Network requirements for CleanBrowsing to work correctly. Use this guide if your firewall, ISP, or network configuration is preventing DNS traffic from reaching CleanBrowsing resolvers.
CleanBrowsing uses the following IP addresses and ports. Your firewall must allow outbound traffic to these destinations.
| Filter | Primary IP | Secondary IP |
|---|---|---|
| Family Filter | 185.228.168.168 |
185.228.169.168 |
| Adult Filter | 185.228.168.10 |
185.228.169.11 |
| Security Filter | 185.228.168.9 |
185.228.169.9 |
| Custom (Paid) | 185.228.168.168 |
185.228.169.168 |
Paid accounts use the same IPs as the Family Filter but are identified by your registered public IP address or DoH URL.
| Protocol | Port | Use |
|---|---|---|
| UDP | 53 | Standard DNS queries (plaintext) |
| TCP | 53 | DNS queries over TCP (large responses, zone transfers) |
| TCP | 853 | DNS-over-TLS (DoT) — encrypted DNS |
| TCP | 443 | DNS-over-HTTPS (DoH) — encrypted DNS |
Minimum requirement: UDP port 53 outbound to the CleanBrowsing IPs above. If your network supports encrypted DNS, ports 853 (DoT) or 443 (DoH) provide additional security.
Before making firewall changes, test whether your network can currently reach CleanBrowsing resolvers.
# Windows
nslookup cleanbrowsing.org 185.228.168.168
# macOS / Linux
dig @185.228.168.168 cleanbrowsing.org
If this returns a valid IP address, your network can reach CleanBrowsing — no firewall changes needed.
If this times out or returns no response, something is blocking the connection.
# Windows
tracert 185.228.168.168
# macOS / Linux
traceroute 185.228.168.168
The traceroute shows where packets stop. Look for:
Run our DNS Leak Test and share the results link with support. It captures your public IP, resolver information, and device type in one step.
Enterprise firewalls often restrict outbound DNS (port 53) to approved servers only. This is a security best practice but requires adding CleanBrowsing IPs to the allow list.
Create firewall rules that permit outbound traffic to:
185.228.168.0/24 and 185.228.169.0/24 (covers all CleanBrowsing resolvers)The exact steps vary by firewall vendor, but the concept is the same: add the CleanBrowsing IP ranges to your outbound DNS allow list.
Some ISPs transparently intercept all DNS traffic on port 53 and redirect it to their own resolvers, regardless of what DNS server you configure. This is called DNS hijacking or transparent DNS proxying.
# Query CleanBrowsing's debug record
# Windows
nslookup -type=TXT debug.test.cleanbrowsing.org 185.228.168.168
# macOS / Linux
dig TXT debug.test.cleanbrowsing.org @185.228.168.168
If the response does not mention CleanBrowsing (or returns your ISP's information), your DNS traffic is being intercepted.
family-filter-dns.cleanbrowsing.org (or the equivalent for your filter level).If you're using CleanBrowsing as an upstream forwarder (through Windows Server DNS, a firewall, Pi-hole, or another DNS appliance), additional considerations apply.
First, determine whether the issue is with CleanBrowsing or with your forwarder:
185.168 instead of 185.228If you're using the Windows Server DNS role as a forwarder:
185.228.168.168 and 185.228.169.168If port 53 is blocked by your ISP or firewall and you can't change the firewall rules, encrypted DNS provides an alternative path.
DoH sends DNS queries over HTTPS (port 443). Since this is the same port used for all web traffic, it's almost never blocked by firewalls or ISPs.
| Filter | DoH URL |
|---|---|
| Family | https://doh.cleanbrowsing.org/doh/family-filter/ |
| Adult | https://doh.cleanbrowsing.org/doh/adult-filter/ |
| Security | https://doh.cleanbrowsing.org/doh/security-filter/ |
For paid accounts, your custom DoH URL is available in your dashboard.
To configure DoH on Apple devices, use our Apple DNS Configurator to generate a .mobileconfig profile.
DoT uses port 853. It's supported natively on Android 9+ (Private DNS) and many routers.
| Filter | DoT Hostname |
|---|---|
| Family | family-filter-dns.cleanbrowsing.org |
| Adult | adult-filter-dns.cleanbrowsing.org |
| Security | security-filter-dns.cleanbrowsing.org |