We provide free public services and have curated a set of widely-used domain lists.
Public Service Rules
The public service employs balanced ad-blocking rules; false positives or misses may occur. The rule lists are:
- AdGuard DNS filter
- AdGuard DNS Popup Hosts filter
- CHN: AdRules DNS List
- CHN: anti-AD
- AWAvenue Ads Rule
- WindowsSpyBlocker
- anti-AD
- easylist
- OISD Blocklist Small
Some users configure extra protection for elderly family members, so we also include security-blocking rules:
Additionally, the public service includes the following rules to block stubborn ads on certain phones that cannot be removed by conventional means:
# huawei search && browser
hisearch-drcn.dt.dbankcloud.com
uc-drcn.hispace.dbankcloud.cn
connect-drcn.hispace.hicloud.com
adx-drcn.op.dbankcloud.cn
hisearch-static-drcn.dbankcdn.com
||configserver.hicloud.com
||configserver.platform.hicloud.com
||configdownload.dbankcdn.cn
||browsercfg-drcn.cloud.dbankcloud.cn
Usage Notes
Because the public service is intended for the general population, it cannot accommodate personalized needs. Some users complain that ad-blocking is insufficient, while others report that false positives prevent game logins. We apologize that the public service cannot satisfy everyone; content that some view as ads may be useful information to others. In such cases, we tend to prioritize users who consider it useful.
When a false positive prevents WeChat or Alipay mini-programs from loading, simply disable the phone’s encrypted DNS setting temporarily to access the required service. However, based on our operational experience, many users do not know what to do when a service fails to work properly, so we must consider non-technical users’ experience.
Users familiar with DNS who encounter false positives or insufficient blocking should consider purchasing a private service.
Private services offer access logs, blocking logs, statistics, custom rules, authoritative resolution, and more to meet individual needs.
For other common requests,
Need help?
Contact on WeChat
private6688
or
Send email
service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.
Setup Instructions by Platform
Android
Android has natively supported DNS over TLS (DoT
) since Android 9; phones released after 2019 are compatible. Enable it as follows:
- Open
Settings
- Go to
More connections
- Open
Private DNS
- Choose
Private DNS provider hostname
and enter:public.adguardprivate.com
Self-hosted DNS can be implemented in many ways (e.g., AdGuard, dnsmasq, clash), but only native DoT has zero impact on phone performance. It requires no third-party apps, no permissions, no resources, and does not affect battery life. Therefore, native DoT
encrypted DNS is recommended.
iPhone
iOS 14 and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:
- Open Safari, download the profile: dot.mobileconfig
- Open Settings
- Go to General
- Open VPN & Device Management
- Select Install Profile
macOS
macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:
- Open Safari, download the profile: dot.mobileconfig
- Open System Preferences
- Go to Network
- Select VPN & Device Management
- Choose Install Profile