πŸ›‘οΈ Free Premium DNS β€” Block Ads, Trackers & Malware at DNS Level

:locked: Mullvad Encrypted DNS β€” Premium Ad-Blocking DNS for Free

No subscription needed. No Mullvad account required. Just point your device at their servers and your DNS goes dark.


:world_map: What This Is

Mullvad runs a free encrypted DNS service with built-in content blocking. Your DNS queries get encrypted via DoH (DNS over HTTPS) or DoT (DNS over TLS) β€” meaning your ISP, network admin, or anyone snooping between you and the DNS server sees nothing.

The kicker? You don’t need to be a Mullvad customer to use it.


:shield: Pick Your Filter Level

6 Options β€” From Zero Blocking to Nuclear
Hostname Ads Trackers Malware Adult Gambling Social Media
dns.mullvad.net β€” β€” β€” β€” β€” β€”
adblock.dns.mullvad.net :white_check_mark: :white_check_mark: β€” β€” β€” β€”
base.dns.mullvad.net :white_check_mark: :white_check_mark: :white_check_mark: β€” β€” β€”
extended.dns.mullvad.net :white_check_mark: :white_check_mark: :white_check_mark: β€” β€” :white_check_mark:
family.dns.mullvad.net :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: β€”
all.dns.mullvad.net :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark:

base is the sweet spot for most people β€” kills ads, trackers, and malware without breaking social media or anything else.

all is scorched earth. Everything blocked. Good for focus mode or kid-proofing a device.


:globe_showing_europe_africa: Server IPs

IPv4 & IPv6 β€” Copy What You Need
Hostname IPv4 IPv6 DoH Port DoT Port
dns.mullvad.net 194.242.2.2 2a07:e340::2 443 853
adblock.dns.mullvad.net 194.242.2.3 2a07:e340::3 443 853
base.dns.mullvad.net 194.242.2.4 2a07:e340::4 443 853
extended.dns.mullvad.net 194.242.2.5 2a07:e340::5 443 853
family.dns.mullvad.net 194.242.2.6 2a07:e340::6 443 853
all.dns.mullvad.net 194.242.2.9 2a07:e340::9 443 853

These IPs only work with DoH or DoT resolvers β€” not plain DNS over port 53.


:globe_with_meridians: Browser Setup

Firefox / Mullvad Browser
  1. Menu β†’ Settings β†’ Privacy & Security
  2. Scroll to the bottom β†’ Enable secure DNS using β†’ select Max Protection
  3. Choose provider β†’ select Custom
  4. Paste one of these and press Enter:
https://dns.mullvad.net/dns-query
https://adblock.dns.mullvad.net/dns-query
https://base.dns.mullvad.net/dns-query
https://extended.dns.mullvad.net/dns-query
https://family.dns.mullvad.net/dns-query
https://all.dns.mullvad.net/dns-query

Mullvad Browser already uses dns.mullvad.net by default β€” only change it if you want content blocking.

Chrome / Brave / Edge
  1. Settings β†’ Privacy and security (Chrome/Brave) or Privacy, search, and services (Edge)
  2. Click Security (Chrome/Brave)
  3. Enable Use secure DNS
  4. Select Custom (Chrome/Brave) or Choose a service provider (Edge)
  5. Enter one of these and press Tab:
https://dns.mullvad.net/dns-query
https://adblock.dns.mullvad.net/dns-query
https://base.dns.mullvad.net/dns-query
https://extended.dns.mullvad.net/dns-query
https://family.dns.mullvad.net/dns-query
https://all.dns.mullvad.net/dns-query

If it says β€œPlease verify that this is a valid provider” β€” wait a moment, it resolves itself.


:mobile_phone: Mobile Setup

Android 9+
  1. Settings β†’ Network & internet β†’ Private DNS
  2. Select Private DNS provider hostname
  3. Enter one of these:
dns.mullvad.net
adblock.dns.mullvad.net
base.dns.mullvad.net
extended.dns.mullvad.net
family.dns.mullvad.net
all.dns.mullvad.net
  1. Tap Save

If it won’t connect β€” the nearest Mullvad DNS server is too far and latency is too high. Try a VPN to route closer.

iOS / iPadOS
  1. Open Safari β†’ go to Mullvad’s GitHub DNS profiles
  2. Tap the filter level you want (e.g., base)
  3. Pick DoH or DoT version
  4. Tap View raw β†’ Allow to download
  5. iOS 18: Open Files app β†’ tap the downloaded profile
  6. Settings β†’ Profile Downloaded β†’ Install β†’ enter passcode β†’ Install β†’ Done

Manage profiles later in Settings β†’ General β†’ VPN & Device Management.

:warning: If iCloud Private Relay is enabled, Apple may override your DNS profile.


:laptop: Desktop Setup

Windows 11
  1. Settings β†’ Network & internet β†’ Wi-Fi or Ethernet
  2. (Wi-Fi users: click Hardware properties first)
  3. Click Edit next to DNS server assignment β†’ select Manual
  4. Enable IPv4 β†’ enter the IP for your chosen filter:
Filter IPv4 DoH Template
None 194.242.2.2 https://dns.mullvad.net/dns-query
Adblock 194.242.2.3 https://adblock.dns.mullvad.net/dns-query
Base 194.242.2.4 https://base.dns.mullvad.net/dns-query
Extended 194.242.2.5 https://extended.dns.mullvad.net/dns-query
Family 194.242.2.6 https://family.dns.mullvad.net/dns-query
All 194.242.2.9 https://all.dns.mullvad.net/dns-query
  1. Under DNS over HTTPS β†’ select On (manual template) β†’ enter the matching DoH URL
  2. Click Save
  3. If you have IPv6 β€” repeat with the IPv6 address (e.g., 2a07:e340::4 for base)

:warning: Not available on Windows 10. Set up both Wi-Fi and Ethernet if you use both.

macOS

macOS 15+:

  1. Open Safari β†’ go to Mullvad’s GitHub DNS profiles
  2. Click your filter level β†’ pick DoH or DoT β†’ View raw β†’ downloads automatically
  3. System Settings β†’ Profile Downloaded β†’ double-click β†’ Install β†’ enter password

macOS 13–14:

  1. Same download steps as above
  2. System Settings β†’ Privacy & Security β†’ scroll to Profiles β†’ double-click the profile β†’ Install

Chromium browsers (Chrome/Brave/Edge) need an extra step β€” open Terminal and run:

defaults write com.google.Chrome BuiltInDnsClientEnabled -bool false
defaults write com.brave.Browser BuiltInDnsClientEnabled -bool false
defaults write com.microsoft.Edge BuiltInDnsClientEnabled -bool false

Safari and Firefox work immediately without this.

Linux (Ubuntu / Fedora)
  1. Enable systemd-resolved:
sudo systemctl enable systemd-resolved
  1. Settings β†’ Network β†’ your connection β†’ IPv4/IPv6 tabs β†’ turn off Automatic next to DNS β†’ leave DNS field blank β†’ Apply β†’ toggle network off and on

  2. Edit the config:

# Ubuntu:
sudo nano /etc/systemd/resolved.conf

# Fedora (copy first):
cp /usr/lib/systemd/resolved.conf /etc/systemd/
sudo nano /etc/systemd/resolved.conf
  1. Add under [Resolve] β€” uncomment ONE DNS line:
#DNS=194.242.2.2#dns.mullvad.net
#DNS=194.242.2.3#adblock.dns.mullvad.net
#DNS=194.242.2.4#base.dns.mullvad.net
#DNS=194.242.2.5#extended.dns.mullvad.net
#DNS=194.242.2.6#family.dns.mullvad.net
#DNS=194.242.2.9#all.dns.mullvad.net
DNSSEC=no
DNSOverTLS=yes
Domains=~.
  1. Fix resolv.conf and restart:
sudo ln -sf /run/systemd/resolve/stub-resolv.conf /etc/resolv.conf
sudo systemctl restart systemd-resolved
sudo systemctl restart NetworkManager
  1. Verify:
resolvectl status

Should show Mullvad DNS under Global β†’ Current DNS Server.

If it doesn’t work, try changing DNSOverTLS=yes to DNSOverTLS=opportunistic.


:globe_showing_europe_africa: Server Locations

Pick a Specific Server If You Want

Anycasted by default β€” routes you to the nearest server automatically. But if you want a specific one:

Server Country City
de-fra-dns-001.mullvad.net :germany: Germany Frankfurt
gb-lon-dns-001.mullvad.net :united_kingdom: UK London
gb-lon-dns-301.mullvad.net :united_kingdom: UK London
se-got-dns-001.mullvad.net :sweden: Sweden GΓΆteborg
se-mma-dns-001.mullvad.net :sweden: Sweden MalmΓΆ
se-sto-dns-001.mullvad.net :sweden: Sweden Stockholm
sg-sin-dns-101.mullvad.net :singapore: Singapore Singapore
us-dal-dns-001.mullvad.net :united_states: USA Dallas
us-nyc-dns-601.mullvad.net :united_states: USA New York

Use format: https://[server]/dns-query


:white_check_mark: How to Verify It’s Working

Go to :backhand_index_pointing_right: mullvad.net/check

You should see no DNS leaks. Click β€œNo DNS leaks” for details β€” the server listed should have β€œdns” in its name like se-mma-dns-001.mullvad.net.


:warning: Good to Know

A Few Things Before You Set and Forget
  • Already on Mullvad VPN? Don’t use this. Your DNS is already encrypted through the VPN tunnel and it’ll be faster than going through the public DNS service. Use the content blockers in the Mullvad app settings instead.

  • DNS can’t block everything. YouTube ads, for example, slip through because they come from the same domain as the videos. Pair this with uBlock Origin for full coverage.

  • Old hostnames deprecated. If you’re still using doh.mullvad.net or dot.mullvad.net β€” switch to the new dns.mullvad.net format. Old ones are getting retired.

  • Old IPs retired. 193.19.108.2 and 193.19.108.3 are no longer active.

  • SOCKS5 proxy users: If you enable Mullvad’s SOCKS5 proxy in Firefox with β€œProxy DNS when using SOCKS v5” enabled, the encrypted DNS and content blockers won’t work.


Encrypted DNS with ad-blocking. Free. No account needed. Just configure and forget. :locked:

11 Likes

FIX setup:

  1. Go to Settings β†’ Network & Internet β†’ Private DNS
  2. Select Private DNS provider hostname
  3. Enter: adblock.dns.mullvad.net
  4. Save. Done.

This uses DNS over TLS (DoT) β€” your queries are encrypted AND ad/tracker domains get blocked before they ever load. Works system-wide, including inside VPN tunneling apps.

Before: ads everywhere.
After: clean UI, zero ads. The app developer can’t monetize your eyeballs anymore.

Tested :white_check_mark: β€” :100: working.

2 Likes

Thanks a lot

2 Likes