Android
A detailed guide on configuring DNS encryption on Android phones from various brands
We provide free public services and have curated a set of widely-used domain lists.
The public service employs balanced ad-blocking rules; false positives or misses may occur. The rule lists are:
Some users configure extra protection for elderly family members, so we also include security-blocking rules:
Additionally, the public service includes the following rules to block stubborn ads on certain phones that cannot be removed by conventional means:
# huawei search && browser
hisearch-drcn.dt.dbankcloud.com
uc-drcn.hispace.dbankcloud.cn
connect-drcn.hispace.hicloud.com
adx-drcn.op.dbankcloud.cn
hisearch-static-drcn.dbankcdn.com
||configserver.hicloud.com
||configserver.platform.hicloud.com
||configdownload.dbankcdn.cn
||browsercfg-drcn.cloud.dbankcloud.cn
Because the public service is intended for the general population, it cannot accommodate personalized needs. Some users complain that ad-blocking is insufficient, while others report that false positives prevent game logins. We apologize that the public service cannot satisfy everyone; content that some view as ads may be useful information to others. In such cases, we tend to prioritize users who consider it useful.
When a false positive prevents WeChat or Alipay mini-programs from loading, simply disable the phone’s encrypted DNS setting temporarily to access the required service. However, based on our operational experience, many users do not know what to do when a service fails to work properly, so we must consider non-technical users’ experience.
Users familiar with DNS who encounter false positives or insufficient blocking should consider purchasing a private service.
Private services offer access logs, blocking logs, statistics, custom rules, authoritative resolution, and more to meet individual needs.
For other common requests,
Contact on WeChat
private6688
or
Send email
service1@nullprivate.com
Please describe your issue in detail, and we will respond as soon as possible.
Android has natively supported DNS over TLS (DoT
) since Android 9; phones released after 2019 are compatible. Enable it as follows:
Settings
More connections
Private DNS
Private DNS provider hostname
and enter: public.adguardprivate.com
Self-hosted DNS can be implemented in many ways (e.g., AdGuard, dnsmasq, clash), but only native DoT has zero impact on phone performance. It requires no third-party apps, no permissions, no resources, and does not affect battery life. Therefore, native DoT
encrypted DNS is recommended.
iOS 14 and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows:
macOS Big Sur and later natively support DNS over HTTPS (DoH) and DNS over TLS (DoT). Enable it as follows: