Private, encrypted, and secure DNS
Yet another ad/tracker/malware-blocking, no-log, and free public DNS with over one million malicious domains blocked.
DNS over TLS (DoT)
Port 853/tcp
Usage
tls://dns.repinger.my.id / dns.repinger.my.id
IPv4 stamp
sdns://AwMAAAAAAAAADzEwMy4yMTUuMjI5LjE0NiBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxZkbnMucmVwaW5nZXIubXkuaWQ6ODUz
IPv6 stamp
sdns://AwMAAAAAAAAAJVsyMDAxOjkyMDoxMDAxOjExMTE6YTUzZjo1NmEzOjhmZDE6MV0galBisNF41VbxY7E7Gw8ZQ10CWIKRzHVYnf7m6xHI1cMSZG5zLnJlcGluZ2VyLm15Lmlk
DNS over HTTPS/{2,3} (DoH)
Port 443/{tcp,udp}
Usage
https://dns.repinger.my.id/dns-query
IPv4 stamp
sdns://AgMAAAAAAAAADzEwMy4yMTUuMjI5LjE0NiBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxZkbnMucmVwaW5nZXIubXkuaWQ6NDQzCi9kbnMtcXVlcnk
IPv6 stamp
sdns://AgMAAAAAAAAAJVsyMDAxOjkyMDoxMDAxOjExMTE6YTUzZjo1NmEzOjhmZDE6MV0galBisNF41VbxY7E7Gw8ZQ10CWIKRzHVYnf7m6xHI1cMSZG5zLnJlcGluZ2VyLm15LmlkCi9kbnMtcXVlcnk
DNS over QUIC (DoQ)
Port 853/udp
Usage
quic://dns.repinger.my.id
IPv4 stamp
sdns://BAMAAAAAAAAADzEwMy4yMTUuMjI5LjE0NiBqUGKw0XjVVvFjsTsbDxlDXQJYgpHMdVid_ubrEcjVwxZkbnMucmVwaW5nZXIubXkuaWQ6ODUz
IPv6 stamp
sdns://BAMAAAAAAAAAJVsyMDAxOjkyMDoxMDAxOjExMTE6YTUzZjo1NmEzOjhmZDE6MV0galBisNF41VbxY7E7Gw8ZQ10CWIKRzHVYnf7m6xHI1cMSZG5zLnJlcGluZ2VyLm15Lmlk
Why no plain DNS?
Mainly due to transparent DNS proxies; a simple trick that will workaround the issue is to change the serving-port other than 53/{tcp,udp}.
Even with the aforementioned workaround, incoming and outcoming DNS queries are still unencrypted and anyone with the ability can snoop right in effortlessly. Sending unencrypted queries to a third-party DNS service defeats the whole purpose of secure DNS.