Secure DNS Connection Settings

Connect to our high-speed, no-logs encrypted DNS network. Use the connection details below for advanced setup, or select your device for a step-by-step configuration guide.

Standard
DNS-over-HTTPS
https://dnsdoh.art/dns-query
Turbo
DNS-over-HTTP/3
h3://dnsdoh.art/dns-query
TLS 1.3
DNS-over-TLS
dnsdoh.art
QUIC
DNS-over-QUIC
quic://dnsdoh.art
Legacy
Standard IPv4
194.180.189.33

Browser Configuration

Quickly encrypt your DNS queries within Chrome, Firefox, or Edge.
Note: This only affects the browser, not other apps.

Chrome, Edge, & Brave

DNS-over-HTTPS
  1. 1. Go to **Settings** → **Privacy and security** → **Security**.
  2. 2. Scroll to "Use Secure DNS" and select **"With Custom Provider"**.
  3. 3. Enter the URL: https://dnsdoh.art/dns-query

Mozilla Firefox

DNS-over-HTTPS
  1. 1. Go to **Settings** → **General** → Scroll down to "Network Settings".
  2. 2. Check **"Enable DNS over HTTPS"**.
  3. 3. Select **Custom** and enter the URL: https://dnsdoh.art/dns-query

Safari/macOS Note

Safari uses the operating system's DNS settings. Please use the to download the configuration profile.

Next-Gen Protocols (QUIC & H3)

Experience ultra-low latency and zero head-of-line blocking.
Requires compatible clients like AdGuard or latest browser builds.

AdGuard (Android/iOS)

The easiest way to use DNS-over-QUIC on mobile devices.

  1. 1. Open **AdGuard** App → **DNS Protection**.
  2. 2. Tap **DNS Server** → **Add Custom Server**.
  3. 3. Enter Name: DNSDOH.ART
  4. 4. Enter Upstream URL (Choose one):
  5. Recommended (QUIC): quic://dnsdoh.art
    Alternative (HTTP/3): h3://dnsdoh.art/dns-query
  6. 5. Tap **Save & Select**.

Browser HTTP/3

Force Chrome/Edge to use HTTP/3 for DNS queries.

Target Flag --enable-quic --quic-version=h3-29
  1. Set Secure DNS provider to: https://dnsdoh.art/dns-query
  2. Use a command-line flag or shortcut target to launch the browser.
  3. Verify at http3.is
Most modern browsers will automatically upgrade to H3 if the server advertises it via the 'Alt-Svc' header (which we do).

Router Configuration

Protect your entire home network. We prioritize Encrypted DNS (DoH/DoT) for supported routers.

ASUS / Merlin

DoT Ready
  1. WAN → Internet Connection.
  2. Scroll to DNS Privacy Protocol.
  3. Select DNS-over-TLS (Strict).
  4. Address: 194.180.189.33
  5. Hostname: dnsdoh.art

Synology SRM

DoH Ready
  1. Network Center → Local Network → General.
  2. Advanced Options → Check Enable DoH.
  3. Click Custom.
  4. DoH URL: https://dnsdoh.art/dns-query

FRITZ!Box

DoT Ready
  1. Internet → Account Information → DNS.
  2. Check "Use DNSv4 over TLS".
  3. Uncheck "Fallback to unencrypted".
  4. Resolved Name: dnsdoh.art

MikroTik (v7+)

DoH CLI
/ip dns set use-doh-server="https://dnsdoh.art/dns-query" verify-doh-cert=yes /ip dns static add name=dnsdoh.art address=194.180.189.33

Standard IPv4 (Older Routers)

Primary DNS
194.180.189.33
Secondary DNS
Leave Empty / 0.0.0.0

Works for: TP-Link (Older), Netgear, D-Link, Linksys. Find "DNS Settings" under Internet or LAN setup.

Android Configuration

Enable "Private DNS" to encrypt all traffic on your device.

Step 1: Find the Setting

Stock Android / Pixel Settings → Network & Internet → Private DNS
Samsung (OneUI) Settings → Connections → More connection settings → Private DNS
Xiaomi (MIUI/HyperOS) Settings → Connection & sharing → Private DNS
Oppo / Realme Settings → Connection & sharing → Private DNS

Step 2: Enter Hostname

  1. Select **Private DNS provider hostname**.
  2. Enter the following hostname exactly:
  3. dnsdoh.art
  4. Tap **Save**. Your connection is now secure.

iOS & macOS Profile (Recommended)

The easiest way to encrypt DNS on iPhone, iPad, and Mac. This installs a system-wide profile using Apple's native secure DNS protocol.

Step 1: Download

Download Profile

Step 2: Install

1. **Settings** → **Profile Downloaded**.
2. Tap **Install** and enter your passcode.
3. The profile is now active.

Alternative: DNSecure App

If you prefer an app to toggle settings or advanced configuration, we recommend DNSecure (Open Source).

Windows 11

Native DoH
  1. 1. Go to **Settings** → **Network & internet** → **Ethernet** (or Wi-Fi).
  2. 2. Find "DNS server assignment" and click **Edit**.
  3. 3. Change "Automatic (DHCP)" to **Manual**.
  4. 4. Turn on **IPv4**.
  5. 5. Preferred DNS: 194.180.189.33
  6. 6. **Crucial Step:** Under "DNS encryption", select **Encrypted only (DNS over HTTPS)**.

Windows 10

Option A: Standard (No Encryption)

Uses standard IPv4. Good for ad-blocking, but your ISP can see your requests.

  1. Control Panel → Network and Sharing Center.
  2. Change adapter settings → Right click Adapter → Properties.
  3. Select **Internet Protocol Version 4 (TCP/IPv4)**.
  4. Use DNS: 194.180.189.33

Option B: Encrypted (DoH)

Windows 10 requires third-party tools for DNS-over-HTTPS.

Download YogaDNS Free client for DoH/DoT on Windows

Linux (systemd-resolved)

For headless servers and terminal-first distributions (Ubuntu Server, Debian).

# Edit /etc/systemd/resolved.conf
[Resolve]
DNS=194.180.189.33
DNSOverTLS=yes

Restart service: sudo systemctl restart systemd-resolved