Skip to main content
CleanBrowsing, NextDNS, AdGuard, OpenDNS

DNS Filtering for Families — CleanBrowsing, NextDNS, AdGuard, OpenDNS

How to set up family DNS filters on home routers or per device using CleanBrowsing Family, NextDNS, AdGuard DNS and OpenDNS Family Shield.

DNS filtering is a quiet, network-layer parental control that blocks domain lookups for harmful or adult sites before any device even tries to connect. Set on a home router, it covers every device on the network — phones, consoles, smart TVs, IoT gadgets — without installing anything on each device. Set on individual devices, it follows the child wherever they go. CleanBrowsing Family, NextDNS, AdGuard DNS and OpenDNS Family Shield are the four most widely used family DNS services. All have free tiers; NextDNS adds detailed logs and per-device profiles on a low-cost paid plan.

Recommended age: 0+

Main risks

  • DNS filters block sites but do not see inside encrypted apps (Discord, WhatsApp, etc) — they are not a complete safeguard
  • Devices that use DNS-over-HTTPS (DoH) — Chrome, Firefox, modern iOS — can bypass a router-level DNS unless DoH is also redirected
  • VPN apps tunnel around DNS filtering entirely
  • A misconfigured DNS can prevent legitimate services from working — test before relying on it

Initial setup steps

1

Choose your service and tier

For pure simplicity, OpenDNS Family Shield or CleanBrowsing Family Filter are free and require no signup — just two IP addresses. For per-device profiles and logs, set up a free NextDNS account at my.nextdns.io. AdGuard DNS offers similar features.

2

Apply at router level first

Log in to your router admin (commonly 192.168.1.1 or 192.168.0.1). Find DNS or DHCP settings. Enter the primary and secondary DNS for your chosen provider. Save and reboot the router.

3

Test that it is working

From a device on the home network, try to visit a known test page — OpenDNS provides internetbadguys.com as a safe test. It should be blocked. CleanBrowsing and AdGuard have similar test URLs.

4

Set per-device DNS for off-home protection

On a child's iPhone or Android, install the configuration profile from your DNS provider (NextDNS provides one-tap profiles). The filter then follows the device wherever it goes — home Wi-Fi, school Wi-Fi, mobile data.

Parental control settings

Router-level DNS

Location: Router admin > DHCP / DNS settings > Primary and Secondary DNS

Recommended: CleanBrowsing Family (185.228.168.168 / 185.228.169.168) or OpenDNS Family Shield (208.67.222.123 / 208.67.220.123)

Setting DNS at the router applies the filter to every device that uses the router for DNS — phones, consoles, smart TVs, even guests. It is the broadest single setting you can make on your home network.

Per-device DNS

Location: iOS: Settings > Wi-Fi > [network] > Configure DNS | Android: Settings > Network > Private DNS | macOS/Windows: Network adapter settings

Recommended: Configure on a child's phone and laptop so the filter follows the device off home Wi-Fi

iOS supports private DNS profiles from services like NextDNS that work everywhere — home, school Wi-Fi, mobile data. Android 9+ supports Private DNS (DNS-over-TLS) globally.

NextDNS profile

Location: my.nextdns.io

Recommended: Family profile with Threat Intelligence, Safe Search and Parental Controls categories enabled

NextDNS lets you mix-and-match: block categories (adult, gambling, gaming), force SafeSearch on Google/Bing/DuckDuckGo, restrict YouTube to Restricted Mode, and view a log of allowed and blocked requests.

Block DoH bypass

Location: Router/firewall rules — block outbound DNS-over-HTTPS to common providers

Recommended: Optional but recommended on networks with tech-savvy children

Modern browsers default to DoH, which bypasses router DNS. Blocking DoH endpoints forces all DNS through your filter. NextDNS and similar services include guidance on doing this.

Age recommendations

Ages 0-10

DNS filtering provides a strong baseline. Combine with on-device controls — DNS does not see inside apps, so social media risks still need app-level management.

Ages 11-13

DNS plus device controls plus mobile network content lock is the layered approach most safeguarding organisations recommend.

Ages 14-16

DNS continues to filter the obvious worst categories. Tech-aware teenagers may attempt to bypass via VPN; the right response is a conversation about trust and what is and is not appropriate, not a technical arms race.

Related device guides

Frequently Asked Questions

Related Resources

Explore more