Skip to content
@BlissDNS

BlissDNS

Ad-free, encrypted, and private DNS service.

BlissDNS

Ad-Free, Encrypted, and Private DNS service.

What do we do?

We are a public DNS service, free to use, that blocks ads, trackers, malware, and other nasy stuff that slows down or clutters your internet browsing experience.

How do I use BlissDNS?

Easy, we have support for encrypted DNS with DNS-over-HTTPS, DNS-over-TLS, and DNS-over-QUIC. We of course support sending traffic directly to our IP so you can set your router or any device to use us for DNS if it does not support using encryption directly.

Our domain

DoH/DoT/DoQ domain: us1.blissdns.net

Android Private DNS

us1.blissdns.net

AdGuard Home/Similar

If you use AdGuard Home and want to use us as your upstream DNS servers, you can do so with the following as your upstream DNS!

tls://us1.blissdns.net
https://us1.blissdns.net/dns-query
quic://us1.blissdns.net

Firefox or Chrome(ium) secure/encrypted DNS

https://us1.blissdns.net/dns-query

Plain DNS/Pi-hole

If you are not using a service or device that takes advantage of encrypted DNS (Like Pi-hole or your router/game console/tv), you can send DNS queries our way at the following IP:

IPv4: 173.255.201.254
IPv6: 2600:3c00::f03c:93ff:feca:d2be

The details!

What exactly we do, what do we use, how is your information stored/kept/removed and why we do what we do.

What do you do exactly.

We run AdGuard Home on a Linode server that utilizes Unbound for DNS resolution, we use Let's Encrypt and Certbot to keep our domain up to date with a valid SSL.

What blocklists do you use?

Well, our goal is to stay problem free 100% of the time while maximizing our effectivness. The lists we use are as follows:
https://abp.oisd.nl/
https://github.com/badmojr/1Hosts/raw/master/Lite/adblock.txt
https://raw.githubusercontent.com/CipherOps/AdList/main/Blocklist
https://raw.githubusercontent.com/hagezi/dns-blocklists/main/adblock/tif.txt
https://raw.githubusercontent.com/hagezi/dns-blocklists/main/adblock/fake.txt

How is my information safe?

We do collect non-anonymized logs for 24 hours, after which they're gone. We only see what domain an IP looks up. We can see you go to google.com or reddit.com but nothing further than that, that information isn't transmitted via DNS so we are blissfully unaware of what you're doing, just what sites you visit. We do this because even in private beta we have to deal with spam bots, and with AdGuard Home we can see obvious signs of spam, see the IP doing it, and block it from the service, we maintain a public list of blocked IP's on our project here: https://github.com/BlissDNS/info/blob/main/badips.txt

Why are you doing this?

We hate ads, and trackers, and all the nasty crap you deal with online. We see people struggle to setup local adblocking or want adblocking on the go, and we do too, so instead of running personal VPN's and guiding others to set them up, we decided why not create a public server setup how we want, and let other people use it too, and thus BlissDNS was born.

Contact us!

There are a few ways to contact us either with questions, report an ad domain that isn't blocked, or report us blocking a domain we shouldn't!
Discord: https://discord.gg/Fk5VqxPD6U
Reddit (comment in the megathread): https://www.reddit.com/r/BlissDNS/
Issue tracker here: https://github.com/BlissDNS/info/issues
Or via email: info@blissdns.net

DONATE!

This project is going to grow and expand with the help of donations! Right now we are doing everything out of pocket ourselves, and all donations will help cover the server cost, and help us expand to run more servers internationally!

Pinned Loading

  1. info info Public

    Extra info not in big readme.

    Shell 3 1

Repositories

Showing 2 of 2 repositories
  • info Public

    Extra info not in big readme.

    BlissDNS/info’s past year of commit activity
    Shell 3 1 0 0 Updated Jun 13, 2024
  • .github Public

    Info

    BlissDNS/.github’s past year of commit activity
    1 0 0 0 Updated Mar 15, 2023

Top languages

Loading…

Most used topics

Loading…