upstream services, including Alibaba’s IPv4, IPv6, and DoT services.

Some DNS providers may have resolution errors, resolving certain overseas websites to incorrect IP addresses, making them inaccessible. A common symptom is browsers reporting certificate errors.

To avoid resolution errors, you can switch to upstream providers like Cloudflare. When using such services, ensure you’re using the DoH or DoT protocols to prevent hijacking.

Additionally, you need to disable domestic upstream services because they are geographically closer and faster, causing AdGuard to prioritize them.

Add a # before the corresponding service IP to disable that upstream service.

Avoid Resolution Errors

After configuration, Test Upstream to ensure the upstream server is available, then Apply.

Avoid Resolution Errors - Apply

However, using only overseas services may degrade the experience for domestic apps, as these apps typically resolve overseas domains to specific external servers with slower domestic access speeds.

If you only need to avoid resolution errors for commonly used services, you can manually specify DNS addresses for misresolved domains while keeping other domains on default domestic upstream services.

In the AdGuard console, go to Settings -> DNS Settings -> Upstream DNS Servers. Add misresolved domains in the format [/example1.com/example2.com/]tls://1.0.0.1 to Custom DNS Servers, then click Save Settings.

Configure Upstream Servers

Configure Upstream Servers

public2.adguardprivate.svc.cluster.local is our internally provided error-free resolution service, using Cloudflare as upstream. Compared to users manually specifying overseas upstreams, it offers faster resolution speeds at the cost of minor delays in DNS updates. Users without professional needs can use our error-free resolution service.

To use external Cloudflare or Google resolution addresses, specify IPs with DoT/DoH. Examples:

#tls://1.1.1.1
tls://1.0.0.1
tls://[2606:4700:4700::1111]
tls://[2606:4700:4700::1001]
tls://[2606:4700:4700::64]
tls://[2606:4700:4700::6400]
https://1.1.1.1/dns-query
https://1.0.0.1/dns-query
https://[2606:4700:4700::1111]/dns-query
https://[2606:4700:4700::1001]/dns-query
#tls://8.8.8.8
#tls://8.8.4.4
tls://[2001:4860:4860::8888]
tls://[2001:4860:4860::8844]
tls://[2001:4860:4860::64]
tls://[2001:4860:4860::6464]
#https://8.8.8.8/dns-query
#https://8.8.4.4/dns-query
#https://[2001:4860:4860::8888]/dns-query
https://[2001:4860:4860::8844]/dns-query

Addresses prefixed with # are commented out, indicating they are currently blocked by firewalls and unavailable.

Our site fully supports IPv6, which is one of our key advantages. You can use IPv6 upstream addresses for more stable resolution speeds.

6 - Cyber Subtlety

“Cyber Subtlety” series: teaches you how to hide sensitive traces while browsing daily, reduce tracking risks, combine anti-fraud and anti-addiction advice, and enhance personal digital security.

6.1 - How to Prevent Personal Information Leaks and "Doxxing" Risks

This article provides practical guidance on preventing personal information leaks and dealing with “doxxing” risks, helping you raise cybersecurity awareness and protect your privacy.

Beware of Risks from Piecing Together Scattered Information

In the Internet age, personal information exists in fragmented form across various platforms and services. Many people believe that leaking small pieces of information is harmless. However, the online environment is not absolutely secure, and malicious actors can collect and combine these scattered bits to reconstruct a complete personal profile. Even a simple search engine can be used for data gathering.

Take a certain social platform as an example: while users share snippets of their lives, they may inadvertently expose personal details. Some users like to publicly discuss the meaning and usage scenarios of their passwords, which undoubtedly increases the risk of those passwords being cracked.

Social-engineering principles tell us that meaningful strings often appear repeatedly in multiple places. A unique username or an easy-to-remember password is likely reused across different platforms, making it a common vector for information leaks.

Reduce Account Linkage to Protect Your Identity

For ordinary netizens who have no need to build a personal brand, it is recommended to use randomly generated usernames and passwords to minimize the correlation between accounts on different platforms.

Note that merely using different credentials is not enough to eliminate account linkage. If identical or similar content is posted under accounts on different platforms, they can still be identified as belonging to the same person.

Common Types of Sensitive Information

Below are some common types of sensitive information that require extra care:

  • Passwords
  • Usernames
  • Avatars
  • Birthdays
  • Addresses
  • Phone numbers
  • Email addresses
  • QQ numbers
  • WeChat IDs
  • Personal websites
  • Geolocation data
  • Photos

Malicious actors often integrate leaked personal information from various sources using “social-engineering databases.” For instance, if two separate platform leaks contain the same phone number, it is highly probable that both records belong to the same individual.

Even if usernames and photo styles differ across platforms, they can still be linked via these databases to compile a comprehensive personal dossier.

This is not fear-mongering; it is a common application of social-engineering databases. The barrier to using such databases for information gathering and doxxing is low—even minors can master them easily.

Raise Cybersecurity Awareness to Safeguard Your Privacy

While the Internet brings people closer, it can also widen the gap between them. Social platforms provide spaces for communication, yet they can also make users feel more isolated.

In the online world, we long to express ourselves and find resonance, but we must also stay vigilant and protect our privacy.

There is no need to reveal every detail of your life to strangers online. Speak cautiously, act prudently, enjoy solitude, and improve yourself—only then can you navigate the digital realm with ease.

Recommendations:

  • Regularly review and update your passwords to ensure they are strong.
  • Avoid reusing the same username and password across different platforms.
  • Be careful when sharing photos or posts that contain personal information.
  • Use tools like NullPrivate to protect your DNS queries and prevent DNS leaks.
  • Stay informed about the latest cybersecurity trends to understand emerging threats and countermeasures.

6.2 - Guide to Protecting Personal Online Privacy

Introduces how to safeguard personal privacy during everyday online activities, reduce your digital footprint, avoid personalized ad tracking, and prevent the leakage of private information.

Why Protect Online Privacy?

In the digital age, every online action we take can leave traces:

  • Browsing history is tracked
  • Personal preferences are analyzed
  • Location data is collected
  • Social relationships are mapped

Basic Protective Measures

1. Browser Configuration

  • Use private/incognito mode
  • Disable third-party cookies
  • Enable “Do Not Track”
  • Regularly clear browsing data

2. Search Engine Choices

  • Use anonymous search engines (e.g., DuckDuckGo)
  • Avoid searching sensitive content while logged in
  • Cross-verify with multiple search engines

3. DNS Encryption Protection

  • Enable DNS-over-HTTPS
  • Use private DNS services
  • Avoid default DNS servers

Advanced Protection Strategies

1. Network Access Protection

  • Use trusted services
  • Enable HTTPS-Only mode
  • Avoid public Wi-Fi

2. Ad-Tracking Protection

  • Install ad blockers
  • Use content filters
  • Turn off personalized ad options

3. Social Media Privacy

  • Review privacy settings
  • Limit sharing of personal information
  • Disable location services
  • Be cautious with third-party logins

Daily Usage Recommendations

Reduce Your Digital Footprint

  • Use temporary email services
  • Avoid registering with real names
  • Use different passwords on different platforms
  • Regularly check authorized applications

Prevent Privacy Leaks

  • Use a password manager
  • Enable two-factor authentication
  • Encrypt important files
  • Be careful when installing new apps

Points to Note

  • Use privacy-protection tools appropriately
  • Comply with local laws and regulations
  • Keep software updated promptly
  • Cultivate privacy-protection awareness

Complete anonymity is hard to achieve, but the measures above can significantly raise your level of personal privacy protection. Choose the protections that suit you and strike a balance between convenience and security.

6.3 - Youth Cyber Protection Guide

Through intelligent management and security protection, create a healthy online environment for teenagers and help them establish good internet habits.

Challenges in Contemporary Youth’s Online Environment

In the digital age, teenagers face unprecedented cyber challenges:

  • Massive information with mixed quality
  • Limited ability to identify online risks
  • Susceptibility to inappropriate content
  • Lack of self-management awareness

Intelligent Protection Solutions

1. Application Access Management

Restrict App Access

Features:

  • Precise control over accessible applications
  • Prevent installation of inappropriate software
  • Protect personal information security

2. Time Management System

Restrict Access Time

Functions:

  • Set reasonable usage periods
  • Prevent internet addiction
  • Cultivate healthy daily routines

3. Behavior Monitoring & Guidance

Access Record Analysis

Access Records

Uses:

  • Understand online behavior patterns
  • Identify potential risks promptly
  • Provide targeted guidance and communication

Smart Blocking Settings

Add Blocking Rules

Customizable:

  • Content rating filters
  • Personalized protection rules
  • Dynamic policy adjustments

Parental Guidance Recommendations

Beyond protective measures, quality family education is more crucial:

  • Maintain open dialogues about internet usage
  • Cultivate independent thinking and judgment
  • Establish trusting communication mechanisms
  • Gradually relax controls as appropriate

Technical measures are supplementary tools, while education and guidance remain fundamental. Apply management tools reasonably while focusing on developing youth’s digital literacy and self-management capabilities.

6.4 - Protecting the Elderly from Online Scams

A cybersecurity guide for the elderly population, effectively preventing online scams through private service setup and AdGuard protection.

Online Risks Faced by the Elderly

In today’s society, the elderly face increasingly severe cybersecurity threats. The following characteristics make them high-risk targets for online scams:

  • Insufficient familiarity with smartphone operations
  • Lack of awareness and preventive measures against online scams
  • Limited exposure to cybersecurity-related information
  • Tendency to trust unverified software download links

Technical Protection Solutions

AdGuard Security Protection

AdGuard provides professional malware blocking functionality:

Blocking Malicious Software

This solution offers the following advantages:

  • Cloud-based operation, no need for additional app installation
  • Zero system resource consumption
  • Simple configuration and resistant to accidental misoperation
  • Automatic continuous protection

Practical Results

After one year of implementation, we observed significant improvements:

  • Drastic reduction in “phone cleanup” assistance requests
  • Enhanced daily user experience
  • Decreased mobile device usage difficulties

Comprehensive Protection Strategy

While technical measures are important, comprehensive protection also requires:

  • Regular companionship and communication to understand usage difficulties
  • Patient explanation of basic cybersecurity knowledge
  • Maintaining vigilance to promptly identify potential threats

Technology is a tool, but care is fundamental. Regular companionship and patient guidance remain the best ways to protect the elderly from online risks.

6.5 - How to Deal with Enterprise Network Monitoring

As technology evolves, enterprise network monitoring has shifted from traditional physical surveillance to digital monitoring. This article explores common modern enterprise network monitoring methods and provides legal privacy-protection advice.

Evolution of Enterprise Network Monitoring

Modern enterprises have transitioned from traditional physical monitoring (such as cameras and on-site patrols) to more sophisticated digital surveillance systems. This shift makes monitoring more covert and cost-effective.

Common Network Monitoring Methods

A core method of enterprise network monitoring is tracking via DNS servers. The specific implementations include:

  1. Deploying dedicated DNS servers within the corporate network
  2. Enforcing corporate DNS through DHCP services
  3. Establishing a mapping between IP addresses and workstation locations

Technical Principles of Monitoring

Even with widespread HTTPS adoption, DNS queries are still transmitted in plaintext. This means:

  • All domain-resolution requests are logged
  • While the specific content accessed cannot be seen, the visited domain names are known
  • Combined with timestamps, this allows analysis of employees’ browsing behavior patterns

Personal Privacy-Protection Solutions

To reasonably protect personal privacy, consider the following options:

  • Use your personal mobile network
  • Configure a private DNS service
  • Employ a secure VPN service

Please note: When implementing any privacy-protection measures, comply with relevant laws, regulations, and corporate policies.

7 - Privacy Policy

“NullPrivate” Privacy Policy
  • NullPrivate does not collect any information from users.
  • NullPrivate will not share any information about users with third parties.
  • NullPrivate provides services using randomly generated usernames and passwords; only the payment order number is linked to the username, and the payment order number does not involve personal information.
  • When initiating inquiries via WeChat or email, NullPrivate will learn contact details such as WeChat ID or email address.
  • Contact details are used solely for service inquiries; NullPrivate will not proactively send any promotional information to the obtained contact details.
  • NullPrivate uses tools like Google Analytics for official website traffic statistics, but does not collect any personal information.
  • When diagnosing user issues, NullPrivate will review the runtime logs of the user service, but does not collect any personal information.

8 - Terms of Service

NullPrivate Service Usage Terms

I. Service Content

  1. NullPrivate provides DNS-based ad blocking and privacy-protection SaaS services.
  2. Services are divided into Trial (time-limited / quota-limited) and Paid versions; see product documentation for functional differences.
  3. We reserve the right to adjust service features as technology evolves.

II. Account and Registration

  1. No real-name information is required for the Trial version; use random credentials to experience the service.
  2. Paid versions must complete order verification via the payment platform.
  3. Transferring or sharing account credentials is prohibited.

III. Payment and Refunds

  1. The Trial version is a time-limited offer, and prices may change at any time.
  2. Paid versions use a prepaid model. No refunds are currently provided.
  3. If service interruption exceeds 24 hours due to force majeure, you may apply for service-time compensation.

IV. Privacy Protection

  1. We follow the data-processing principles described in the Privacy Policy.
  2. Service logs are retained for no more than 30 days and are used only for troubleshooting.
  3. All configuration data is transmitted via TLS encryption.

V. User Responsibilities

  1. You must not use the service for any illegal activities.
  2. Reverse engineering or cracking service protocols is prohibited.
  3. Report any security vulnerabilities to us.

VI. Disclaimer

  1. We do not guarantee completely uninterrupted or error-free service.
  2. We will not be liable for service issues arising from:
    • User equipment or network failure
    • Force majeure (natural disasters, policy changes, etc.)
    • Third-party service (payment platforms, DNS providers, etc.) failure

VII. Amendments

  1. Significant changes will be announced on the official website at least 30 days in advance.
  2. Continued use of the service constitutes acceptance of the revised terms.

Last Updated: 29 November 2024
Effective Date: 1 December 2024

(Contact us at service1@nullprivate.com if you have any questions.)

9 - Basic Tutorial

Understand networking fundamentals through vivid metaphors

📚 Reading Guide

To make networking knowledge easier to grasp, this tutorial uses plenty of everyday metaphors and analogies. Our goal is for everyone to master networking basics effortlessly, regardless of technical background. While these metaphors may not be perfectly rigorous, they will help you quickly build a foundational understanding of networking concepts.

Introduction to Networking Basics

In this tutorial, we’ll explain networking fundamentals through vivid metaphors and analogies. Our goal is for everyone to master these concepts effortlessly, regardless of technical background. While these metaphors may not be perfectly rigorous, they will help you quickly build a foundational understanding of networking concepts.

Unlike precise technical terms, this section uses plain language so non-technical readers can understand the basics of networking.

We’ll employ many fitting—or sometimes unfitting—metaphors and analogies, aiming to let readers grasp networking concepts quickly.

9.1 - What is DNS

DNS (Domain Name System) is one of the fundamental infrastructures of the internet. This article introduces the basic concepts and working principles of DNS.

Essentially, the DNS service is like a Xinhua Dictionary. By querying this dictionary, we can find the IP address corresponding to a domain name.

Introduction to DNS

DNS (Domain Name System) is one of the fundamental infrastructures of the internet. Like a Xinhua Dictionary, it is responsible for translating human-readable domain names into computer-understandable IP addresses.

DNS Resolution Principle

How DNS Works

When you enter a website address in your browser:

  1. The browser first checks local cache
  2. If not found, it queries a DNS server
  3. The DNS server returns the corresponding IP address
  4. The browser uses this IP address to access the target website

Key Concepts

  • Domain Name: A human-readable website address, such as www.nullprivate.com
  • URL (Uniform Resource Locator): A complete web address containing protocol, domain name, and path, such as https://www.nullprivate.com
  • IP Address: A numeric identifier for network devices, such as 1.1.1.1
  • DNS Server: Computers that provide domain name resolution services
  • Web Hosting: Storing website files on servers to make them accessible via the internet

9.2 - NullPrivate Fundamentals

NullPrivate effectively blocks ads, trackers, and malicious websites through DNS-level interception

Overview of How It Works

NullPrivate protects your network security and privacy through DNS-level interception. It acts like an intelligent gatekeeper, screening all domain requests:

  • ✅ Safe websites: Normal access
  • ❌ Ad domains: Blocked
  • ❌ Trackers: Blocked
  • ❌ Malicious websites: Blocked

Interception Flow Diagram

NullPrivate Interception Fundamentals

Key Features

  1. DNS-Level Blocking: Intercepts before requests occur, more efficient
  2. No Plugin Installation Required: Network-level protection effective for all devices
  3. Low Resource Consumption: Only processes DNS requests, minimal impact on device performance
  4. Full Device Coverage: Configure once, protect all connected devices

9.3 - How DNS Affects Your Internet Experience

DNS is the entry point for almost all network requests. Resolving a domain name typically takes only tens of milliseconds, but these milliseconds determine which server subsequent connections will point to, whether CDN nodes are hit nearby, and whether they will be hijacked by ISPs or observed by certain intermediate nodes. This article targets ordinary netizens, using continuous narrative to explain the relationship between DNS and internet experience.

How DNS Affects Your Internet Experience

When we open a webpage, stream a video, or click an in-app link, the first hop almost always lands on DNS. It acts like a phonebook for the internet world, translating human-friendly domain names into machine-understandable IP addresses. Many people attribute “slow webpages, inability to open, intermittent issues” to “poor network speed,” but a significant portion of experience fluctuations relate to DNS resolution success rate, latency, cache hit rate, and privacy policies. Understanding how DNS works, its exposure points in the network chain, and available protection strategies can help us break down “slowness and instability” into controllable factors.

Background and Problem Overview

DNS is the entry point for almost all network requests. Resolving a domain name typically takes only tens of milliseconds, but these milliseconds determine which server subsequent connections will point to, whether CDN nodes are hit nearby, and whether they will be hijacked by ISPs or observed by certain intermediate nodes. The experience differences between home, cellular, and public Wi-Fi networks often stem from variations in resolver cache quality, packet loss rates, and policy differences among resolvers. This article targets ordinary netizens, using continuous narrative to explain the relationship between DNS and internet experience, focusing on principles and trade-offs rather than specific deployment steps or evaluation conclusions.

Basics and Terminology

After a browser or application initiates a resolution request, it typically first queries the system’s local resolver, which then recursively queries root, TLD, and authoritative servers layer by layer, ultimately obtaining an answer with TTL. If local or network-side cache hits, external queries can be skipped, significantly reducing latency; if cache misses or expires, the full recursive process must be completed. The following diagram uses a simplified flow to show the resolution path, with animations emphasizing data flow rather than actual timing sequence.

flowchart TB
  C[Client] e1@--> L[Local Resolver]
  L e2@--> R[Recursive Resolver]
  R e3@--> Root[Root Server]
  Root e3r@--> R
  R e4@--> TLD[TLD Server]
  TLD e4r@--> R
  R e5@--> Auth[Authoritative Server]
  Auth e5r@--> R
  R e6@--> L
  L e7@--> C

  %% Fill color settings
  style C fill:#e1f5fe,stroke:#01579b,stroke-width:2px
  style L fill:#e8f5e8,stroke:#1b5e20,stroke-width:2px
  style R fill:#fff3e0,stroke:#e65100,stroke-width:2px
  style Root fill:#f3e5f5,stroke:#4a148c,stroke-width:2px
  style TLD fill:#fce4ec,stroke:#880e4f,stroke-width:2px
  style Auth fill:#e0f2f1,stroke:#004d40,stroke-width:2px

  %% Animation rhythm settings (Mermaid v11)
  e1@{ animation: fast }
  e2@{ animation: slow }
  e3@{ animation: slow }
  e3r@{ animation: slow }
  e4@{ animation: slow }
  e4r@{ animation: slow }
  e5@{ animation: fast }
  e5r@{ animation: fast }
  e6@{ animation: slow }
  e7@{ animation: fast }

TTL is the “shelf life” of each record. Within the TTL validity period, recursive resolvers can directly return cached answers to clients, contributing more to the perception of “speed and stability” than we intuitively estimate. On the other hand, how resolvers handle parallel IPv4 and IPv6 requests, whether ECS extensions are enabled, and whether negative caching is implemented for failed queries can indirectly affect your connection direction and first-packet time.

Privacy Threats and Motivations

Traditional plaintext DNS exposes metadata about “which domain you want to access” on the network path. This information leaves traces at local networks, access ISPs, and public resolvers, even if content is encrypted via HTTPS. For ordinary users, risks come more from “passive observation and profiling” than direct content leakage: long-term query sequences can infer your interests, lifestyle patterns, and device types. Scenarios like public Wi-Fi, shared hotspots, and international roaming involve more observable points on the path, with more common fluctuations and failures.

flowchart TB
  C[Client] e1@--> Net[Local Network & Router]
  Net e2@--> ISP[Access ISP Network]
  ISP e3@--> Res[Public Recursive Resolver]
  Res e4@--> Auth[Authoritative Server]

  %% Fill color settings
  style C fill:#e1f5fe,stroke:#01579b,stroke-width:2px
  style Net fill:#ffe8e8,stroke:#cc0000,stroke-width:2px
  style ISP fill:#ffe8e8,stroke:#cc0000,stroke-width:2px
  style Res fill:#ffe8e8,stroke:#cc0000,stroke-width:2px
  style Auth fill:#ffe8e8,stroke:#cc0000,stroke-width:2px

  %% Exposure point highlighting
  classDef risk fill:#ffe8e8,stroke:#cc0000,stroke-width:2px,color:#000
  class Net,ISP,Res,Auth risk

  %% Animation
  e1@{ animation: fast }
  e2@{ animation: slow }
  e3@{ animation: slow }
  e4@{ animation: fast }

It’s important to emphasize that privacy protection doesn’t necessarily equate to “faster.” Encryption and encapsulation introduce handshakes and negotiations, but high-quality recursive resolvers may actually be faster through better cache hits and lower packet loss. Real-world experience quality depends on the combined effects of your network, resolver quality, and target site deployment.

Protection Strategies and Principles

Encrypted DNS wraps “which domain you’re asking about” into encrypted tunnels, reducing opportunities for eavesdropping and tampering. Common methods include TLS-based DoT, HTTPS-based DoH, and QUIC-based DoQ. They all reuse mature transport layer security mechanisms, with differences mainly in ports and multiplexing models. Regardless of the method, clients typically still initiate queries to the local resolver stack first, then use encrypted tunnels to send requests to upstream resolvers. The following diagram illustrates this encapsulation and return process.

flowchart LR
  U[Client] e1@--> S[DoH Stack]
  S e2@--> R[DoH Server]
  R e3@-->|200 OK + DNS Response| S
  S e4@--> U

  %% Fill color settings
  style U fill:#e1f5fe,stroke:#01579b,stroke-width:2px
  style S fill:#e8f5e8,stroke:#1b5e20,stroke-width:2px
  style R fill:#fff3e0,stroke:#e65100,stroke-width:2px

  e1@{ animation: fast }
  e2@{ animation: slow }
  e3@{ animation: fast }
  e4@{ animation: fast }

Beyond encryption, resolver-side QNAME minimization reduces query granularity exposed to upstream, DNSSEC provides record integrity verification, and ECS controls CDN proximity and hit rates. For end users, the actual perceptible differences are “whether it’s more stable,” “whether it’s easier to hit nearby nodes,” and “whether there’s less hijacking.”

Implementation Path and Considerations

From a user perspective, systems and routers often have built-in resolvers or forwarders, and many public services offer built-in DoH switches at the mobile OS and browser levels. Choosing a trustworthy recursive resolver and appropriate encryption method usually covers most needs. Note that some enterprise or campus networks may have policy restrictions on encrypted DNS, and certain security products might intercept or redirect DNS traffic; in these environments, prioritize connectivity and compliance before considering privacy and performance. For overseas site access, the resolver’s geographical strategy and CDN deployment layout are equally important—incorrect proximity strategies may route you to transcontinental nodes, resulting in a “half-second lag” perception.

Risks and Migration

Any switch should preserve a rollback path. For personal devices, first enable encrypted DNS on a single device and observe for a week, paying attention to frequently problematic apps and sites. For home gateways, consider grayscale rollout to a few devices, keeping backup resolvers and enabling health checks when necessary. If the network has internal domains or split DNS, confirm compatibility of resolution scope and search domains before switching to avoid resolution failures and accidental leaks.

Scenario-based Recommendations

On cellular networks and public Wi-Fi, prioritizing stable public resolvers with DoH or DoT enabled often provides both more stable and cleaner resolution. For home broadband, cache hits and low packet loss are more important—quality public resolvers or local gateway caching can deliver the “instant open” smoothness. When accessing cross-border content, the resolver’s geographical strategy determines where you’ll be routed. If certain sites are “connectable but very slow,” try changing resolvers or disabling ECS. For families needing parental controls and traffic splitting, choosing resolvers with classification policies and transparent logging is more practical.

FAQ and References

Common questions include “Is encrypted DNS always faster?”, “Why do different resolvers return different IPs?”, and “Will changing resolvers affect security software?” There are no one-size-fits-all answers—they depend on link quality, resolver implementation, and site access policies. Further reading can refer to relevant IETF RFCs, mainstream browser and OS documentation, and trusted network infrastructure blogs.

9.4 - Home Setup

A step-by-step guide to building the NullPrivate network ad-blocking service at home

Setting Up NullPrivate at Home

NullPrivate is an enhanced fork of AdGuard Home, purpose-built for superior network-level ad blocking and privacy protection. This tutorial walks you through installing and configuring NullPrivate on your home network.

Project Overview

NullPrivate is an open-source fork of AdGuard Home that offers both SaaS hosting and a rich set of extra features, all aimed at delivering a better DNS resolution and network-filtering experience.

Key Features

Original Features

  • Network-wide ad blocking: Block ads and trackers across the entire network
  • Custom filtering rules: Add personalized blocklists and allowlists
  • Encrypted DNS support: DNS-over-HTTPS, DNS-over-TLS, and DNSCrypt
  • Built-in DHCP server: Ready-to-use DHCP functionality
  • Per-client settings: Tailor settings for each individual device
  • Parental controls: Block adult content and enforce Safe Search
  • Cross-platform: Runs on Linux, macOS, Windows, and more
  • Privacy-first: No usage analytics or telemetry

NullPrivate Add-ons

  • DNS routing rule lists: Route DNS queries using rule lists in a config file
  • App-level blocking rules: Target specific application sources
  • Dynamic DNS (DDNS): Automatic hostname resolution updates
  • Advanced rate limiting: Efficient traffic management and control
  • Enhanced deployment: Load balancing, automatic certificate renewal, optimized connectivity

Installation Methods

Method 1: Download the Binary

  1. Visit the Releases page and grab the binary for your OS.
  2. Create a working directory:
    mkdir -p ./data
    
  3. Launch NullPrivate:
    ./NullPrivate -c ./AdGuardHome.yaml -w ./data --web-addr 0.0.0.0:34020 --local-frontend --no-check-update --verbose
    

Method 2: Use Docker

Docker is the easiest and most portable way to deploy:

docker run --rm --name NullPrivate \
  -p 34020:80 \
  -v ./data/container/work:/opt/adguardhome/work \
  -v ./data/container/conf:/opt/adguardhome/conf \
  nullprivate/nullprivate:latest

Supported Platforms

  • ✅ Windows
  • ✅ macOS
  • ✅ Linux
  • ✅ Docker
  • ✅ Other Unix-like systems

Configuration Guide

Initial Setup

After launch, open the web UI to finish configuration:

  • Default admin URL: http://localhost:34020
  • Create an admin account on first run
  • Optionally import an existing AdGuard Home config

Configuration Files

The main file is AdGuardHome.yaml, which contains:

  • DNS server settings
  • Filtering rules
  • Client definitions
  • Security options

Command-Line Flags

FlagPurpose
-cPath to the configuration file
-wWorking directory
--web-addrAddress and port for the web UI
--local-frontendUse the embedded web interface
--no-check-updateDisable automatic update checks
--verboseEnable detailed logging

Usage Tips

  1. Network setup: Point your router’s DNS to the NullPrivate IP
  2. Rule updates: Refresh blocklists periodically for best coverage
  3. Performance monitoring: Check DNS query stats in the web UI
  4. Security hardening: Enable HTTPS and use a strong password
  5. Backups: Regularly back up the config file and data directory

Troubleshooting

Common Issues

  • Port conflict: Make sure port 34020 is free
  • Permission errors: Ensure correct file permissions on Linux
  • Startup failure: Verify the config path and working directory exist

Getting Help

Wrap-up

You should now have a working NullPrivate instance at home, giving you a cleaner, more private internet experience. NullPrivate’s rich feature set and flexible configuration options make it easy to tailor the service to your exact needs.

10 - FAQs

Frequently asked questions: purchasing & activation, device configuration, false-blocking handling, privacy & data, security & compliance modules—quickly locate and resolve common issues.

Thank you for choosing NullPrivate! We are always committed to providing you with the best service:

  • Feel free to share your experience and suggestions with us at any time
  • We put privacy protection first
  • No registration required; we do not collect phone numbers or email addresses
  • No marketing interruptions of any kind

Need help?

Contact on WeChat private6688
or Send email service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.

10.1 - How to Purchase and Use

Purchase and Usage Guide: Choose a plan, complete payment, activate dedicated encrypted DNS (DoT/DoH), and quick configuration paths across platforms.

Purchase and Usage

Purchase and Usage Demo

10.2 - iOS Device Reset Settings

This article explains how to reset DNS settings on iOS devices

If you encounter false blocking issues on iOS devices, you can restore original DNS settings through the following two methods.

Option 1: Temporarily Disable DNS Encryption

This method is suitable for temporarily testing whether issues are caused by DNS settings:

  1. Open the Settings app
  2. Go to General > VPN & Device Management
  3. Find the DNS option under Access Restrictions & Proxy
  4. Select Automatic to temporarily restore system default settings

Option 2: Complete Configuration Removal

To completely remove DNS encryption settings:

  1. Open the Settings app
  2. Go to General > VPN & Device Management
  3. Find public.adguardprivate.com DoT under Configuration Profiles
  4. Tap Remove Profile and confirm

If you decide to permanently stop using NullPrivate, it must mean our service has caused you inconvenience. We sincerely apologize for any inconvenience caused.
Our public service uses popular blocking rules. Due to limited resources, we cannot track all cases of under-blocking or over-blocking for every app.
If you wish to customize rules for personalized needs, consider purchasing private service. Our private service offers dedicated solutions at exceptional value to meet various requirements.

Configuration Demo

10.3 - How to Handle False Blocking

This guide explains how to handle false blocking issues, including temporarily disabling protection, adding services to the whitelist, and temporarily suspending services.

Some services are considered necessary by some users but viewed as personal information collection or advertising by others. For example, WeChat and Alipay may contain small programs that mix services with ads, making them unusable. Payment redirects such as parking lots or vending machines may also fail to function properly.

If strict blocking rules are set, these services may be blocked, causing service disruptions.

Temporarily Disable Protection

If you need an urgent, temporary solution, you can resolve the issue by temporarily disabling protection, which typically takes effect within 10 seconds.

Temporarily Disable Protection

Add Service to Whitelist

For services used long-term, you can add them to the whitelist to prevent future blocking. This usually takes effect within 10 seconds.

Add Service to Whitelist

Temporarily Suspend Settings

Public service users can resolve the issue by temporarily suspending the service, which typically takes effect within 60 seconds.

Temporarily Suspend Settings

10.4 - After-Sales Service Guide

Learn about the after-sales support options for “NingPing,” including technical consultation and troubleshooting services.

Service Features

We adopt a no-registration design to protect user privacy:

  • No account registration required
  • No personal information collected
  • Service credentials provided immediately after payment
  • Fully anonymous service experience

Service Content

  1. Technical Support

    • Installation and configuration guidance
    • Troubleshooting assistance
    • Feature usage consultation
  2. Service Assurance

    • 7×24-hour fault response
    • Service availability guarantee
    • Rule update maintenance

Contact Methods

WeChat Support

  • WeChat ID: private6688
  • Service hours: Weekdays 9:00–18:00
  • Response time: Usually within 2 hours

Email Support

  • Email: service1@nullprivate.com
  • Subject line: Please include “AdGuard Service”
  • Response time: Within 1 business day

Service Credentials

After purchase you will receive:

  • Admin dashboard access link
  • Exclusive username and password
  • Configuration guide document

Privacy Protection

We value user privacy:

  • No collection of personal user information
  • No marketing emails or SMS sent
  • Strict adherence to Privacy Policy

10.5 - Mini Program Cannot Be Accessed

This article explains solutions when encountering access issues with mini programs, providing three approaches: temporarily disabling protection, adding services to whitelist, and temporarily deactivating settings.

If your blocking rules are set too strictly, they may intercept some legitimate services, causing operational exceptions.

Temporarily Disable Protection

If you need an urgent, temporary solution, you can resolve it by temporarily disabling protection, which typically takes effect within 10 seconds.

Temporarily Disable Protection

Add Service to Whitelist

For services used long-term, you can add them to the whitelist to prevent future interception, which typically takes effect within 10 seconds.

Add Service to Whitelist

Temporarily Disable Settings

Public service users can resolve issues by temporarily deactivating the service, which typically takes effect within 60 seconds.

Temporarily Disable Settings

10.6 - Slow Access to Some Websites

Analysis and solutions for slow access to certain websites when using NullPrivate DNS, mainly related to ECS (Extended Client Subnet) support

Slow Access to Some Video Sites

If you experience slow access to certain websites while using NullPrivate, it may be due to the following reasons:

ECS Support:

NullPrivate’s free tier does not support ECS (Extended Client Subnet). ECS is a DNS protocol extension that allows DNS servers to provide more accurate responses based on the client’s network location. Many CDNs (Content Delivery Networks) use ECS to direct users to the nearest server, thereby improving speed. The free servers are located in Shanghai and Hangzhou.

Impact:

  • Slower Speeds: Without ECS, NullPrivate may be unable to direct you to the optimal CDN server, resulting in slower speeds.
  • Inaccurate Geolocation: You may be routed to a server far from your actual location, increasing latency.

Solutions:

  • Upgrade to Paid Plan: NullPrivate’s paid plans support ECS, which can resolve this issue and improve speed.
  • Use Another DNS Server: You can try another DNS server that supports ECS.