Private, encrypted, and secure DNS
Yet another ad/tracker/malware-blocking, no-log, and free public DNS with over one million malicious domains blocked.
DNS over TLS (DoT)
Port 853/tcp
Usage
tls://dns.repinger.com / dns.repinger.com
IPv4 stamp
sdns://AwMAAAAAAAAADjEwMy4xNTcuMjYuMTExIGpQYrDReNVW8WOxOxsPGUNdAliCkcx1WJ3-5usRyNXDFGRucy5yZXBpbmdlci5jb206ODUz
IPv6 stamp
sdns://AwMAAAAAAAAAIVsyMDAxOjQ3MDozNjozZmM6MDpmZWVkOmRhZDpiMDU1XSBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxRkbnMucmVwaW5nZXIuY29tOjg1Mw
DNS over HTTPS/{2,3} (DoH)
Port 443/{tcp,udp}
Usage
https://dns.repinger.com/dns-query
IPv4 stamp
sdns://AgMAAAAAAAAADjEwMy4xNTcuMjYuMTExIGpQYrDReNVW8WOxOxsPGUNdAliCkcx1WJ3-5usRyNXDFGRucy5yZXBpbmdlci5jb206NDQzCi9kbnMtcXVlcnk
IPv6 stamp
sdns://AgMAAAAAAAAAIVsyMDAxOjQ3MDozNjozZmM6MDpmZWVkOmRhZDpiMDU1XSBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxBkbnMucmVwaW5nZXIuY29tCi9kbnMtcXVlcnk
DNS over QUIC (DoQ)
Port 853/udp
Usage
quic://dns.repinger.com
IPv4 stamp
sdns://BAMAAAAAAAAADjEwMy4xNTcuMjYuMTExIGpQYrDReNVW8WOxOxsPGUNdAliCkcx1WJ3-5usRyNXDFGRucy5yZXBpbmdlci5jb206ODUz
IPv6 stamp
sdns://BAMAAAAAAAAAIVsyMDAxOjQ3MDozNjozZmM6MDpmZWVkOmRhZDpiMDU1XSBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxBkbnMucmVwaW5nZXIuY29t
Why no plain DNS?
Mainly due to transparent DNS proxies; a simple trick that will workaround the issue is to change the serving-port other than 53/{tcp,udp}.
Even with the aforementioned workaround, incoming and outcoming DNS queries are still unencrypted and anyone with the ability can see what you’re up to effortlessly. Sending unencrypted queries to a third-party DNS service defeats the whole purpose of secure DNS.