AdGuard Private Service is based on the open-source project AdGuardHome, providing the first line of defense for network access through self-maintained traffic analysis and protection services. After identifying the intent of the traffic, it performs interception, replacement, or release operations based on the configuration.
AdGuard Private can meet the following needs:
Public network access, supporting both IPv4 and IPv6.
Blocking a large number of ads.
Blocking a large amount of privacy theft.
Blocking phishing and scam websites, protecting the elderly (public services now include protection rules).
Simple setup, modern operating systems natively support setting up encrypted DNS, no need to install additional software.
Paid services additionally support:
Internet activity logs, internet information statistics.
Blocking adult websites and games, protecting minors.
Custom rules, blocking access to specific apps, websites, or games.
Custom resolution, resolving any desired domain to a NAS or server within your home or enterprise.
Setting client IDs, separately recording internet activities of different devices.
1 - User Guide
Main Services Provided for a Fee
Basic Features
Access Logs
Blocking Logs
Statistics
Custom Upstream
Custom Filtering Rules
Custom Resolution
Whitelist Mode
Advanced Features
HTTP3 Support
DDNS Support
ECS Support
Resolution by Traffic Rules
Block Specific Applications
Schedule
Access Logs
View internet access logs. The private service provides a 24-hour network access log query.
Blocking Logs
View blocking logs to understand which ads are blocked and which websites are blocked.
Statistics
The private service provides 24-hour network access statistics to understand user internet habits.
Statistics will show which websites are visited the most and which websites are blocked the most.
Custom Rules
Create custom rules within the private service to block ads from commonly used applications or allow websites that are not considered ads by the user.
Users may need to view access logs to observe website query records when launching specific applications, in order to add custom rules.
Whitelist Mode
If you need to avoid blocking certain types of websites, you can set whitelist mode, allowing access only to specific websites.
The whitelist has a higher priority than the blacklist; if a website is on the whitelist, it will not be blocked. Users can add commonly used websites to the whitelist to avoid accidental blocking.
Authoritative Resolution
Supports adding authoritative resolution for devices within a company or home, resolving specified names to the IP addresses of home devices, eliminating the need to remember IP addresses.
Users do not need to purchase a domain name or register; they only need to add authoritative resolution rules within the private service.
1.1 - How to Configure
AdGuard Private Service Configuration Guide
After the paid service expires,
The service will immediately become invalid, and accessing the backend management address will redirect to the service status inquiry page.
Personalized settings will be retained for 7 days; if not renewed within 7 days, all data of the service will be completely deleted.
After the service is completely deleted, the custom domain name will no longer be able to access the service. Please remember to modify your encrypted DNS settings, otherwise you will not be able to access the internet.
Need Help
Send an email
service1@adguardprivate.com Please describe the issue you are experiencing in detail, and we will respond as soon as possible.
1.1.1 - Android
Configuration Steps
Specific setup steps for different brand phones:
Xiaomi/Redmi Phones
Open Settings
Select Connection & Sharing
Click Private DNS
Choose Private DNS service provider hostname
Enter: {xxxxxxxxxxxxxxxx}.adguardprivate.com
Samsung Phones
Open Settings
Select Connections
Click More connection settings
Choose Private DNS
Enter: {xxxxxxxxxxxxxxxx}.adguardprivate.com
Note: Please replace {xxxxxxxxxxxxxxxx} with your dedicated DNS server address
Verify Configuration
After configuration:
The system will automatically verify the DNS connection status
iOS 14 and later versions support native DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypted DNS. You can enable it using the following steps:
Open the built-in browser Safari, navigate to the private service backend, Setup Guide -> DNS Privacy
Download the configuration file
Open the phone Settings
Tap General
Tap VPN & Device Management
Select your dedicated configuration to install
Configuration Demonstration
1.1.3 - Windows
Windows 11
Windows 11 21H2 and later versions support native DNS over HTTPS (DoH). You can enable it using the following steps:
Open Settings
Open Network & Internet
Open Ethernet
Find DNS server assignment, click Edit
Select Manual
Enter 120.26.96.167 in the Preferred DNS server IPv4 field, and 2408:4005:3de:8500:4da1:169e:dc47:1707 for the IPv6 address
For DNS over HTTPS (DoH), select: On (Manual template)
Enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query in the DoH template field, where {xxxxxxxxxxxxxxxx} is your encrypted DNS service username.
Do not check Use unencrypted requests on failure
For the Alternate DNS server, you can optionally enter 223.5.5.5 (Alibaba Cloud Public DNS service), with DNS over HTTPS off, and check Use unencrypted requests on failure.
Windows 10 and Earlier Versions
Windows 10 and earlier versions do not support native encrypted DNS, but if you are using newer browsers like Chrome/Edge or various browsers based on the Chromium engine (such as 360/QQ and other domestic browsers), you can set up DoH encrypted DNS in the browser. Here’s how to set it up in Chrome:
Open Chrome browser Settings
Open Privacy, search, and services
Scroll to Security
Enable Use secure DNS to specify how to look up the network address of websites
Enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query in the Choose service provider field, where {xxxxxxxxxxxxxxxx} is your encrypted DNS service username.
For other browsers, please refer to their respective settings, which are generally found under Settings - Privacy - Security.
1.1.4 - macOS
macOS Big Sur and later versions support native DNS over HTTPS (DoH) and DNS over TLS (DoT) encrypted DNS. You can enable it using the following steps:
Open the built-in browser Safari, navigate to the private services backend, Settings Guide -> DNS Privacy
Download the configuration file
Open System Settings
Open Privacy & Security
Select Profiles
Select your dedicated configuration to install
1.1.5 - Browser
Browser versions of Chromium 79+ support DoH. Here are the settings methods for Chromium-based browsers (Chrome/Edge/360/QQ, etc.):
Open Chrome browser Settings
Open Privacy, search, and services
Scroll to Security
Enable Use secure DNS to specify how to look up the network address of a website
In Choose service provider, enter https://xxxxxxxxxxxxxxxx.adguardprivate.com/dns-query, where {xxxxxxxxxxxxxxxx} is your username for the private encrypted DNS service.
1.2 - Advanced Features
This section will introduce some advanced techniques for using private services.
1.2.1 - Blocked Applications List
It is important to avoid confusion: blacklists are typically used to block ads, privacy intrusions, malware, etc., while the Blocked Applications List is used to completely block the use of specified applications.
This is often used in conjunction with a schedule for personal habit formation to prevent addiction. It is commonly used for habit formation in minors, for example: prohibiting the use of social media and games during study time. It can also be used for self-discipline in adults, for example: prohibiting the use of social media and games during work hours.
This service pre-configures some rules based on popular applications in various countries. Due to changes in popular culture and business developments, these lists may become outdated, but we are committed to ongoing maintenance.
If you find that an application on the list is not fully blocked, or if you need to add a recently popular application, please contact us, and we will address it promptly.
Need Help
Send an email
service1@adguardprivate.com Please describe the issue you are experiencing in detail, and we will respond as soon as possible.
AdGuard Private supports the ECS feature, providing more precise resolution to optimize your network experience.
Setup method:
What is ECS (Extended Client Subnet)?
ECS (Extended Client Subnet) is a DNS protocol extension that allows the DNS resolver (such as your AdGuard Private server) to pass part of the client’s IP address information to the authoritative DNS server. This enables the authoritative server to provide more accurate DNS responses based on the client’s network location.
How ECS Works
Traditional DNS Query: Without ECS, the DNS resolver only sends its own IP address to the authoritative DNS server. This means the authoritative server can only make resolution decisions based on the location of the resolver (usually a data center), which may lead to suboptimal results.
DNS Query with ECS Enabled: When ECS is enabled, the DNS resolver includes a part of the client’s IP address (subnet) in the DNS query. For example, if the client’s IP address is 203.0.113.45, the resolver might send 203.0.113.0/24 as ECS information.
Response from the Authoritative Server: Upon receiving a query with ECS information, the authoritative DNS server can use this information to select the most suitable IP address for the client. This typically means choosing a server geographically closest to the client.
Advantages of ECS
Faster Response Times: By directing the client to the nearest server, ECS can reduce latency and improve application response times.
Improved User Experience: Faster response times can lead to a smoother and more enjoyable online experience.
More Efficient CDN Usage: Content Delivery Networks (CDNs) can use ECS to direct users to the optimal content server, thereby increasing efficiency and reducing costs.
Bypassing Local Resolver Limitations: Some local network operators’ DNS servers may have issues, such as incorrect resolution or domain hijacking. Using ECS can bypass these limitations and obtain more accurate resolution results.
Why Use ECS in AdGuard Private?
AdGuard Private, as a private DNS server, can be configured to use upstream DNS servers for domain resolution. When ECS is enabled, AdGuard Private can pass your client subnet information to the upstream server, thereby obtaining more accurate resolution results.
1.2.3 - DDNS Dynamic Resolution
Use Adguard Private for convenient DDNS dynamic resolution service
What is DDNS?
DDNS (Dynamic DNS) allows you to bind a fixed domain name to a dynamic IP address, suitable for home broadband users to access internal network devices such as NAS, smart home controllers, etc.
Features
Easy to Use: Only one script is needed for automatic updates
No Additional Cost: No need to purchase a domain name
High Reliability: Relies on Adguard Private’s DNS infrastructure
Quick Effect: DNS records take effect immediately after update, no need to wait for DNS propagation
Adguard Private service address, like: https://xxxxxxxx.adguardprivate.com
Administrator username and password
The domain name to be resolved, like: nas.home
2. Deploy the Update Script
The following script will automatically update the resolution address of the specified domain.
Windows PowerShell
# Download the scriptInvoke-WebRequest-Urihttps://www.adguardprivate.com/docs/startup/private/tutorial/ddns/update_dns.ps1-OutFileupdate_dns.ps1# Set execution policy (optional, only for the current session)Set-ExecutionPolicy-ExecutionPolicyUnrestricted-ScopeProcess# Execute the script.\update_dns.ps1https://xxxxxxxx.adguardprivate.comadmin:password123nas.home
Linux && MacOS
# Download the scriptwget https://www.adguardprivate.com/docs/startup/private/tutorial/ddns/update_dns.sh -O update_dns.sh
# Add execution permissionchmod +x update_dns.sh
# Execute the script./update_dns.sh https://xxxxxxxx.adguardprivate.com admin:password123 nas.home
Frequently Asked Questions
How to Verify if it’s Effective?
You can check if the resolution correctly points to your current IP address using the ping your-domain.name command.
Or log into the service backend and check the Filter -> DNS Rewrite records.
How to Set Up Scheduled Updates?
Windows Scheduled Task
Open Task Scheduler
Create a basic task
Set the run frequency (recommended 15-30 minutes)
Choose PowerShell as the program location, and enter the full command of the script as the argument
Linux Cron Task
Add the following to crontab (execute every 15 minutes):
Please keep your username and password safe to avoid leaks
It is recommended to add the update script to the system’s scheduled tasks for automatic execution
If the resolution does not take effect promptly, please check the network connection and the validity of the credentials
1.2.4 - DNS Split Configuration Guide
A detailed guide on how to optimize network access experience through DNS split configuration, including domestic and international DNS server setup guides and split rule settings.
DNS Split Overview
DNS split can significantly enhance the network access experience by distributing resolution requests for different domain names to different DNS servers. A reasonable DNS split configuration can:
Speed up domain name resolution
Improve website access stability
Optimize cross-border access experience
Avoid DNS pollution issues
Adguard Private Split Configuration
Basic Configuration Example
# Domestic DNS server223.5.5.5 # Ali DNS2400:3200::1 # Ali DNS IPv6public0.adguardprivate.svc.cluster.local # Private DNS, mainland upstream# International DNS servertls://1.0.0.1 # Cloudflare DNStls://[2606:4700:4700::1001] # Cloudflare DNS IPv6public2.adguardprivate.svc.cluster.local # Private DNS, other upstream# Split rule example[/google.com/bing.com/github.com/stackoverflow.com/]tls://1.0.0.1 public2.adguardprivate.svc.cluster.local[/cn/xhscdn.com/tencentclb.com/tencent-cloud.net/aliyun.com/alicdn.com/]223.5.5.5 2400:3200::1 public0.adguardprivate.svc.cluster.local
List of Domestic ISP DNS Servers
Telecom DNS Servers
Name
Primary DNS Server
Secondary DNS Server
Anhui Telecom
61.132.163.68
202.102.213.68
Beijing Telecom
219.142.76.3
219.141.140.10
Chongqing Telecom
61.128.192.68
61.128.128.68
Fujian Telecom
218.85.152.99
218.85.157.99
Gansu Telecom
202.100.64.68
61.178.0.93
Guangdong Telecom
202.96.128.86
202.96.128.166
Guangxi Telecom
202.103.225.68
202.103.224.68
Guizhou Telecom
202.98.192.67
202.98.198.167
Henan Telecom
222.88.88.88
222.85.85.85
Heilongjiang Telecom
219.147.198.230
219.147.198.242
Hubei Telecom
202.103.24.68
202.103.0.68
Hunan Telecom
222.246.129.80
59.51.78.211
Jiangsu Telecom
218.2.2.2
218.4.4.4
Jiangxi Telecom
202.101.224.69
202.101.226.68
Inner Mongolia Telecom
219.148.162.31
222.74.39.50
Shandong Telecom
219.146.1.66
219.147.1.66
Shaanxi Telecom
218.30.19.40
61.134.1.4
Shanghai Telecom
202.96.209.133
116.228.111.118
Sichuan Telecom
61.139.2.69
218.6.200.139
Tianjin Telecom
219.150.32.132
219.146.0.132
Yunnan Telecom
222.172.200.68
61.166.150.123
Zhejiang Telecom
202.101.172.35
61.153.177.196
Tibet Telecom
202.98.224.68
202.98.224.69
Unicom DNS Servers
Name
Primary DNS Server
Secondary DNS Server
Beijing Unicom
123.123.123.123
123.123.123.124
Chongqing Unicom
221.5.203.98
221.7.92.98
Guangdong Unicom
210.21.196.6
221.5.88.88
Hebei Unicom
202.99.160.68
202.99.166.4
Henan Unicom
202.102.224.68
202.102.227.68
Heilongjiang Unicom
202.97.224.69
202.97.224.68
Jilin Unicom
202.98.0.68
202.98.5.68
Jiangsu Unicom
221.6.4.66
221.6.4.67
Inner Mongolia Unicom
202.99.224.68
202.99.224.8
Shandong Unicom
202.102.128.68
202.102.152.3
Shanxi Unicom
202.99.192.66
202.99.192.68
Shaanxi Unicom
221.11.1.67
221.11.1.68
Shanghai Unicom
210.22.70.3
210.22.84.3
Sichuan Unicom
119.6.6.6
124.161.87.155
Tianjin Unicom
202.99.104.68
202.99.96.68
Zhejiang Unicom
221.12.1.227
221.12.33.227
Liaoning Unicom
202.96.69.38
202.96.64.68
National Mobile DNS IP
Name
Primary DNS Server
Secondary DNS Server
Beijing Mobile
221.130.33.60
221.130.33.52
Guangdong Mobile
211.136.192.6
211.139.136.68
Jiangsu Mobile
221.131.143.69
112.4.0.55
Anhui Mobile
211.138.180.2
211.138.180.3
Shandong Mobile
218.201.96.130
211.137.191.26
Public DNS IP
Name
Primary DNS Server
Secondary DNS Server
114 DNS
114.114.114.114
114.114.115.115
CNNIC SDNS
1.2.4.8
210.2.4.8
Aliyun Public DNS
223.5.5.5
223.6.6.6
DNSPod DNS+
119.29.29.29
119.29.29.29
Google DNS
8.8.8.8
8.8.4.4
Configuration Recommendations
Prioritize nearby DNS servers
Configure both IPv4 and IPv6 DNS
Set up backup DNS for important domains
Regularly update split rules
Monitor DNS response time
Precautions
Record original DNS settings before configuration
Avoid using untrusted DNS servers
Regularly check if DNS resolution is normal
Keep the rule list concise and effective
By reasonably configuring DNS split, you can significantly enhance the network access experience. It is recommended to choose appropriate DNS servers and split rules based on actual needs.
If you directly use the service’s listening address, such as:
tls://xxxxxxxx.adguardprivate.com
https://xxxxxxxx.adguardprivate.com/dns-query
The IP shown in the Client Rankings in the backend will be the cluster IP of the load balancer, which is meaningless to users and does not distinguish between different devices.
You can identify different devices by using extended domain names and adding URL paths.
DoT uses the extended domain name method, such as tls://device1.xxxxxxxx.adguardprivate.com
DoH uses the method of adding a URL path, such as https://xxxxxxxx.adguardprivate.com/dns-query/device2
Note:
When setting up on Android devices, you do not need to enter the protocol prefix tls://, just enter device1.xxxxxxxx.adguardprivate.com
For Apple devices, enter the client ID in the setup guide, download the configuration file to set up, no manual input is required
All devices of a personal service share the service’s query limit of 30 requests per second.
1.2.6 - Faster Request Response
Paid users using AdGuard’s private service have the following DNS request path:
Based on the path, the fastest response scheme can be analyzed.
Local Cache Hit
The fastest response is a local cache hit. Since the local cache is at the memory level, it is very fast, taking only a few microseconds.
This is controlled by the TTL (time to live) value of the DNS response, typically ranging from a few minutes to several hours, indicating that the query result is valid during this time and does not need to be queried again.
You can set the minimum TTL value in Control Panel -> Settings -> DNS Settings -> DNS Cache Configuration -> Override Minimum TTL Value. Increasing this value extends the cache time, allowing the system to use the local cache more often. The typical TTL value is 600 seconds.
However, since this site also has filtering capabilities, if the service you need is mistakenly blocked by ad rules, you won’t be able to access it immediately even if you temporarily disable encrypted DNS, because the local cache result has been modified by the filtering rules. Therefore, setting it to 60 seconds is a safer value, ensuring that in rare cases, users won’t have to wait too long after disabling encrypted DNS due to misblocking.
AdGuard DNS Server
Currently, this site uses Alibaba Cloud servers located in Hangzhou, which can meet the low-latency needs of most users in the eastern region. As the business grows, servers will be added across the country in the future.
Server Cache Hit
By default, 4MB of DNS cache is set for each user, which is sufficient for a household based on experience. Freely modifying this setting may lead to forced termination of user services, and this site has blocked the modification entry for this setting.
Upstream DNS Server
Due to the use of Alibaba Cloud services, the upstream DNS service also uses Alibaba Cloud’s DNS service, which is very fast, typically returning results within a few milliseconds.
Users have three ways to request the upstream DNS server:
Load Balancing: This site uses load balancing by default, automatically selecting the fastest server to return results.
Parallel Requests: This site currently does not restrict the use of parallel requests.
Fastest IP Address: This setting is currently meaningless, and this site has blocked the modification entry for this setting.
Here’s why the Fastest IP Address is meaningless: the fastest IP needs to be chosen by the device actually accessing the service. When the AdGuard service runs in Hangzhou and the user is in Beijing, AdGuard will think the IP address in Hangzhou is the fastest, but in reality, the user’s access to services in Beijing is the fastest. Choosing the Hangzhou IP address would actually increase latency. Therefore, this site has blocked the modification entry for this setting. This setting might be useful in a user’s home network but is meaningless in public services.
Many factors affect network experience, such as server bandwidth, network congestion, server load, and network quality. Choosing the fastest IP address does not guarantee the fastest response speed; latency is just one factor, not the only one. To prevent users from setting it incorrectly and causing a decline in service quality, this site has blocked the modification entry for this setting.
Rule Filtering
The most commonly used mode is the blacklist list, from which users can choose. The blacklist hit uses a hash algorithm, so regardless of the number of rules, the hit time is O(1), and users do not need to worry about the hit time being too long due to a large number of rules.
However, after rule calculation, they are stored in memory, with each user’s service memory usage limited to within 300MB, which can meet the needs of most users. If a user has too many rules, it may lead to insufficient memory, causing the service to restart repeatedly and resulting in service interruption.
This site has temporarily blocked the use of third-party rules to avoid users introducing too many rules. In the future, with better restriction methods, the use of third-party rules will be reopened.
Summary
To achieve faster request responses, users can:
Appropriately increase the minimum TTL value to increase the local cache hit rate.
Set an appropriate DNS cache size (pre-set value).
Choose to create a service in the geographically closest city (awaiting business development).
Choose load balancing for no overseas needs; choose parallel requests for overseas needs.
Use a blacklist rule that suits you, avoiding introducing too many rules.
1.2.7 - Setting Up Trusted Service Providers
When creating a paid service, the default setting uses faster domestic upstream services, including Ali’s IPv4 and IPv6 as well as DoT services.
Some service providers may have issues with incorrect DNS resolution, directing some overseas websites to the wrong IP addresses, resulting in inaccessibility. A common symptom is a certificate error in the browser.
To avoid resolution errors, you can switch to an upstream service provider like Cloudflare. When using such services, ensure you are using the DoH or DoT protocol to prevent hijacking.
Additionally, you need to disable domestic upstream services, as they are closer and faster, and AdGuard will prioritize them.
To disable an upstream service, simply add a # before the corresponding service IP.
After setting up, you need to test the upstream to ensure the upstream server is available, and then apply the changes.
However, using only overseas services can degrade the access experience for domestic apps, as these apps typically route overseas resolutions to specific external servers, resulting in slower domestic access speeds.
If you only need to avoid resolution errors for commonly used services, you can manually specify a specific resolution address for the domains that are incorrectly resolved, while still using the default domestic upstream services for unspecified domains.
In the AdGuard console, go to Settings -> DNS Settings -> Upstream DNS Servers, and add the domains that are incorrectly resolved in the format [/example1.com/example2.com/]tls://1.0.0.1 to Custom DNS Servers, then click Save Settings.
public2.adguardprivate.svc.cluster.local is our internally provided resolution service that avoids resolution errors, with the upstream set to Cloudflare. Compared to users manually specifying an overseas upstream, it offers faster resolution speeds, at the cost of a slight delay when updating domain resolutions. If you do not have specialized needs, you can use our provided resolution service that avoids errors.
If you need to use external resolution addresses from Cloudflare or Google, you must specify the IP using DoT/DoH. Here are some examples:
The addresses commented with # are currently blocked by the firewall and temporarily unusable.
Our site fully supports IPv6, which is one of our advantages, allowing the use of IPv6 addresses for upstream services to achieve more stable resolution speeds.
1.3 - Privacy Policy
AdGuard Private Service Privacy Policy
AdGuard Private does not collect any information from paying users.
AdGuard Private does not share any information of paying users with third parties.
AdGuard Private uses randomly generated usernames and passwords to provide services, with only the payment order number linked to the username, and the payment order number does not involve personal information.
When initiating consultations via WeChat and email, AdGuard Private will be aware of contact details such as WeChat ID or email address.
Contact details are used only for service inquiries, and AdGuard Private will not proactively send any promotional information to the obtained contact details.
AdGuard Private uses tools like Google Analytics for website traffic statistics, but does not collect any personal information.
AdGuard Private, when troubleshooting user issues, will review the service operation logs of the user’s private service, but will not collect any personal information.
2 - Feature Description
AdGuard Private - Professional Ad Blocking and Privacy Protection Solution
Product Overview
AdGuard Private is a powerful network ad blocking tool focused on providing comprehensive network privacy protection and content filtering services. Through advanced filtering technology, it helps users achieve a safer, faster, and cleaner browsing experience.
Core Features
Intelligent Encryption Service
Supports DoT/DoH encryption protocols
High-performance domain name resolution
Intelligent caching mechanism
Comprehensive Ad Blocking
Precise ad identification
Pop-up and tracker blocking
Custom filtering rules
Privacy Protection
Encrypted queries
Log recording options
Anti-tracking protection
Advanced Features
Real-time statistical analysis
Parental control
Schedule settings
Blacklist and whitelist management
Custom rewriting
Please refer to the table of contents on the left for detailed descriptions of each feature.
2.1 - Web Ad Blocking
AdGuardPrivate effectively blocks web ads through intelligent analysis and filtering technology, providing a cleaner browsing experience. It not only significantly improves page load times but also reduces bandwidth consumption and protects your online privacy.
Basic Principles of Ad Blocking
AdGuardPrivate’s private service uses DNS filtering technology to monitor and analyze network requests in real time. When an ad-related domain request is detected, the system automatically returns an empty address or a local loopback address, effectively blocking the loading of ad content. This method is both efficient and transparent to the user, without affecting the normal browsing experience.
Intelligent Blacklist System
AdGuard employs a multi-tiered blacklist management mechanism:
Automatic Updates: The system periodically retrieves the latest list of ad domains from trusted sources.
Categorized Management: Categorized by ads, trackers, malware, etc.
Performance Optimization: Uses efficient matching algorithms to ensure quick responses.
Statistical Analysis: Provides detailed interception statistics to help you understand the effectiveness of the protection.
Flexible Whitelist Control
The whitelist feature provides precise access control:
Access Protection: Only allows access to trusted websites.
Scenario Customization: Suitable for parental controls and enterprise network management.
Simple Configuration: Supports import and export for easy management.
Real-time Effect: Changes take effect immediately, no need to restart the service.
Usage Recommendations
Start with the basic blacklist and adjust gradually.
Regularly check interception statistics to understand system performance.
Add to the whitelist promptly if there is a misblock.
Customize filtering rules for special needs.
Technical Details
DNS Filtering Mechanism
Uses efficient DNS response caching.
Supports dual-stack filtering for IPv4 and IPv6.
Millisecond-level local response speed.
Rule Matching
Precise domain name matching.
Supports wildcard rules.
Regular expression matching.
Performance Optimization
Memory-optimized data structures.
Concurrent request handling.
Intelligent caching mechanism.
2.2 - Mobile Ad Blocking
Effectively block ads in mobile systems and apps, enhancing device performance and user experience
Problem Overview
Many Android devices come pre-installed with adware, which can:
Display ads at inappropriate times
Continuously collect user data in the background
Consume system resources, leading to decreased device performance
Increase unnecessary network data usage
Significantly reduce battery life
AdGuard Solution
AdGuard’s private service protects your device by:
Intercepting network requests from adware
Preventing malicious tracking activities
Optimizing device performance
Extending battery life
Reducing mobile data usage
2.3 - Privacy Protection
Intercept privacy leak requests to protect user privacy.
The Relationship Between Privacy and Advertising
Advertisers’ revenue primarily comes from ad conversions. To increase conversion rates, platforms need to:
Increase user retention
Deliver personalized ads
This requires collecting a large amount of user privacy data. Platforms circumvent legal restrictions through the following methods:
Complex user agreements
Data exchange with partners
Disguised data anonymization
Priority of Privacy Protection
Privacy protection is more important than simply removing ads:
AdGuard’s Chinese region tracking interception rules (>400,000) far exceed ad rules (<100,000)
Some platforms have fewer ads but gain more revenue through privacy data
The “Thoughtfulness” Behind Platforms
So-called personalized recommendations are often not truly understanding user needs, but rather marketing strategies of the platforms:
“You like this” actually means “I want to sell this”
Behind seemingly thoughtful services is continuous data collection
How to Protect Yourself
Learn “cyber sophistication” — control privacy leaks and avoid being accurately profiled by platforms. AdGuard’s private service can help you achieve this goal.
2.4 - Malware Interception
Intercept malware through multi-layered protection mechanisms to safeguard devices and data
What is Malware?
Malware is a type of software designed to damage or gain unauthorized access to computer systems. It may:
Steal personal information and sensitive data
Disrupt system functionality and files
Encrypt data for ransom
Add devices to botnets
How Malware Spreads
Hackers typically spread malware through the following methods:
Disguised as legitimate software download links
Attachments in phishing emails
Websites with vulnerabilities
Infected advertisements
How AdGuard Protects You
AdGuard’s private service provides comprehensive malware protection:
Intercepts known malware download links
Blocks communication between malware and control servers
Identifies and prevents suspicious data leaks
Regularly updates the malware signature database
It is recommended that you also take other security measures, such as timely system and software updates, and cautious downloading and opening of attachments.
2.5 - Adult Content Blocking
AdGuard Private Service provides powerful adult content filtering capabilities, effectively protecting against inappropriate content through intelligent identification and interception mechanisms, creating a safe online environment for families and businesses.
Overview of Features
AdGuard Private Service employs a multi-layered content filtering mechanism that can effectively identify and intercept:
Pornographic and adult content websites
Violent content
Gambling-related websites
Other harmful information
How It Works
The system achieves content interception through the following methods:
DNS-level Interception: Blocks domain name resolution of known harmful websites
Intelligent Categorization: Based on a classification system from multiple trusted data sources
Real-time Updates: Regularly updates interception rules to ensure protection effectiveness
Custom Rules: Add specific websites to the interception list
Exception Management: Set a whitelist to avoid false positives
Access Logs: View interception records
Use Cases
Home Protection: Create a safe internet environment for minors
Corporate Management: Ensure employees access websites that meet work requirements
Public Places: Suitable for libraries, schools, and other public networks
Notes
It is recommended to use in conjunction with parental control features
Regularly check and update filtering rules
If false positives are found, add them to the whitelist promptly
In case of bypassing interception, submit feedback
2.6 - Social Network Interception
Protect your online privacy by intercepting social network trackers and embedded components
Risks of Social Network Tracking
Social network platforms collect user data in various ways:
Social plugins and share buttons
Embedded content and widgets
Third-party cookies and trackers
Cross-site user behavior analysis
How AdGuard Protects You
AdGuard’s private service protects your privacy in the following ways:
Intercepts social media trackers
Blocks unauthorized data collection
Filters social network ads
Prevents user profiling analysis
Recommended Usage
Enable social network filters
Regularly check interception logs
Set up a whitelist as needed
Keep filter rules updated
By following these measures, you can continue to use the core features of social networks while protecting yourself from unnecessary tracking and data collection.
2.7 - Phishing Website Interception
Intercept phishing website requests, protect users’ personal assets, and provide comprehensive network security protection.
What is a Phishing Website?
A phishing website is a fraudulent site that masquerades as a legitimate one to obtain users’ personal information, account passwords, and other sensitive data. These sites typically mimic:
Banks and payment platforms
Social networks
E-commerce websites
Government agency websites
Main Hazards
Stealing user accounts and passwords
Theft of bank card and payment information
Spreading malware
Causing personal privacy breaches
Resulting in financial losses
How AdGuard Protects You
AdGuard’s private service provides protection through the following methods:
Real-time checking of URL safety
Intercepting known phishing websites
Blocking malicious domain resolution
Providing safe browsing alerts
Safety Usage Recommendations
Enable AdGuard’s phishing protection feature
Pay attention to the authenticity of URL addresses
Do not click on links from unknown sources
Regularly update AdGuard’s rule database
2.8 - Tracking Interception
Intercept tracking requests to fully protect user privacy and enhance browsing experience.
What is Tracking?
Tracking is the act of websites and applications collecting user data. Common tracking methods include:
Cookie tracking
Web pixels (Tracking Pixels)
Browser fingerprinting
Device identifier collection
Behavioral analysis scripts
The Impact of Tracking
Tracking can have the following negative effects:
Infringement on user privacy, exposing personal behavior data
Increased network traffic consumption
Reduced device battery life
Impact on page load speed
How AdGuard Protects You
AdGuard’s private service comprehensively protects your privacy in the following ways:
Intelligent identification and interception of tracking requests
Blocking third-party cookies
Removing tracking parameters
Shielding common analytics scripts
By using AdGuard, you can enjoy a safer, faster, and more energy-efficient online experience.
2.9 - Malicious Traffic Interception
Prevent malicious traffic hijacking and content tampering through encrypted DNS and traffic protection, ensuring your network access is secure
Malicious Traffic Interception
Problem Background
During your daily internet use, you may encounter the following security risks:
With the custom parsing feature, you can configure friendly domain name access for LAN devices, simplifying network device management and enhancing the user experience.
Feature Introduction
Custom parsing allows you to:
Configure custom domain names for LAN devices
Implement private domain name resolution
Access intranet services securely and conveniently
Application Scenarios
Network Device Access
NAS device: nas.home → 192.168.1.100
Router: router.home → 192.168.1.1
Printer: printer.home → 192.168.1.200
Development and Testing Environment
Local service: api.local → 127.0.0.1
Testing environment: test.local → 192.168.1.50
Container: redis.local → 172.17.0.2
Configuration Instructions
Basic Syntax
Domain name Record type Target address
home A 192.168.1.2
*.home A 192.168.1.2
Supported Record Types
A record: IPv4 address resolution
AAAA record: IPv6 address resolution
CNAME record: Domain name alias
Security Features
Effective only on configured devices
Does not leak intranet IP addresses
Supports wildcard domain configuration
Takes effect in real-time, no restart required
Usage Recommendations
Choose intuitive domain name naming
Recommend using suffixes like .home
Record changes in intranet IP addresses
Regularly check parsing configurations
2.17 - Custom Intercept List
With the custom intercept list feature, you can precisely control network access, achieving personalized content filtering and ad blocking.
Function Overview
The custom intercept list provides:
Precise domain interception control
Flexible rule import and export
Real-time effective update mechanism
Convenient list management interface
Supported List Formats
Standard Format
||example.com^
||ads.example.com^
Mainstream Subscription Sources
AdGuard format
HOSTS format
Domain format
System Pre-installed Lists
We provide the following optimized lists:
Mobile Manufacturer Ad Blocking: Specifically targets ads from various brand mobile systems
General Ad Blocking: Covers common ad networks
Privacy Protection: Prevents trackers and data collection
Usage Recommendations
List Selection
Add lists from trusted sources
Avoid adding duplicate rules
Regularly update rule sources
Performance Optimization
Control the number of lists
Remove invalid rules
Monitor interception effects
Troubleshooting
Record interception logs
Verify rule syntax
Handle misinterceptions promptly
2.18 - Quick Response
Quick response requests to enhance network speed.
Quick Response
AdGuardPrivate private service uses a high-performance server cluster to provide users with an extremely fast network access experience. The following methods are used to achieve superior performance:
Optimized Network Architecture
Dedicated server deployment
Optimized network routing
Reduced intermediate nodes
Low-latency connections
Technical Advantages
High-performance caching system
Intelligent DNS resolution
Load balancing
Fast failover
Performance Improvement
Significantly reduced access latency
Increased webpage loading speed
Optimized DNS query time
Enhanced overall browsing experience
2.19 - Setting Internet Access Schedules
Set and manage internet access times for family members using AdGuard Private Service
Feature Introduction
AdGuard Private Service provides flexible internet access schedule management, helping parents better manage their children’s internet time. You can set independent internet rules for different devices, ensuring healthy internet use for your family.
Setup Method
Log in to the AdGuard Private Service management interface
Go to Filters -> Blocked Services
Click on the “Internet Access Schedule” option
Set the time periods for allowed or prohibited internet access
Usage Recommendations
Set internet access times that align with school schedules for school-age children
You can set different strategies for weekdays and weekends
It is recommended to set a uniform bedtime restriction period
Notes
Changes to settings take effect immediately
Time period settings can be adjusted at any time
Supports temporary lifting of restrictions
3 - Cyber City Mansion
3.1 - How to Prevent Personal Information Leaks and "Doxxing" Risks
This article aims to provide practical guidelines on how to prevent personal information leaks and address “doxxing” risks, helping you enhance your cybersecurity awareness and protect your personal privacy.
Beware of Risks from Piecing Together Fragmented Information
In the internet era, personal information exists in fragmented forms across various platforms and services. Many people believe that leaking bits of information is inconsequential. However, the online environment is not absolutely safe, and individuals with malicious intent can collect and integrate these fragmented pieces to create a complete personal profile. Even the simplest search engine can be used for information gathering.
Taking a certain social platform as an example, while users share snippets of their lives, they may inadvertently expose personal information. For instance, some users enjoy publicly discussing the meaning and usage scenarios of passwords, which undoubtedly increases the risk of password cracking.
The principles of social engineering tell us that meaningful strings often appear repeatedly in multiple places. A unique username or an easily remembered password is likely to be reused by users across different platforms, becoming a common pathway for internet information leaks.
Reduce Account Association to Protect Personal Identity
For the average internet user, if there is no need to build a personal brand, it is recommended to use randomly generated usernames and passwords to minimize the association between accounts on different platforms.
It should be noted that using different account passwords alone is not enough to completely eliminate account association. If similar or identical content is posted across different platform accounts, it may still be possible to identify the association.
Common Types of Sensitive Information
Here are some common types of sensitive information that require special attention to protect:
Passwords
Usernames
Profile pictures
Birthdays
Addresses
Phone numbers
Email addresses
QQ numbers
WeChat IDs
Personal websites
Geographic locations
Photos
Some criminals use “social engineering databases” to integrate personal information leaked from different channels. For example, if information leaked from two different platforms contains the same phone number, it can be highly suspected that these two pieces of information belong to the same person.
Even if usernames and photo styles from different platforms are vastly different, they may still be linked through social engineering databases, ultimately forming a complete personal information file.
This is not an exaggeration but a common application scenario of social engineering databases. The threshold for using social engineering databases for information collection and “doxxing” is not high, and even minors can easily master it.
Enhance Cybersecurity Awareness to Protect Personal Privacy
While the internet brings people closer together, it can also exacerbate the distance between them. Social platforms provide a space for communication but may also make people feel more isolated.
In the online world, we yearn to express ourselves and find resonance, but we also need to remain vigilant and protect our personal privacy.
When interacting with strangers online, there is no need to disclose personal information in detail. Be cautious in speech and action, maintain restraint, enjoy solitude, and improve oneself to navigate the online world with ease.
Recommendations:
Regularly check and update your passwords to ensure they are strong enough.
Avoid using the same account passwords across different platforms.
Be cautious when sharing photos and updates that contain personal information.
Use tools like AdGuardPrivate to protect your DNS queries and prevent DNS leaks.
Stay informed about the latest cybersecurity trends and promptly learn about new threats and prevention methods.
3.2 - Guide to Protecting Personal Online Privacy
Introduces how to protect personal privacy in daily online activities, reduce digital footprints, avoid personalized ad tracking, and prevent privacy information leaks.
Why Protect Online Privacy?
In the digital age, every online activity can leave a trace:
Browsing history is tracked
Personal preferences are analyzed
Location information is collected
Social relationships are mapped
Basic Protection Measures
1. Browser Configuration
Use private browsing mode
Disable third-party cookies
Enable “Do Not Track” feature
Regularly clear browsing data
2. Search Engine Selection
Use anonymous search engines (like DuckDuckGo)
Avoid searching sensitive content while logged in
Use multiple search engines for cross-verification
3. DNS Encryption Protection
Enable DNS-over-HTTPS
Use private DNS services
Avoid default DNS servers
Advanced Protection Strategies
1. Network Access Protection
Use trusted services
Enable HTTPS-Only mode
Avoid using public Wi-Fi
2. Ad Tracking Protection
Install ad blockers
Use content filters
Turn off personalized ad options
3. Social Media Privacy
Review privacy settings
Limit sharing of personal information
Turn off location services
Be cautious with third-party logins
Daily Use Recommendations
Reduce Digital Footprint
Use temporary email services
Avoid registering with real names
Use different passwords on different platforms
Regularly check authorized applications
Prevent Privacy Leaks
Use password managers
Enable two-factor authentication
Encrypt important files
Be cautious when installing new apps
Precautions
Use privacy protection tools reasonably
Comply with local laws and regulations
Keep software updated
Cultivate privacy protection awareness
Complete anonymity is difficult to achieve, but these measures can significantly enhance personal privacy protection. Choose the protection measures that suit you, finding a balance between convenience and security.
3.3 - Guidelines for Protecting Adolescents' Online Safety
Create a healthy online environment for adolescents through intelligent management and safety protection, helping them develop good internet habits.
Challenges in the Online Environment for Modern Adolescents
In the digital age, adolescents face unprecedented online challenges:
Vast amounts of information of varying quality
Limited ability to identify online risks
Easily attracted to harmful content
Lack of self-management awareness
Intelligent Protection Solutions
1. Application Access Management
Features:
Precise control over accessible applications
Prevent installation of inappropriate software
Protect personal information security
2. Time Management System
Functions:
Set reasonable usage periods
Prevent internet addiction
Foster good sleep habits
3. Behavior Monitoring and Guidance
Access Record Analysis
Uses:
Understand online behavior patterns
Timely identify potential risks
Provide targeted guidance and communication
Intelligent Interception Settings
Customizable:
Content rating filtering
Personalized protection rules
Dynamic adjustment of strategies
Parental Guidance Suggestions
Beyond protective measures, good family education is even more important:
Have open conversations with children about internet use
Cultivate independent thinking and judgment skills
Establish a trusting communication mechanism
Gradually relax controls
Technological means are auxiliary tools; education and guidance are fundamental. Use control tools appropriately while focusing on cultivating adolescents’ internet literacy and self-management abilities.
3.4 - Protecting Seniors from Online Scams
A cybersecurity guide for seniors, effectively preventing online scams through private services and AdGuard protection.
Online Risks Faced by Seniors
In today’s society, seniors are facing increasingly serious cybersecurity threats. The following characteristics make them a high-risk group for online scams:
Not proficient in operating smartphones
Lack of awareness and prevention of online scams
Less exposure to cybersecurity-related information
Easily trust unverified software download links
Technical Protection Solutions
AdGuard Security Protection
AdGuard provides professional malware interception functionality:

This solution has the following advantages:
Runs in the cloud, no need to install additional applications
Zero system resource consumption
Simple configuration and not easily misoperated
Automatic continuous protection
Practical Effects
After a year of practice, we have observed significant improvements:
Significantly reduced requests for “phone cleaning” assistance
Enhanced daily usage experience
Reduced phone usage frustrations
Comprehensive Protection Strategy
While technical measures are important, comprehensive protection also requires:
Regular companionship and communication to understand usage difficulties
Staying vigilant and promptly identifying potential threats
Technology is a tool, but care is the foundation. Regular companionship and patient guidance are the best ways to protect seniors from online risks.
3.5 - How to Deal with Corporate Network Monitoring
As technology advances, corporate network monitoring has shifted from traditional physical monitoring to digital monitoring. This article explores common network monitoring methods used by modern enterprises and provides legal privacy protection advice.
The Evolution of Corporate Network Monitoring
The monitoring methods of modern enterprises have shifted from traditional physical monitoring (such as cameras, on-site inspections, etc.) to more sophisticated digital monitoring systems. This transition makes monitoring more covert and cost-effective.
Common Network Monitoring Methods
One of the core methods of corporate network monitoring is tracking through DNS servers. The specific implementation methods include:
Deploying dedicated DNS servers within the corporate network
Forcing the use of corporate DNS through DHCP services
Establishing a correspondence between IP addresses and workstations
The Technical Principles of Monitoring
Even today, with the widespread use of HTTPS, DNS queries are still transmitted in plain text. This means:
All domain name resolution requests will be recorded
Although the specific content accessed cannot be seen, the domain names of the websites visited can be known
Combined with timestamps, employee internet behavior patterns can be analyzed
Solutions for Protecting Personal Privacy
To reasonably protect personal privacy, consider the following solutions:
Use personal mobile networks
Configure private DNS services
Use secure VPN services
Please note: When taking any privacy protection measures, one should comply with relevant laws and regulations and corporate policies.
4 - Basic Tutorial
Understand network basics through vivid metaphors
📚 Reading Guide
To make network knowledge easier to understand, this tutorial will use a lot of metaphors and analogies from everyday life.
Our goal is to make it easy for everyone to grasp the basics of networking, regardless of technical background.
While these metaphors may not be precise, they will help you quickly establish a basic understanding of network concepts.
Introduction to Network Basics
In this tutorial, we will explain the basics of networking through vivid metaphors and analogies. Our goal is to make it easy for everyone to grasp these concepts, regardless of technical background. While these metaphors may not be precise, they will help you quickly establish a basic understanding of network concepts.
Unlike rigorous technical terms, this section will use a lot of colloquial expressions to help non-professionals understand the basic concepts of networking.
We will use a lot of appropriate or inappropriate metaphors and analogies with the aim of helping readers quickly understand the basic concepts of networking.
4.1 - What is DNS
DNS (Domain Name System) is one of the infrastructures of the internet. This article introduces the basic concepts and working principles of DNS.
Essentially, the DNS service is like a Xinhua dictionary. By querying the dictionary, we can find the IP address corresponding to a domain name.
Introduction to DNS
DNS (Domain Name System) is one of the infrastructures of the internet, like a Xinhua dictionary, responsible for converting human-readable domain names into computer-understandable IP addresses.
How DNS Works
When you enter a URL in your browser:
The browser first checks the local cache
If not found, it sends a query to the DNS server
The DNS server returns the corresponding IP address
The browser uses this IP address to access the target website
Key Concepts
Domain Name: The readable address of a website, such as www.adguardprivate.com
URL (Uniform Resource Locator): The complete web address, including protocol, domain name, and path, such as https://www.adguardprivate.com
IP Address: The numerical identifier of a network device, such as 1.1.1.1
DNS Server: A computer that provides domain name resolution services
Website Hosting: Storing website files on a server to make them accessible via the internet
4.2 - Basic Principles of AdGuardPrivate Protection
AdGuardPrivate can effectively block ads, trackers, and malicious websites through DNS-level interception
Overview of How It Works
AdGuardPrivate protects your network security and privacy through DNS-level interception. It acts like an intelligent gatekeeper, screening all domain requests:
✅ Safe websites: Normal access
❌ Ad domains: Blocked
❌ Trackers: Blocked
❌ Malicious websites: Blocked
Interception Process Diagram
Key Features
DNS-level Interception: Intercepts before the request occurs, more efficient
No Need for Plugins: Network-level protection, effective for all devices
Low Resource Consumption: Only processes DNS requests, minimal impact on device performance
Coverage for All Devices: One configuration protects all connected devices
5 - Frequently Asked Questions
Thank you for choosing AdGuard Private! We are always committed to providing you with the best service:
Feel free to provide us with your usage experience and suggestions at any time
We prioritize privacy protection
No registration required, no collection of phone numbers or email addresses
No marketing interruptions of any kind
Need Help
Send an email
service1@adguardprivate.com Please describe the issue you are experiencing in detail, and we will respond as soon as possible.
5.1 - How to Purchase and Use
Purchase and Use
5.2 - iOS Device Restore Settings
This article explains how to restore DNS settings on an iOS device
If you encounter misinterception issues on your iOS device, you can restore the original DNS settings using the following two methods.
Method One: Temporarily Disable DNS Encryption
This method is suitable for temporarily testing whether the issue is caused by DNS settings:
Open the Settings app
Go to General > VPN & Device Management
Find the DNS option under the Access Restrictions and Proxy section
Select Automatic to temporarily restore the system default settings
Method Two: Completely Remove Configuration
To completely remove DNS encryption settings:
Open the Settings app
Go to General > VPN & Device Management
Find public.adguardprivate.com DoT under Configuration Profiles
Click Remove Profile and confirm
If you decide to permanently stop using AdGuard Private, it must be because our service has caused you a bad experience, and we are very sorry for the inconvenience caused.
The public service uses popular interception rules, and due to limited manpower, we cannot be aware of all app misinterceptions or missed interceptions.
If you wish to customize rules to meet personalized needs, you can consider purchasing private services, which offer dedicated services at a very high cost-performance ratio to meet various needs.
Configuration Demonstration
5.3 - How to Handle False Interceptions
This guide explains how to handle false interceptions, including temporarily disabling protection, adding services to a whitelist, and temporarily disabling services.
Some services are considered necessary by some users but viewed as personal data collection or advertising by others. For example, within WeChat and Alipay, some mini-programs that mix services and advertisements may not function properly, and payment redirections such as those for parking lots or vending machines may not work correctly.
If the interception rules are set too strictly, these services may be blocked, causing service malfunctions.
Temporarily Disable Protection
If you need an urgent, temporary solution, you can resolve it by temporarily disabling protection. It usually takes effect within 10 seconds.
Add Services to the Whitelist
For services that you use long-term, you can add them to the whitelist to prevent them from being intercepted again. It usually takes effect within 10 seconds.
Temporarily Disable Settings
Public service users can resolve the issue by temporarily disabling the service. It usually takes effect within 60 seconds.
5.4 - After-Sales Service Guide
Learn about the after-sales support methods for AdGuard Private Service, including technical consultation, troubleshooting, and other service contents.
Service Features
We adopt a no-registration design to protect user privacy:
No need for users to register an account
No collection of personal information
Service voucher obtained immediately after payment
This article discusses the issue of inaccessibility when using mini programs and provides three solutions, temporarily disabling protection, adding the service to a whitelist, and temporarily disabling settings.
If the interception rules are set too strictly, they may block some normal services, causing service operation abnormalities.
Temporarily Disable Protection
If you need an urgent, temporary solution, you can resolve it by temporarily disabling protection. It usually takes effect within 10 seconds.
Add Service to Whitelist
For services that are used long-term, you can add the service to a whitelist to prevent it from being blocked again. It usually takes effect within 10 seconds.
Temporarily Disable Settings
Public service users can resolve the issue by temporarily disabling the service. It usually takes effect within 60 seconds.
5.6 - Slow Access to Some Websites
Analysis of the reasons for slow access to some websites when using AdGuardPrivate DNS, and solutions, mainly involving issues with the support of ECS (Extended Client Subnet) functionality
Slow Access to Some Video Websites
If you find that accessing certain websites is slow when using AdGuardPrivate, it may be due to the following reasons:
ECS Support:
The free version of AdGuardPrivate does not support ECS (Extended Client Subnet) functionality. ECS is a DNS protocol extension that allows DNS servers to provide more accurate DNS responses based on the client’s network location. Many CDNs (Content Delivery Networks) use ECS to direct users to the nearest server, thereby improving speed. The free version servers are located in Shanghai and Hangzhou.
Impact:
Slower Speed: Without ECS, AdGuardPrivate may not be able to direct you to the optimal CDN server, resulting in slower speeds.
Inaccurate Geographic Location: You may be directed to a server that is farther away from you, increasing latency.
Solutions:
Upgrade to the Paid Version: The paid version of AdGuardPrivate supports ECS functionality, which can resolve this issue and improve speed.
Use Other DNS Servers: You can try using other DNS servers that support ECS.