DNSBUNKER.org

DNSBUNKER is a hardened, privacy-first DNS resolver located in Germany. Designed to block ads, malware, and surveillance - with zero logs, zero compromise.

Encrypted Protocols

DoH & DoH3: https://dnsbunker.org/dns-query
DoT & QUIC: dnsbunker.org
DoH Stamp: sdns://AgMAAAAAAAAADTQ1LjEzNi4zMC4xMzQADWRuc2J1bmtlci5vcmcKL2Rucy1xdWVyeQ
DoT Stamp: sdns://AwMAAAAAAAAADTQ1LjEzNi4zMC4xMzQADWRuc2J1bmtlci5vcmc
DoQ Stamp: sdns://BAMAAAAAAAAADTQ1LjEzNi4zMC4xMzQADWRuc2J1bmtlci5vcmc

How to Use on Your Device

Android (9+):
Go to Settings > Network & Internet > Advanced > Private DNS
Set the hostname to: dnsbunker.org

Uses DNS over TLS (DoT)
Windows:
Use a tool like YogaDNS to configure encrypted DNS.
DoH endpoint: https://dnsbunker.org/dns-query

Supports DoH, DoH3, DoT, and DoQ
Linux:
Configure using tools like systemd-resolved, stubby, dnscrypt-proxy
Supports DoH, DoT, and DoQ

Example for systemd-resolved: DNS=152.53.254.199#dnsbunker.org
iOS (14+):
Deploy mobile configuration for iOS/macOS securely:
Deploy Config Profile
Routers (e.g., FritzBox, OpenWRT, pfSense):
Set the upstream DNS resolver:
DoT: dnsbunker.org
DoH: https://dnsbunker.org/dns-query

DNS Leak Protection

Why it matters:
A DNS leak can expose your DNS traffic to your ISP or third parties, even if you're using an encrypted resolver.
How to check:
Use one of these free tools to confirm that all DNS queries are going through DNSBunker:
DNS Nameserver Spoofability Test:
DNSBunker IPs to expect:
152.53.207.191
2a00:11c0:5f:362c::
Tip:
If you see any other IPs in the test results, your device or network might be leaking DNS through fallback resolvers or your ISP.

DNS Evasion Prevention

Be advised:

DNSBunker is actively blocking third-party encrypted DNS (DoH, DoH3, DoT, etc.) in order to prevent fallback from hardcoded DNS settings. This measure is in place to ensure the security and integrity of the DNS resolution process, and to prevent unauthorized or unintended redirection of traffic. Endpoints attempting to bypass DNSBunker’s settings using third-party encrypted DNS services will not be able to establish a connection through fallback methods.

Filter Intelligence

Only following Filters are in use:

Did you encounter breakage? Does something not work? Or did you find something which should be blocked?


Please report any issues to Hagezi's repository!

Click here to report!


Privacy & DNS Behavior

EDNS Client Subnet (ECS): Ignored
QNAME Minimization: Preferred
DNSSEC Validation: Enforced
ANY Requests: Dropped

Security, Filtering & Blocking

Content Filtering: Blocks ads, trackers, and malware only
Blocklist Update Frequency: hourly
Block Response: NXDOMAIN
Block TTL: 30s
DNS Rebinding Protection: Private IP responses blocked
Censorship Policy: Only Lists from Hagezi applied
Limitations: Cannot bypass ISP-level routing or geo-blocks (not a VPN replacement)

Special Domain Handling

Google Pre-caching Domains: Returned as NXDOMAIN
Apple Private Relay Domains: Returned as NXDOMAIN
Mozilla DoH Canary Domain: Returned as NXDOMAIN
Purpose: Prevents DNS leakage and unnecessary third-party lookups

Infrastructure & Compliance

No Logging: GDPR-compliant, no user data retained
Location: Nuremberg, Germany

Thanks to

Hagezi For his helping hand in times of need, and for his DNS blocklists, created with passion and heart!