Private, encrypted, and secure DNS

Yet another ad/tracker/malware-blocking, no-log, and free public DNS with over one million malicious domains blocked.

DNS over TLS (DoT)

Port 853/tcp

Usage

tls://dns.repinger.my.id / dns.repinger.my.id

IPv4 stamp

sdns://AwMAAAAAAAAADzEwMy4yMTUuMjI5LjE0NiBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxZkbnMucmVwaW5nZXIubXkuaWQ6ODUz

IPv6 stamp

sdns://AwMAAAAAAAAAJVsyMDAxOjkyMDoxMDAxOjExMTE6YTUzZjo1NmEzOjhmZDE6MV0galBisNF41VbxY7E7Gw8ZQ10CWIKRzHVYnf7m6xHI1cMSZG5zLnJlcGluZ2VyLm15Lmlk

DNS over HTTPS/{2,3} (DoH)

Port 443/{tcp,udp}

Usage

https://dns.repinger.my.id/dns-query

IPv4 stamp

sdns://AgMAAAAAAAAADzEwMy4yMTUuMjI5LjE0NiBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxZkbnMucmVwaW5nZXIubXkuaWQ6NDQzCi9kbnMtcXVlcnk

IPv6 stamp

sdns://AgMAAAAAAAAAJVsyMDAxOjkyMDoxMDAxOjExMTE6YTUzZjo1NmEzOjhmZDE6MV0galBisNF41VbxY7E7Gw8ZQ10CWIKRzHVYnf7m6xHI1cMSZG5zLnJlcGluZ2VyLm15LmlkCi9kbnMtcXVlcnk

DNS over QUIC (DoQ)

Port 853/udp

Usage

quic://dns.repinger.my.id

IPv4 stamp

sdns://BAMAAAAAAAAADzEwMy4yMTUuMjI5LjE0NiBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxZkbnMucmVwaW5nZXIubXkuaWQ6ODUz

IPv6 stamp

sdns://BAMAAAAAAAAAJVsyMDAxOjkyMDoxMDAxOjExMTE6YTUzZjo1NmEzOjhmZDE6MV0galBisNF41VbxY7E7Gw8ZQ10CWIKRzHVYnf7m6xHI1cMSZG5zLnJlcGluZ2VyLm15Lmlk

Why no plain DNS?

Mainly due to transparent DNS proxies; a simple trick that will workaround the issue is to change the serving-port other than 53/{tcp,udp}.

Even with the aforementioned workaround, incoming and outcoming DNS queries are still unencrypted and anyone with the ability can snoop right in effortlessly. Sending unencrypted queries to a third-party DNS service defeats the whole purpose of secure DNS.