Awesome
Guidelines :bookmark:
- Prevent overblocking by utilizing the law of diminishing returns (e.g., using sane, quality blocklists; allowing most TLDs; etc.).
- Pass the girlfriend test with few exceptions. These deviations are documented throughout the guide.
Create your account
Sign up for NextDNS here and support this page!
Security :police_officer:
Security settings protect your data from harm, theft, and unauthorized use.<sup>^why does this matter?</sup>
Threat Intelligence Feeds <sup><sup>1</sup></sup>
Use Threat Intelligence Feeds
AI-Driven Threat Detection <sup><sup>1</sup></sup>
[!NOTE] NextDNS labels this feature as beta, although most users report it works well.
Enable AI-Driven Threat Detection
Google Safe Browsing <sup><sup> 1 2 3 4 </sup></sup>
[!TIP] Unlike the version embedded in some browsers, this feature does not associate your public IP address to threats and does not allow bypassing the block.
Enable Google Safe Browsing
Cryptojacking Protection <sup><sup>1</sup></sup>
[!CAUTION] Leave this feature enabled if you use something other than the recommended blocklists (see https://github.com/yokoffing/NextDNS-Config/issues/31).
Enable Cryptojacking Protection
DNS Rebinding Protection <sup><sup>1 2</sup></sup>
Enable DNS Rebinding Protection
IDN Homograph Attacks Protection <sup><sup>1 2</sup></sup>
Enable Homograph Attacks Protection
Typosquatting Protection <sup><sup>1</sup></sup>
Enable Typosquatting Protection
Domain Generation Algorithms (DGAs) Protection
Enable DGA Protection
Block Newly Registered Domains (NRDs) <sup><sup>1 </sup></sup>
[!WARNING] Blocking NRDs may cause false positives occasionally. Be selective when adding NRDs to your allowlist; and, if you do, NEVER give sensitive information to a NRD. If you plan to set-and-forget your configuration, disable this setting.
Block Newly Registered Domains (NRDs)
Block Dynamic DNS Hostnames <sup><sup>1 2 </sup></sup>
[!TIP] Dynamic DNS (DDNS) services can still access their own website and update API when you use this setting.
Enable Block Dynamic DNS Hostnames
Block Parked Domains <sup><sup>1</sup></sup>
Block Parked Domains
Block Top-Level Domains (TLDs) <sup><sup>1 2 3 4 5 </sup></sup>
Updated: 18 March 2024 <p>
<details><summary>Click me to view TLDs</summary>[!IMPORTANT] Blocking TLDs risks blocking legitimate sites along with malicious ones, since this feature stops both site navigations and subrequests. However, the entries below should allow for everyday browsing while offering protection against commonly abused TLDs.
.autos
.best
.bid
.bio
.boats
.boston
.boutique
.charity
.christmas
.dance
.fishing
.hair
.haus
.loan
.loans
.men
.mom
.name
.review
.rip
.skin
.support
.tattoo
.tokyo
.voto
</details>
You can find additional entries on Most Abused TLDs, but you may need to allowlist sites on occasion. If you plan to set-and-forget your configuration, skip this step.
Block Child Sexual Abuse Material
Block Child Sexual Abuse Material
Privacy :lock:
Privacy features limit the amount of data companies can collect about you.
Because privacy is a spectrum, what you need varies on your threat model, interest, and skillset.<sup>^why should I care? I have nothing to hide</sup>
Blocklists <sup><sup>1</sup></sup>
Blocklists filter out ads, trackers, and malicious sites. Hundreds of volunteers contribute to these lists in the open-source community, and they are the undercover heroes who make blocking ads at scale possible.
We recommend you remove the NextDNS Ads & Trackers Blocklist and add the minimum number of useful lists.
Which blocklist should I use?
A great question to ask is: "How much do I want to deal with the inconveniences of false positives?"
Here are the suggested blocklists, based on past issues and observations:
Blocklists | Rationale |
---|---|
HaGeZi - <br>Multi NORMAL<sup>1</sup> <p><p>OISD</p> | Block tracker, ad, and badware requests without issues (set-and-forget). |
HaGeZi - <br>Multi PRO<sup>2</sup> <p><p>OISD</p> | Block more requests, usually without issues (recommended). |
HaGeZi - <br>Multi PRO++<sup>3</sup> <p><p>OISD</p> | Block more requests at the risk of site breakage. <br> Report occasional site and app issues. |
[!TIP] Use different blocklists on separate DNS profiles (e.g., NORMAL for your router and PRO++ for your web browser).
[!NOTE] NextDNS does not offer Hagezi's Threat Intelligence Feed (TIF). We suggest using the OISD list, which contains some TIF sources missing from NextDNS security features.
You can also check out Hagezi's own recommendations.
Why Hagezi?
Hagezi block ads, trackers, native device trackers, and badware. He maintains a sensible allowlist, handles false positives quickly, and communicates known issues to blocklists maintainers. Hagezi's primary DNS lists combine multiple sources including respected community blocklists like OISD, Steven Black, 1Hosts, notrack, and more.
You may also wonder why other lists are not utilized. This is because many list maintainers:
- do not remove false positives and/or are no longer active <sup>1 2</sup>
- already aggregate common blocklists into their own list (Easylist/Fanboy, AdGuard, Steven Black, etc.) <sup>1 2 3 4 </sup>
- offer no meaningful additional coverage when compared with the chart combinations above
Native Tracking Protection <sup><sup>1</sup></sup>
Add all the device brands you use.
<details>Windows
Apple
Samsung
Xiaomi
Huawei
Amazon Alexa
Roku
Sonos
</details>
Block Disguised Third-Party Trackers <sup><sup>1 2 3 4 5 </sup></sup>
Block Disguised Third-Party Trackers
Allow Affiliate & Tracking Links <sup><sup>1 2 </sup></sup>
[!TIP] Your IP address will automatically be hidden (via TCP proxying) to preserve your privacy.<p>
[!WARNING] Disabling this setting prevents some email links from opening properly.
Allow Affiliate & Tracking Links
Parental Control :family_man_woman_boy:
YouTube Restricted Mode
Enforce YouTube Restricted Mode
Block Bypass Methods <sup><sup>1</sup></sup>
Block tools that can bypass NextDNS filtering, such as VPNs, proxies, Tor software, and encrypted DNS services.
[!CAUTION] Enabling this setting causes unintended behavior.
Block Bypass Methods
Denylist :no_entry:
Denylist entries are always blocked. These entries may further harden some profiles while not interfering with everyday browsing.
iCloud Private Relay
iCloud Private Relay can override DNS settings on devices, preventing NextDNS from protecting them.
Some DoH providers block this feature automatically.
mask.icloud.com
mask-h2.icloud.com
mask-canary.icloud.com
And possibly:
apple-relay.cloudflare.com
apple-relay.fastly-edge.com
doh.dns.apple.com
doh.dns.apple.com.v.aaplimg.com
mask-api.icloud.com
mask.apple-dns.net
Allowlist :white_check_mark:
Allowlist entries always resolve. These entries may be needed for aggressive DNS profiles to relax their rules.
NextDNS
Allow NextDNS itself in case a filterlist goes haywire and blocks your access.
nextdns.io
<details><summary>Click here to view more entries</summary>
Facebook / Instagram <sup><sup>1</sup></sup>
graph.facebook.com
graph.instagram.com
i.instagram.com
b-graph.facebook.com
If you're still having issues, try these:
connect.facebook.com
connect.facebook.net
graph-fallback.facebook.com
z-m-graph.facebook.com
graph-fallback.instagram.com
Apple device updates <sup><sup>1 2 3
A known tracking domain, but it's needed for device updates.
xp.apple.com
Apple iMessage GIFs <sup><sup>1</sup></sup> / Spotlight Search <sup><sup>2</sup></sup>
smoot.apple.com
Apple Store <sup><sup>1</sup></sup>
amp-api-edge.apps.apple.com
amp-api-search-edge.apps.apple.com
Windows
This request is blocked when using NextDNS' Native Tracking list (Windows)
settings-win.data.microsoft.com
Xbox achievements
v10.events.data.microsoft.com
v20.events.data.microsoft.com
Xiaomi device updates
update.intl.miui.com
Xiaomi USB debugging (Security settings)
srv.sec.intl.miui.com
Google Nest usage metrics <sup><sup>1</sup></sup>
logsink.devices.nest.com
Yahoo Mail <sup><sup>1</sup></sup>
consent.yahoo.com
guce.oath.com
pr.comet.yahoo.com
Spectrum login <sup><sup>1</sup></sup>
pov.spectrum.net
Zoom <sup><sup>1 2</sup></sup>
logfiles.zoom.us
us04logfiles.zoom.us
us04zpns.zoom.us
YouTube history
s.youtube.com
Hulu <sup><sup>1</sup></sup>
ads-fa-darwin.hulustream.com
Epic Games Launcher <sup><sup>1</sup></sup>
eulatracking-public-service-prod06.ol.epicgames.com
NVIDIA Gefore Experience <sup><sup>1</sup></sup>
gfe.nvidia.com
nvgs.nvidia.cn
Chick-Fil-A App <sup><sup>1</sup></sup>
tmetrix.my.chick-fil-a.com
imgur <sup><sup>1 2</sup></sup>
js.media-lab.ai
CBS News livestream <sup><sup>1 2</sup></sup>
doppler-config.cbsivideo.com
production-cmp.isgprivacy.cbsi.com
pubads.g.doubleclick.net
tags.tiqcdn.com
Paramount+
Paramount+ uses certain domains to display ads. These domains must be accessible to allow Paramount+ content to load (even for viewers with ad-free plans).
:warning: However, because many sites use these domains for ads, allowing them could result in more ads being shown on other sites you visit.
imasdk.googleapis.com
pubads.g.doubleclick.net
Users have reported that the following domains also may need to be allowed:
cbsaavideo.com
cbsi.com
conviva.com
convivia.com
demdex.net
dns-clientinfo.cbsivideo.com
partnerad.l.doubleclick.net
saa.cbsi.com
summerhamster.com (yes, really)
udm.scorecardresearch.com
FiveThirtyEight videos / National Geographic website <sup><sup>1</sup></sup>
dcf.espn.com
Men's Health videos <sup><sup>1</sup></sup>
glimmer.hearstapps.com
</details>
Settings :gear:
Logs
Storage location → Switzerland
Block Page
[!CAUTION] Enabling this setting may cause site navigation issues if the NextDNS Root CA is not on your devices. Also, this setting breaks Paypal 2FA, iCloud Private Relay, Microsoft Teams, Yahoo! Mail, the NAVER app, Hoyolab app, and possibly banking apps.
Enable Block Page
Anonymized EDNS Client Subnet <sup><sup>1 </sup></sup>
Enable Anonymized EDNS Client Subnet
Cache Boost <sup><sup>1</sup></sup>
Enable Cache Boost
CNAME Flattening <sup><sup>1 2 3 </sup></sup>
[!WARNING] Enabling this feature may break compatibility with Yahoo! Mail and cause issues with certain blocklists.
Enable CNAME Flattening
Web3 <sup><sup> 1 2</sup></sup>
Enable Web3 → (optional)
FAQ :question:
How do I signup for NextDNS?
Click here to get started.
Why am I still seeing ads?
Not all ads can be blocked at the DNS level.<sup>1 2</sup> You will need an ad blocker to block what's leftover.
This is because not all ads come from third-party domains; some ads come directly from the site you're visiting, like YouTube. DNS blockers stop the resolution of a domain, and content blockers filter page content. Click here to easily install a lightweight ad blocker.
I need a browser with ad blocking. Which one should I choose?
Choosing a browser is about as intimate as choosing a starter Pokémon, so here's a few caveats:
- The best browser on paper may not work well in real world usage.
- Browsers are tools! Use a variety of browsers depending on what you need to do.
- You should use various browsers (or browser profiles) for different areas of life (e.g., work, school, personal).
We based the recommendations below on a combination of effectiveness, resource efficiency, features, and ease of use.
OS | Browser | Content Blocker |
---|---|---|
iOS | Safari | AdGuard |
Android | Brave | Built-in blocker |
Windows <br> macOS <br> Linux | Firefox (with Betterfox) <p><p> Brave | uBlock Origin <p><p> Built-in blocker or uBlock Origin |
At the end of the day, if you're using NextDNS + any browser with an ad blocker, you have more coverage than most people.
Should I pay for NextDNS?
For the rich features it provides, NextDNS is very affordable at $19.90/year for unlimited devices. NextDNS pays for itself if it saves my family from a malicious incident.
Does the amount of features enabled affect the speed of NextDNS?<sup>1 2</sup>
The number of settings you toggle on will not affect your DNS latency.
Do I need to set DoH at browser-level if I already use NextDNS at system-level?
Unless you use a separate profile for the browser, it is not neccessary. However, I recommend setting it in your web browser anyway.
I have a router profile and a device profile. Which one does my device use?
The device will use the profile set by the NextDNS app or the installed root CA. However, if the device has not been configured to use a separate profile, then it will use the wifi/router configuration.<sup>1</sup>
What is the difference between security, privacy, and anonymity?
Does NextDNS hide activity from my Internet Service Provider (ISP)?
Encrypted DNS queries boost privacy and security. This encryption stops your ISP from seeing what websites you search for and visit.
However, encrypted DNS does not hide website IP addresses from your ISP. While your ISP cannot see the specific domain you want to access, they can see that you contact DNS servers like Cloudflare or AWS. If you repeatedly send data to a certain IP address, your ISP can guess you are visiting a website at that address.
Do I need a VPN?
IVPN argues you only need a VPN for three reasons. Mainly, in order to:
-
Hide your real IP address from websites and peer-to-peer networks, which prevents ISPs and mobile carriers from tracking your online activity.
-
Guard against man in the middle and other common attacks on public Wi-Fi networks in places like airports, hotels, cafes, and libraries.
-
Bypass censorship or geographic restrictions, allowing you to access blocked websites and content.
Ultimately, you don't need a VPN unless your threat model demands it. Here are VPN suggestions from Techlore and Tom Spark Reviews if it does.
Mentions :books:
User Comments
- See here
YouTube
- The ULTIMATE Guide to Mastering NextDNS! | clarifications (July 2023)
Articles
- Knot Resolver — with ad blocking (Dec 2022)
- Privacy Toolkit: NextDNS (Sept 2022)
Guides
- A comprehensive guide to setting up NextDNS (Sept 2023)
- FMHY: DNS Adblocking → NextDNS → Guide
- hagezi/dns-blocklists → Online DNS Services