Not fully blocking any more

I have a lot of block-lists, 539,196 domains,
I used to have no ad on IOS app, but recently I have some (Google ads) coming back for e.g on Speedtest app

it used to be block before so I'm guessing its could be a new domain used for ads or my system not using the good DNS. (I have a few AP but the primary DNS is set to Pi-pihole)

Also, I never been sure about the settings, I usually use my Pi Hole on the Network DNS settings (Modem + Router + AP) but internet settings have a different DNS option, I that ok to point to Pi Hole too or should you leave a external server e.g 1.1.1.1 or 8.8.8.8 ?

PS I noticed that when connecting to wifi with some device I have to manually enter a external DNS, if I leave the Pi Hole IP, the connection assistant won't let me save the settings (e.x for Samsung's TVs)

Block list
https://adblock.mahakala.is
https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
https://hosts-file.net/exp.txt
https://hosts-file.net/emd.txt
https://hosts-file.net/psh.txt
https://www.malwaredomainlist.com/hostslist/hosts.txt
https://v.firebog.net/hosts/Airelle-hrsk.txt
https://v.firebog.net/hosts/Shalla-mal.txt
https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
https://ransomwaretracker.abuse.ch/downloads/LY_C2_DOMBL.txt
https://ransomwaretracker.abuse.ch/downloads/CW_C2_DOMBL.txt
https://ransomwaretracker.abuse.ch/downloads/TC_C2_DOMBL.txt
https://ransomwaretracker.abuse.ch/downloads/TL_C2_DOMBL.txt
http://www.networksec.org/grabbho/block.txt
https://isc.sans.edu/feeds/suspiciousdomains_Medium.txt
http://someonewhocares.org/hosts/hosts
https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
http://www.joewein.net/dl/bl/dom-bl.txt
https://raw.githubusercontent.com/ZeroDot1/CoinBlockerLists/master/hosts
https://raw.githubusercontent.com/crazy-max/WindowsSpyBlocker/master/data/hosts/win10/spy.txt
https://v.firebog.net/hosts/static/SamsungSmart.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
https://v.firebog.net/hosts/Easyprivacy.txt
https://hosts-file.net/ad_servers.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
https://gist.githubusercontent.com/anudeepND/adac7982307fec6ee23605e281a57f1a/raw/5b8582b906a9497624c3f3187a49ebc23a9cf2fb/Test.txt
https://v.firebog.net/hosts/Easylist.txt
https://v.firebog.net/hosts/AdguardDNS.txt
https://blocklist.kowabit.de/list.txt
https://v.firebog.net/hosts/Airelle-hrsk.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_malvertising.txt
https://mirror1.malwaredomains.com/files/justdomains
https://hosts-file.net/exp.txt
https://hosts-file.net/emd.txt
https://hosts-file.net/psh.txt
https://mirror.cedia.org.ec/malwaredomains/immortal_domains.txt
https://www.malwaredomainlist.com/hostslist/hosts.txt
https://bitbucket.org/ethanr/dns-blacklists/raw/8575c9f96e5b4a1308f2f12394abd86d0927a4a0/bad_lists/Mandiant_APT1_Report_Appendix_D.txt
https://v.firebog.net/hosts/Prigent-Malware.txt
https://v.firebog.net/hosts/Prigent-Phishing.txt
https://raw.githubusercontent.com/quidsup/notrack/master/malicious-sites.txt
https://ransomwaretracker.abuse.ch/downloads/RW_DOMBL.txt
https://v.firebog.net/hosts/Shalla-mal.txt
https://raw.githubusercontent.com/StevenBlack/hosts/master/data/add.Risk/hosts
https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
https://mirror1.malwaredomains.com/files/justdomains
http://sysctl.org/cameleon/hosts
https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
http://v.firebog.net/hosts/Easylist.txt
https://gist.githubusercontent.com/elaur/a8f85175879562734946f9d00eee49aa/raw/65d001ab4f7b1c789c4ee066065ef0ef27eb3020/adlists.list
https://github.com/HenningVanRaumle/pihole-ytadblock
https://github.com/deathbybandaid/piadvanced/tree/master/piholetweaks/youtubeadblock
https://github.com/deathbybandaid/piadvanced/blob/master/piholetweaks/adguard.sh
https://github.com/deathbybandaid/piadvanced/blob/master/piholetweaks/parser.php
https://github.com/deathbybandaid/piadvanced/blob/master/piholetweaks/piholefreshlists.sh
https://raw.githubusercontent.com/deathbybandaid/wally3k-adlists.list/master/adlists.list
https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
http://sysctl.org/cameleon/hosts
https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
http://localhost/youtube-ads-list.txt
http://localhost/youtube-ads-list.txt
https://hosts-file.net/grm.txt

You are most likely seeing ads pop-up because they are coming from a host (new) not defined in your blocklist.

tail your pihole log and see where the requests are going and block that domain.

I had the same issue with my playstation.

The only way I was able to have the connection saved was to have the DNS server pushed by the DHCP server and not define it manually.

That might not work though if the TV in your case "calls home" for validation and the link/host that it uses when doing that, is in your block list.

Again, tailing your pihole log, should tell you what's going on (if that's the case).

Try pushing your DNS server from the DHCP server to the host and not define it manually... See if that works for you.

Thank you, make sense will try in a minute

This topic was automatically closed 21 days after the last reply. New replies are no longer allowed.