How can we help?

Search our documentation or browse by category below.

πŸ”
πŸš€

Getting Started

Set up your first policy, point your DNS, and protect your network in minutes.

7 articles
🌐

DNS Configuration

Forwarder IPs, roaming clients, DoH/DoT endpoints, and resolver settings.

6 articles
πŸ›‘οΈ

Filtering & Policies

Content categories, allow/block lists, custom rules, and bypass options.

8 articles
🀝

MSP & Multi-Tenant

Managing clients, tenant isolation, billing rollup, and partner portal access.

6 articles
βš™οΈ

API & Integrations

REST API reference, authentication, webhooks, SIEM, and PSA connectors.

5 articles
πŸ’³

Billing & Accounts

Plans, invoices, seat counts, upgrades, and cancellation.

5 articles
🏠

Personal / Consumer

Set up your home DNS, manage devices, custom block/allow rules, and personal plans.

8 articles
πŸ”§

Troubleshooting

Sites not loading, block page errors, roaming agent issues, and log gaps.

7 articles

πŸš€ Getting Started

What are DNSAFE's resolver IP addresses?βŒ„
Point your network's DNS to our anycast resolvers:

Primary / Secondary

  • Primary: 3.12.124.91
  • Secondary: 3.12.124.91

DNS-over-HTTPS (DoH)

  • https://api.dnsafe.net/dns-query

DNS-over-TLS (DoT)

  • api.dnsafe.net β€” port 853
These are shared resolvers. For a dedicated resolver tied to your policy, generate one in the portal under Settings β†’ Resolvers.
How do I protect a network location?βŒ„
  1. In the portal go to Settings β†’ Network Locations and click Add Location.
  2. Enter a name and your network's public IP range (CIDR notation, e.g. 203.0.113.0/24).
  3. Assign a policy to the location.
  4. Update your router or firewall DNS settings to point to the resolver IPs above.
Policy enforcement begins as soon as the DNS change propagates (usually under 5 minutes).
How do I install the roaming client?βŒ„
The roaming client protects devices when they're off your network (laptops on coffee shop Wi-Fi, etc.).

Steps

  1. Download the agent from the portal: Settings β†’ Roaming Clients β†’ Download.
  2. Run the installer with administrator privileges.
  3. Enter your Organisation Token when prompted (found in Settings β†’ Organisation).
  4. The agent registers itself and begins enforcing your default roaming policy.
The client is available for Windows 10/11 and macOS 12+. Linux support is via manual config β€” see the DNS-over-TLS setup guide.
How long does it take for policy changes to take effect?βŒ„
Policy changes apply within 60 seconds on average. The portal shows a "syncing" indicator while propagation is in progress. If you're testing, flush your local DNS cache (ipconfig /flushdns on Windows, sudo dscacheutil -flushcache on macOS) to see changes immediately.
What's the difference between a Policy and a Location?βŒ„
  • Policy β€” a set of rules (categories to block, allow-list domains, custom rules). Think of it as the rulebook.
  • Location β€” a network or device group (identified by IP range or roaming agent token). Think of it as the thing the rulebook is applied to.
One policy can be assigned to many locations. Each location can only have one active policy at a time.
How do I see what's being blocked?βŒ„
Go to Logs in the portal. You can filter by:
  • Action: blocked / allowed
  • Location, policy, or specific domain
  • Time range (last 15m, 1h, 24h, 7d, custom)
Logs are retained for 30 days on Starter, 90 days on Growth, and 1 year on Enterprise.
Can I invite other admins to my account?βŒ„
Yes. Go to Settings β†’ Team Members β†’ Invite. Enter the email address and choose a role:
  • Owner β€” full access including billing and team management.
  • Admin β€” full policy and location management, no billing access.
  • Viewer β€” read-only access to logs and dashboards.
Invitees receive an email with a sign-up link. Multi-user access is available on Growth and Enterprise plans.

🌐 DNS Configuration

How do I configure DNS on a Cisco / Meraki router?βŒ„
In the Meraki dashboard: Security & SD-WAN β†’ Addressing & VLANs β†’ DNS. Set primary to 3.12.124.91 and secondary to 3.12.124.91. Apply to all VLANs that should be filtered. Changes take effect on the next DHCP lease renewal for clients.
How do I set up DNS-over-HTTPS in a browser?βŒ„

Chrome / Edge

Settings β†’ Privacy and Security β†’ Security β†’ Use Secure DNS β†’ enter https://api.dnsafe.net/dns-query.

Firefox

Settings β†’ General β†’ Network Settings β†’ Enable DNS over HTTPS β†’ Custom β†’ enter the same URL.

Note: browser-level DoH bypasses OS/router DNS, so it applies only to that browser.
Can I use DNSAFE with Active Directory / internal DNS?βŒ„
Yes. Configure your internal DNS server (Windows DNS Server, BIND, etc.) to forward external queries to DNSAFE resolvers. Your internal zones resolve locally; everything else gets filtered by DNSAFE. Conditional forwarding for your internal domains should point to your domain controller, not DNSAFE.
My location has a dynamic IP β€” what do I do?βŒ„
Use our Dynamic IP Updater. In the portal under Settings β†’ Network Locations, enable Dynamic IP for the location. You'll get a unique update URL. Configure your router's DDNS client (or a cron job) to hit that URL whenever your IP changes. Alternatively, use the roaming client on devices instead of a network location.
What ports does DNSAFE use?βŒ„
  • Standard DNS: UDP/TCP 53
  • DNS-over-TLS: TCP 853
  • DNS-over-HTTPS: TCP 443
  • Roaming agent check-in: TCP 443 (HTTPS)
Ensure outbound traffic on these ports is allowed through your firewall to *.dnsafe.net.
How do I configure DNS on Windows, macOS, iOS, and Android?βŒ„

Windows 10/11

Settings β†’ Network & Internet β†’ Change adapter options β†’ right-click your connection β†’ Properties β†’ Internet Protocol Version 4 (TCP/IPv4) β†’ Properties β†’ Use the following DNS server addresses β†’ enter 3.12.124.91.

macOS

System Settings β†’ Network β†’ select your connection β†’ Details β†’ DNS tab β†’ click + and add 3.12.124.91. Remove any existing entries from your ISP.

iOS (iPhone / iPad)

Settings β†’ Wi-Fi β†’ tap the β“˜ next to your network β†’ Configure DNS β†’ Manual β†’ remove existing servers and add 3.12.124.91. For DoH, visit dnsafe.net/check and tap Install DNS Profile.

Android 9+

Settings β†’ Network & internet β†’ Private DNS β†’ select "Private DNS provider hostname" β†’ enter 3.12.124.91. This uses DNS-over-TLS automatically.

Router (general)

Log into your router admin panel (usually 192.168.1.1 or 192.168.0.1) β†’ WAN/Internet Settings β†’ DNS β†’ Primary: 3.12.124.91. This protects all devices on the network at once.

πŸ›‘οΈ Filtering & Policies

How do I allow a site that's being blocked?βŒ„
In the portal: Policies β†’ [your policy] β†’ Allow List β†’ Add Domain. Enter the domain (e.g. example.com) β€” subdomains are included automatically. The allow list overrides all category blocks.

You can also allow from the Logs view: find the blocked entry, click the domain, and select Add to Allow List.
How do I block a specific domain?βŒ„
Policies β†’ [your policy] β†’ Block List β†’ Add Domain. Custom block list entries override category rules, so a domain allowed by default can be blocked here. Wildcards are supported: *.ads.example.com.
What content categories does DNSAFE filter?βŒ„
DNSAFE classifies domains into 80+ categories including:
  • Malware / Phishing / C2
  • Adult Content
  • Gambling
  • Social Media
  • Streaming Video
  • P2P / Torrents
  • Newly Registered Domains
  • Cryptomining
  • Anonymisers / VPNs
  • Advertising & Trackers
  • Weapons
  • Drug-related
Security categories (malware, phishing, C2, cryptomining) are enabled on all plans. Content categories require Growth or Enterprise.
Can I show a custom block page?βŒ„
Yes. Under Settings β†’ Block Page you can customise the block page with your logo, company name, and a custom message. Enterprise plans can fully redirect to their own HTTPS block page via CNAME.
How do SafeSearch and YouTube Restricted Mode work?βŒ„
Enable these in Policies β†’ [policy] β†’ Content Controls. DNSAFE enforces SafeSearch by returning the restricted CNAME for Google, Bing, and DuckDuckGo. YouTube Restricted Mode is enforced at the DNS level by returning YouTube's restrict endpoint. Both work without any software on client devices.
What is ThreatGrid and how does it work?βŒ„
ThreatGrid is DNSAFE's threat intelligence engine. It aggregates feeds from 40+ threat intelligence sources, our own DNS telemetry, and a real-time DGA (Domain Generation Algorithm) detector to classify and score domains. Domains with a high threat score are blocked automatically, even before traditional feed updates. ThreatGrid scores update every 15 minutes.
Can I schedule filtering (e.g. block social media during work hours)?βŒ„
Yes β€” Policy Schedules are available on Growth and Enterprise. Under Policies β†’ Schedules, define time windows and assign alternate policies. For example: strict policy 9am–5pm Mon–Fri, relaxed policy evenings and weekends.
What are Newly Registered Domains (NRDs) and should I block them?βŒ„
Newly Registered Domains are domains registered within the last 30 days. Attackers frequently register fresh domains for phishing, malware delivery, and spam campaigns precisely because they have no reputation history. DNSAFE's NRD category flags these automatically.

Blocking NRDs is highly recommended for business and MSP environments. For home users it's optional β€” very occasionally a legitimate new service may be on an NRD. You can always add allow-list exceptions for specific domains you trust.

🀝 MSP & Multi-Tenant

How do I add a new client tenant?βŒ„
In the partner portal go to Tenants β†’ Add Tenant. Enter the client name and assign a plan. The tenant is provisioned instantly and you'll be dropped into that tenant's dashboard. Each tenant has full policy, location, and log isolation.
How does MSP billing work?βŒ„
MSP partners are billed monthly based on total active seats across all tenants. You set your own resale price to clients β€” DNSAFE doesn't dictate end-user pricing. Your invoice consolidates all tenants into a single line item with a per-seat breakdown. Margins typically run 60–70% depending on your resale tier.
Can client users log into their own portal?βŒ„
Yes. Each tenant can have one or more admin users who access only their own tenant's data at portal.dnsafe.net. They cannot see other tenants or MSP-level settings. You control whether clients can modify their own policies or just view reports.
Is there an API for automating tenant provisioning?βŒ„
Yes. The DNSAFE REST API supports full tenant lifecycle management β€” create, update, suspend, and delete tenants; manage policies and locations; pull logs and stats. See the full reference at api.dnsafe.net/docs. Generate API keys under Settings β†’ API Keys.
How do I view health across all my tenants?βŒ„
The Tenant Health dashboard (partner portal home) shows all tenants with their DNS query volume, block rate, last-seen timestamp, and any active alerts. Tenants with no DNS traffic in 24h are flagged in amber; those with zero traffic for 72h are flagged red, indicating the DNS forwarder may be misconfigured.
How does white-labelling work?βŒ„
White-labelling is available on Growth and Scale plans. You can customise:
  • Portal branding β€” your logo and colour scheme on the tenant-facing portal.
  • Block page β€” your logo and message shown when a domain is blocked.
  • Email notifications β€” alerts sent from your domain (requires DNS configuration for SPF/DKIM).
Configure all of these under Partner Settings β†’ White Label in the MSP portal. Client tenants will see your brand throughout β€” DNSAFE branding is not shown to end users on white-label plans.

βš™οΈ API & Integrations

How do I authenticate with the DNSAFE REST API?βŒ„
The API uses Bearer token authentication. Generate an API key under Settings β†’ API Keys β†’ New Key. Include it in every request:

Authorization: Bearer YOUR_API_KEY

API keys are scoped β€” you can create read-only keys for reporting or read/write keys for full management. Keys can be revoked at any time without affecting other keys. The full API reference is at api.dnsafe.net/docs.
What can I do with the REST API?βŒ„
The DNSAFE REST API covers the full platform:
  • Create, update, delete tenants (MSP)
  • Manage policies and rules
  • Add/remove network locations
  • Query DNS logs and stats
  • Look up domain reputation
  • Manage allow/block lists
  • Pull billing usage data
  • Trigger on-demand reports
All endpoints return JSON. Rate limits are 60 req/min on Personal, 300 req/min on Growth, and 1,000 req/min on Enterprise/Scale plans.
How do I integrate with a SIEM (Splunk, Microsoft Sentinel, etc.)?βŒ„
DNSAFE supports log streaming to SIEM platforms on Growth and Enterprise plans. Under Settings β†’ Integrations β†’ SIEM:
  • Syslog (UDP/TCP) β€” stream logs in CEF or JSON format to any syslog-capable SIEM.
  • HTTP webhook β€” push log events to a custom endpoint (useful for Splunk HEC, Elastic, etc.).
  • Amazon S3 β€” dump logs hourly to an S3 bucket for long-term archiving or bulk analysis.
Pre-built integrations are available for Splunk, Microsoft Sentinel, and Elastic. See docs.dnsafe.net/msp for connector guides.
How do PSA integrations work (ConnectWise, Autotask)?βŒ„
PSA integration is available on Scale and Enterprise MSP plans. Once connected, DNSAFE can:
  • Auto-create tickets in your PSA when a high-severity threat is detected for a client.
  • Sync client names between DNSAFE tenants and PSA accounts.
  • Push monthly usage reports as notes or attachments on client records.
Set up the integration under Partner Settings β†’ PSA Integration. You'll need your PSA API credentials. Supported PSAs: ConnectWise Manage, Autotask, HaloPSA.
Does DNSAFE support webhooks?βŒ„
Yes. Configure webhooks under Settings β†’ Integrations β†’ Webhooks. Events you can subscribe to:
  • threat.blocked β€” fired when a high-severity threat domain is blocked.
  • policy.changed β€” fired when a policy is modified.
  • tenant.created / tenant.deleted β€” MSP lifecycle events.
  • usage.threshold β€” fired when seat usage crosses a configured percentage.
Payloads are signed with an HMAC-SHA256 signature using your webhook secret, so you can verify authenticity on your end.

πŸ’³ Billing & Accounts

How do I upgrade or change my plan?βŒ„
Go to Billing β†’ Change Plan in the portal. Upgrades take effect immediately and you're charged a prorated amount for the remainder of the billing cycle. Downgrades take effect at the next renewal date.
How do I cancel my subscription?βŒ„
Billing β†’ Cancel Subscription. Your access continues until the end of the current billing period. Log data is retained for 30 days after cancellation. If you're cancelling due to a problem, please contact support first β€” we're happy to help resolve issues or pause your account.
Do you offer refunds?βŒ„
Yes. We offer a full 30-day money-back guarantee on all paid plans. If you're not satisfied within 30 days of your first charge, contact support@dnsafe.net and we'll issue a full refund β€” no questions asked. After 30 days, refunds are reviewed on a case-by-case basis. See our Refund & Cancellation Policy for full details.
Where do I find my invoices?βŒ„
Billing β†’ Invoices in the portal. All invoices are available as PDF download and are also emailed to your billing contact on the first of each month.
Is there an annual billing discount?βŒ„
Yes β€” paying annually saves 20% compared to monthly billing on all consumer and business plans. You can switch to annual billing at any time from Billing β†’ Change Plan. The saving is applied immediately on a prorated basis for any remaining months in your current cycle. MSP Enterprise and Scale plans can also be invoiced annually β€” contact sales@dnsafe.net to arrange this.

πŸ”§ Troubleshooting

A site is blocked but it shouldn't be β€” what do I do?βŒ„
  1. Check Logs for the domain and note the block reason (category or custom rule).
  2. If it's a false positive in a threat category, report it via the form below β€” include the domain and your use case. ThreatGrid recategorisation requests are reviewed within 24h.
  3. For immediate access: add the domain to your policy's Allow List.
DNS is resolving but filtering isn't applyingβŒ„
  1. Confirm DNS is actually hitting DNSAFE: run nslookup whoami.dnsafe.net β€” it should return your registered location's name.
  2. If it returns nothing or a generic response, your DNS isn't going through DNSAFE. Check your router/firewall DNS settings.
  3. If the location is shown but filtering isn't working, check the policy assigned to that location and verify the relevant categories are toggled on.
The roaming client shows as disconnectedβŒ„
  • Ensure the DNSAFE service is running: Windows: services.msc β†’ DNSAFE Agent. macOS: check System Preferences β†’ Privacy & Security β†’ Extensions.
  • Verify outbound HTTPS (port 443) to agent.dnsafe.net isn't blocked by a corporate firewall.
  • Re-enter the organisation token: agent tray icon β†’ Settings β†’ Re-register.
  • If on a corporate network that forces DNS, the agent will defer to the network policy while on that network β€” this is expected behaviour.
Logs are showing no data for a locationβŒ„
If a location shows zero queries for more than 15 minutes after setup:
  1. Confirm the resolver IPs are set correctly on the router/device.
  2. Check that no upstream DNS (like ISP-provided) is overriding your settings β€” some routers require disabling "DNS Rebind Protection" for external resolvers.
  3. Test from a device on that network: nslookup test.dnsafe.net <resolver-ip>
  4. Ensure UDP port 53 outbound isn't being blocked by a firewall ACL.
The block page shows a certificate errorβŒ„
This happens when HTTPS sites are blocked β€” the browser sees a certificate mismatch because DNSAFE redirects to the block page domain, not the original. To fix this for your users, install the DNSAFE root certificate on managed devices. Download it from Settings β†’ Block Page β†’ Download Root CA and deploy via Group Policy (Windows) or MDM profile (macOS/iOS).
How do I test if a domain is blocked before rolling out a policy?βŒ„
Use the Domain Intel tool in the portal (sidebar β†’ Domain Intel). Enter any domain to see its ThreatGrid score, category classification, and how it would be handled by each of your policies. You can also run a live test without affecting real traffic.
HTTPS sites are showing a "Your connection is not private" errorβŒ„
This is expected behaviour when DNSAFE blocks an HTTPS site and redirects to the block page. Because the original domain's SSL certificate doesn't match the block page domain, the browser shows a certificate warning.

Fix for managed devices

  1. Download the DNSAFE Root CA from Settings β†’ Block Page β†’ Download Root CA.
  2. Deploy to devices via Group Policy (Windows), MDM profile (macOS/iOS), or your device management platform.

For unmanaged / home devices

Install the certificate manually: open the downloaded .crt file, click Install Certificate, and place it in the Trusted Root Certification Authorities store (Windows) or Keychain (macOS). After installing, the block page will display cleanly with no warning.

🏠 Personal / Consumer

How do I get started with a personal account?βŒ„

Sign up at my.dnsafe.net β€” no credit card required for a free account. Then:

  1. Point your device's DNS to 3.12.124.91 (see DNS Setup section for platform-specific steps).
  2. Go to Devices and register your public IP address.
  3. Browse normally β€” DNSAFE's global blocklist is active immediately.
  4. Add custom block or allow rules from the Rules page.

The free plan covers 1 device and up to 5 custom rules. Upgrade to Personal or Family for more devices and rules.

What DNS addresses do I use for my personal account?βŒ„

Standard DNS (UDP/TCP port 53)

3.12.124.91

DNS-over-HTTPS (DoH)

https://api.dnsafe.net/dns-query

DNS-over-TLS (DoT)

api.dnsafe.net:853

Standard DNS is the easiest to configure on routers and most devices. DoH and DoT add encryption and are supported by most modern browsers and mobile operating systems natively.

How do I add my device?βŒ„

DNSAFE uses IP-based device mapping to apply your personal rules and log your queries. To register a device:

  1. Find your public IP β€” visit api.ipify.org or search "what is my IP".
  2. Go to my.dnsafe.net/devices and click Add Device.
  3. Enter your IP and a label (e.g. "Home Router") and save.

If your ISP changes your IP periodically, update the device entry when this happens. Setting DNS on your router (instead of individual devices) means you only need one device entry for your whole home.

Device limits by plan: Free: 1 Β· Personal: 5 Β· Family: Unlimited Β· Pro: 25

What are custom rules and how do they work?βŒ„

Custom rules let you add personal block or allow entries on top of DNSAFE's global blocklist. Rules apply only to devices registered to your account.

Block rules

Prevent your devices from resolving a specific domain β€” useful for blocking distracting or unwanted sites (e.g. reddit.com, tiktok.com).

Allow rules

Force a domain to resolve normally even if it appears on the global blocklist. Allow rules are checked before the global blocklist, so they always win. Use this if DNSAFE is over-blocking a domain you need.

Rule limits by plan

  • Free: 5 rules
  • Personal: 25 rules
  • Family: 100 rules
  • Pro: 500 rules

Manage rules at my.dnsafe.net/rules. Rules take effect within seconds.

What are the personal plans and what do they include?βŒ„

Free β€” $0/mo

1 device Β· 5 custom rules Β· Global threat blocklist Β· Query logs

Personal β€” $2.99/mo

5 devices Β· 25 custom rules Β· Ad blocking Β· Extended logs Β· Add-ons available

Family β€” $7.99/mo

Unlimited devices Β· 100 custom rules Β· Parental controls Β· Ad blocking Β· All add-ons

Pro

25 devices Β· 500 custom rules Β· API access add-on Β· Priority support

Upgrade any time from my.dnsafe.net/billing. Upgrades take effect immediately.

My custom rules aren't blocking anything β€” what's wrong?βŒ„

Check these in order:

  1. DNS is actually pointing to DNSAFE. Run nslookup example.com 3.12.124.91 (Windows) or dig example.com @3.12.124.91 (Mac/Linux). If it times out, DNS isn't set correctly.
  2. Your browser isn't overriding DNS. Chrome and Edge both have "Secure DNS" settings that bypass the system resolver. In Chrome: Settings β†’ Privacy β†’ Security β†’ Use secure DNS β€” turn it off or set it to custom and enter https://api.dnsafe.net/dns-query. Same location in Edge.
  3. Your public IP is registered. Check Devices β€” the IP shown must match your current public IP.
  4. The domain matches exactly. Rules don't automatically cover subdomains β€” blocking reddit.com doesn't block old.reddit.com. Add subdomains as separate rules if needed.
How do I unblock a site that DNSAFE is blocking?βŒ„

Go to my.dnsafe.net/rules, enter the domain, and set the action to Allow. Allow rules override the global blocklist β€” the domain will resolve normally for all devices registered to your account.

If the domain is being blocked by the global ThreatGrid blocklist and you believe it's a false positive, you can also report it via the support form below so we can review the categorisation.

What add-ons are available for personal accounts?βŒ„

Add-ons are available on Personal, Family, and Pro plans and can be managed at my.dnsafe.net/addons.

  • Parental Controls ($1.99/mo) β€” blocks adult content, gambling, and age-inappropriate categories.
  • Extended Logs ($0.99/mo) β€” keeps 180 days of query history.
  • Usage Reports ($4.99 one-time) β€” generates a detailed PDF report of your DNS activity.
  • API Access ($2.99/mo) β€” programmatic access to your rules and logs (Personal and Family plans only).

Still need help?

Submit a ticket and our team will get back to you by email β€” usually within 4 hours.

You'll receive a confirmation email. Need immediate help? Email support@dnsafe.net