Primary / Secondary
- Primary:
3.12.124.91 - Secondary:
3.12.124.91
DNS-over-HTTPS (DoH)
https://api.dnsafe.net/dns-query
DNS-over-TLS (DoT)
api.dnsafe.netβ port 853
Search our documentation or browse by category below.
Set up your first policy, point your DNS, and protect your network in minutes.
7 articlesForwarder IPs, roaming clients, DoH/DoT endpoints, and resolver settings.
6 articlesContent categories, allow/block lists, custom rules, and bypass options.
8 articlesManaging clients, tenant isolation, billing rollup, and partner portal access.
6 articlesREST API reference, authentication, webhooks, SIEM, and PSA connectors.
5 articlesPlans, invoices, seat counts, upgrades, and cancellation.
5 articlesSet up your home DNS, manage devices, custom block/allow rules, and personal plans.
8 articlesSites not loading, block page errors, roaming agent issues, and log gaps.
7 articles3.12.124.913.12.124.91https://api.dnsafe.net/dns-queryapi.dnsafe.net β port 853203.0.113.0/24).ipconfig /flushdns on Windows, sudo dscacheutil -flushcache on macOS) to see changes immediately.
blocked / allowed3.12.124.91 and secondary to 3.12.124.91. Apply to all VLANs that should be filtered. Changes take effect on the next DHCP lease renewal for clients.
https://api.dnsafe.net/dns-query.
53853443443 (HTTPS)*.dnsafe.net.
Settings β Network & Internet β Change adapter options β right-click your connection β Properties β Internet Protocol Version 4 (TCP/IPv4) β Properties β Use the following DNS server addresses β enter 3.12.124.91.
System Settings β Network β select your connection β Details β DNS tab β click + and add 3.12.124.91. Remove any existing entries from your ISP.
Settings β Wi-Fi β tap the β next to your network β Configure DNS β Manual β remove existing servers and add 3.12.124.91. For DoH, visit dnsafe.net/check and tap Install DNS Profile.
Settings β Network & internet β Private DNS β select "Private DNS provider hostname" β enter 3.12.124.91. This uses DNS-over-TLS automatically.
Log into your router admin panel (usually 192.168.1.1 or 192.168.0.1) β WAN/Internet Settings β DNS β Primary: 3.12.124.91. This protects all devices on the network at once.
example.com) β subdomains are included automatically. The allow list overrides all category blocks.
*.ads.example.com.
Authorization: Bearer YOUR_API_KEY
threat.blocked β fired when a high-severity threat domain is blocked.policy.changed β fired when a policy is modified.tenant.created / tenant.deleted β MSP lifecycle events.usage.threshold β fired when seat usage crosses a configured percentage.nslookup whoami.dnsafe.net β it should return your registered location's name.services.msc β DNSAFE Agent. macOS: check System Preferences β Privacy & Security β Extensions.agent.dnsafe.net isn't blocked by a corporate firewall.nslookup test.dnsafe.net <resolver-ip>Install the certificate manually: open the downloaded .crt file, click Install Certificate, and place it in the Trusted Root Certification Authorities store (Windows) or Keychain (macOS). After installing, the block page will display cleanly with no warning.
Sign up at my.dnsafe.net β no credit card required for a free account. Then:
3.12.124.91 (see DNS Setup section for platform-specific steps).The free plan covers 1 device and up to 5 custom rules. Upgrade to Personal or Family for more devices and rules.
3.12.124.91
https://api.dnsafe.net/dns-query
api.dnsafe.net:853
Standard DNS is the easiest to configure on routers and most devices. DoH and DoT add encryption and are supported by most modern browsers and mobile operating systems natively.
DNSAFE uses IP-based device mapping to apply your personal rules and log your queries. To register a device:
If your ISP changes your IP periodically, update the device entry when this happens. Setting DNS on your router (instead of individual devices) means you only need one device entry for your whole home.
Device limits by plan: Free: 1 Β· Personal: 5 Β· Family: Unlimited Β· Pro: 25
Custom rules let you add personal block or allow entries on top of DNSAFE's global blocklist. Rules apply only to devices registered to your account.
Prevent your devices from resolving a specific domain β useful for blocking distracting or unwanted sites (e.g. reddit.com, tiktok.com).
Force a domain to resolve normally even if it appears on the global blocklist. Allow rules are checked before the global blocklist, so they always win. Use this if DNSAFE is over-blocking a domain you need.
Manage rules at my.dnsafe.net/rules. Rules take effect within seconds.
1 device Β· 5 custom rules Β· Global threat blocklist Β· Query logs
5 devices Β· 25 custom rules Β· Ad blocking Β· Extended logs Β· Add-ons available
Unlimited devices Β· 100 custom rules Β· Parental controls Β· Ad blocking Β· All add-ons
25 devices Β· 500 custom rules Β· API access add-on Β· Priority support
Upgrade any time from my.dnsafe.net/billing. Upgrades take effect immediately.
Check these in order:
nslookup example.com 3.12.124.91 (Windows) or dig example.com @3.12.124.91 (Mac/Linux). If it times out, DNS isn't set correctly.https://api.dnsafe.net/dns-query. Same location in Edge.reddit.com doesn't block old.reddit.com. Add subdomains as separate rules if needed.Go to my.dnsafe.net/rules, enter the domain, and set the action to Allow. Allow rules override the global blocklist β the domain will resolve normally for all devices registered to your account.
If the domain is being blocked by the global ThreatGrid blocklist and you believe it's a false positive, you can also report it via the support form below so we can review the categorisation.
Add-ons are available on Personal, Family, and Pro plans and can be managed at my.dnsafe.net/addons.
Submit a ticket and our team will get back to you by email β usually within 4 hours.