Browser Configuration
Quickly encrypt your DNS queries within Chrome, Firefox, or Edge.
Note: This only affects the browser, not other apps.
Chrome, Edge, & Brave
DNS-over-HTTPS- 1. Go to **Settings** → **Privacy and security** → **Security**.
- 2. Scroll to "Use Secure DNS" and select **"With Custom Provider"**.
- 3. Enter the URL:
https://dnsdoh.art/dns-query
Mozilla Firefox
DNS-over-HTTPS- 1. Go to **Settings** → **General** → Scroll down to "Network Settings".
- 2. Check **"Enable DNS over HTTPS"**.
- 3. Select **Custom** and enter the URL:
https://dnsdoh.art/dns-query
Safari/macOS Note
Safari uses the operating system's DNS settings. Please use the to download the configuration profile.
Next-Gen Protocols (QUIC & H3)
Experience ultra-low latency and zero head-of-line blocking.
Requires compatible clients like AdGuard or latest browser builds.
AdGuard (Android/iOS)
The easiest way to use DNS-over-QUIC on mobile devices.
- 1. Open **AdGuard** App → **DNS Protection**.
- 2. Tap **DNS Server** → **Add Custom Server**.
- 3. Enter Name:
DNSDOH.ART - 4. Enter Upstream URL (Choose one):
-
Recommended (QUIC):
quic://dnsdoh.artAlternative (HTTP/3):h3://dnsdoh.art/dns-query - 5. Tap **Save & Select**.
Browser HTTP/3
Force Chrome/Edge to use HTTP/3 for DNS queries.
--enable-quic --quic-version=h3-29
- Set Secure DNS provider to:
https://dnsdoh.art/dns-query - Use a command-line flag or shortcut target to launch the browser.
- Verify at http3.is
Router Configuration
Protect your entire home network. We prioritize Encrypted DNS (DoH/DoT) for supported routers.
ASUS / Merlin
DoT Ready- WAN → Internet Connection.
- Scroll to DNS Privacy Protocol.
- Select DNS-over-TLS (Strict).
- Address:
194.180.189.33 - Hostname:
dnsdoh.art
Synology SRM
DoH Ready- Network Center → Local Network → General.
- Advanced Options → Check Enable DoH.
- Click Custom.
- DoH URL:
https://dnsdoh.art/dns-query
FRITZ!Box
DoT Ready- Internet → Account Information → DNS.
- Check "Use DNSv4 over TLS".
- Uncheck "Fallback to unencrypted".
- Resolved Name:
dnsdoh.art
MikroTik (v7+)
DoH CLI/ip dns set use-doh-server="https://dnsdoh.art/dns-query" verify-doh-cert=yes
/ip dns static add name=dnsdoh.art address=194.180.189.33
Standard IPv4 (Older Routers)
Works for: TP-Link (Older), Netgear, D-Link, Linksys. Find "DNS Settings" under Internet or LAN setup.
Android Configuration
Enable "Private DNS" to encrypt all traffic on your device.
Step 1: Find the Setting
Settings → Network & Internet → Private DNS
Settings → Connections → More connection settings → Private DNS
Settings → Connection & sharing → Private DNS
Settings → Connection & sharing → Private DNS
Step 2: Enter Hostname
- Select **Private DNS provider hostname**.
- Enter the following hostname exactly:
-
dnsdoh.art - Tap **Save**. Your connection is now secure.
iOS & macOS Profile (Recommended)
The easiest way to encrypt DNS on iPhone, iPad, and Mac. This installs a system-wide profile using Apple's native secure DNS protocol.
Step 1: Download
Download ProfileStep 2: Install
1. **Settings** → **Profile Downloaded**.
2. Tap **Install** and enter your passcode.
3. The profile is now active.
Alternative: DNSecure App
If you prefer an app to toggle settings or advanced configuration, we recommend DNSecure (Open Source).
Windows 11
Native DoH- 1. Go to **Settings** → **Network & internet** → **Ethernet** (or Wi-Fi).
- 2. Find "DNS server assignment" and click **Edit**.
- 3. Change "Automatic (DHCP)" to **Manual**.
- 4. Turn on **IPv4**.
- 5. Preferred DNS:
194.180.189.33 - 6. **Crucial Step:** Under "DNS encryption", select **Encrypted only (DNS over HTTPS)**.
Windows 10
Option A: Standard (No Encryption)
Uses standard IPv4. Good for ad-blocking, but your ISP can see your requests.
- Control Panel → Network and Sharing Center.
- Change adapter settings → Right click Adapter → Properties.
- Select **Internet Protocol Version 4 (TCP/IPv4)**.
- Use DNS:
194.180.189.33
Option B: Encrypted (DoH)
Windows 10 requires third-party tools for DNS-over-HTTPS.
Linux (systemd-resolved)
For headless servers and terminal-first distributions (Ubuntu Server, Debian).
# Edit /etc/systemd/resolved.conf
[Resolve]
DNS=194.180.189.33
DNSOverTLS=yes
Restart service: sudo systemctl restart systemd-resolved