Pihole Block Wired but not wireless network

Expected Behaviour:

I would like to have blocked advertisements both on smartphone (WI-FI) and PC (Wired)

Actual Behaviour:

Actually I have on PC blocked pages but not all. Websites which has HTTPS are not blocked, and I can still see ad.
On smartphone (WiFi) i have advertisements on all pages. HTTPS and HTTP

Debug Token:

*** [ INITIALIZING ]
[i] 2018-01-01:23:30:06 debug log has been initiated.

*** [ INITIALIZING ] Sourcing setup variables
[i] Sourcing /etc/pihole/setupVars.conf...

*** [ DIAGNOSING ]: Core version
[i] Core: v3.2.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
[i] Branch: master
[i] Commit: v3.2.1-0-ge602008

*** [ DIAGNOSING ]: Web version
[i] Web: v3.2.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
[i] Branch: master
[i] Commit: v3.2.1-0-g31dddd8

*** [ DIAGNOSING ]: FTL version
[✓] FTL: v2.13.1

*** [ DIAGNOSING ]: dnsmasq version
[i] 2.76

*** [ DIAGNOSING ]: lighttpd version
[i] 1.4.45

*** [ DIAGNOSING ]: php version
[i] 7.0.19

*** [ DIAGNOSING ]: Operating system
[✓] Raspbian GNU/Linux 9 (stretch)

*** [ DIAGNOSING ]: SELinux
[i] SELinux not detected

*** [ DIAGNOSING ]: Processor
/opt/pihole/piholeDebug.sh: linia 474: $'[\E[32m✓\E[0m] \E[32marmv7l\E[0m': nie znaleziono polecenia

*** [ DIAGNOSING ]: Networking
[✓] IPv4 address(es) bound to the eth0 interface:
   192.168.0.110/24 matches the IP found in /etc/pihole/setupVars.conf

[✓] IPv6 address(es) bound to the eth0 interface:
   fe80::d65c:fe48:609e:a23c does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127)

   ^ Please note that you may have more than one IP address listed.
   As long as one of them is green, and it matches what is in /etc/pihole/setupVars.conf, there is no need for concern.

   The link to the FAQ is for an issue that sometimes occurs when the IPv6 address changes, which is why we check for it.

[i] Default IPv4 gateway: 192.168.0.1
   * Pinging 192.168.0.1...
[✓] Gateway responded.

*** [ DIAGNOSING ]: Ports in use
[53] is in use by dnsmasq
[7829] is in use by sshd
[80] is in use by lighttpd
[4711] is in use by pihole-FTL

*** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a known ad-serving domain
[✓] ads176.hpg.ig.com.br is 192.168.0.110 via localhost (127.0.0.1)
[✓] ads176.hpg.ig.com.br is 192.168.0.110 via Pi-hole (192.168.0.110)
[✓] doubleclick.com is 172.217.20.206 via a remote, public DNS server (8.8.8.8)

*** [ DIAGNOSING ]: Pi-hole processes
[✓] dnsmasq daemon is active
[✓] lighttpd daemon is active
[✓] pihole-FTL daemon is active

*** [ DIAGNOSING ]: Setup variables
    PIHOLE_INTERFACE=eth0
    IPV4_ADDRESS=192.168.0.110/24
    IPV6_ADDRESS=
    PIHOLE_DNS_1=8.8.8.8
    PIHOLE_DNS_2=8.8.4.4
    QUERY_LOGGING=true
    INSTALL_WEB=true
    LIGHTTPD_ENABLED=1
    API_EXCLUDE_DOMAINS=freedns.afraid.org,checkip.dyndns.org
    API_EXCLUDE_CLIENTS=127.0.0.1,localhost
    API_QUERY_LOG_SHOW=all
    API_PRIVACY_MODE=false

*** [ DIAGNOSING ]: Dashboard and block page
[✓] X-Pi-hole: A black hole for Internet advertisements.
[✓] X-Pi-hole: The Pi-hole Web interface is working!

*** [ DIAGNOSING ]: Gravity list
-rw-r--r-- 1 root root 3946910 sty  1 21:54 /etc/pihole/gravity.list
   -----head of gravity.list------
   192.168.0.110 0.0.0.0
   192.168.0.110 0000mps.webpreview.dsl.net
   192.168.0.110 0001.2waky.com
   192.168.0.110 000dom.revenuedirect.com

   -----tail of gravity.list------
   192.168.0.110 zzsyw.com
   192.168.0.110 zztxdown.com
   192.168.0.110 zzz.clickbank.net
   192.168.0.110 zz.zeroredirect1.com

*** [ DIAGNOSING ]: contents of /etc/pihole

-rw-r--r-- 1 root root 633 sty  1 21:54 /etc/pihole/adlists.default
   https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
   https://mirror1.malwaredomains.com/files/justdomains
   http://sysctl.org/cameleon/hosts
   https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
   https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
   https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
   https://hosts-file.net/ad_servers.txt

-rw-r--r-- 1 root root 633 sty  1 21:54 /etc/pihole/adlists.list
   https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
   https://mirror1.malwaredomains.com/files/justdomains
   http://sysctl.org/cameleon/hosts
   https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
   https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
   https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
   https://hosts-file.net/ad_servers.txt

-rw-r--r-- 1 root root 52 sty  1 21:54 /etc/pihole/local.list
   192.168.0.110 rpi3ch3atSHIELD
   192.168.0.110 pi.hole

-rw-r--r-- 1 root root 234 sty  1 21:52 /etc/pihole/logrotate
   /var/log/pihole.log {
        su root root
        daily
        copytruncate
        rotate 5
        compress
        delaycompress
        notifempty
        nomail
   }
   /var/log/pihole-FTL.log {
        su root root
        weekly
        copytruncate
        rotate 3
        compress
        delaycompress
        notifempty
        nomail
   }

-rw-r--r-- 1 root root 117 sty  1 21:54 /etc/pihole/whitelist.txt
   raw.githubusercontent.com
   mirror1.malwaredomains.com
   sysctl.org
   zeustracker.abuse.ch
   s3.amazonaws.com
   hosts-file.net

*** [ DIAGNOSING ]: contents of /etc/dnsmasq.d

-rw-r--r-- 1 root root 1502 sty  1 21:54 /etc/dnsmasq.d/01-pihole.conf
   addn-hosts=/etc/pihole/gravity.list
   addn-hosts=/etc/pihole/black.list
   addn-hosts=/etc/pihole/local.list
   localise-queries
   no-resolv
   cache-size=10000
   log-queries
   log-facility=/var/log/pihole.log
   local-ttl=2
   log-async
   server=8.8.8.8
   server=8.8.4.4
   interface=eth0

*** [ DIAGNOSING ]: contents of /etc/lighttpd

-rw-r--r-- 1 root root 3027 sty  1 21:52 /etc/lighttpd/lighttpd.conf
   server.modules = (
        "mod_access",
        "mod_accesslog",
        "mod_auth",
        "mod_expire",
        "mod_compress",
        "mod_redirect",
        "mod_setenv",
        "mod_rewrite"
   )
   server.document-root        = "/var/www/html"
   server.error-handler-404    = "pihole/index.php"
   server.upload-dirs          = ( "/var/cache/lighttpd/uploads" )
   server.errorlog             = "/var/log/lighttpd/error.log"
   server.pid-file             = "/var/run/lighttpd.pid"
   server.username             = "www-data"
   server.groupname            = "www-data"
   server.port                 = 80
   accesslog.filename          = "/var/log/lighttpd/access.log"
   accesslog.format            = "%{%s}t|%V|%r|%s|%b"
   index-file.names            = ( "index.php", "index.html", "index.lighttpd.html" )
   url.access-deny             = ( "~", ".inc", ".md", ".yml", ".ini" )
   static-file.exclude-extensions = ( ".php", ".pl", ".fcgi" )
   compress.cache-dir          = "/var/cache/lighttpd/compress/"
   compress.filetype           = ( "application/javascript", "text/css", "text/html", "text/plain" )
   include_shell "/usr/share/lighttpd/use-ipv6.pl " + server.port
   include_shell "/usr/share/lighttpd/create-mime.assign.pl"
   include_shell "find /etc/lighttpd/conf-enabled -name '*.conf' -a ! -name 'letsencrypt.conf' -printf 'include \"%p\"
' 2>/dev/null"
   $HTTP["url"] =~ "^/admin/" {

       setenv.add-response-header = (
           "X-Pi-hole" => "The Pi-hole Web interface is working!",
           "X-Frame-Options" => "DENY"
       )
       $HTTP["url"] =~ ".ttf$" {

           setenv.add-response-header = ( "Access-Control-Allow-Origin" => "*" )
       }
   }
   $HTTP["url"] =~ "^/admin/\.(.*)" {
        url.access-deny = ("")
   }
   include_shell "cat external.conf 2>/dev/null"

*** [ DIAGNOSING ]: contents of /etc/cron.d

-rw-r--r-- 1 root root 1630 sty  1 21:52 /etc/cron.d/pihole
pihole -d   38 3   * * 7   root    PATH="$PATH:/usr/local/bin/" pihole updateGravity
   00 00   * * *   root    PATH="$PATH:/usr/local/bin/" pihole flush once quiet
   @reboot root /usr/sbin/logrotate /etc/pihole/logrotate
   */10 *  * * *   root    PATH="$PATH:/usr/local/bin/" pihole updatechecker local
   24 16  * * *   root    PATH="$PATH:/usr/local/bin/" pihole updatechecker remote
   @reboot root    PATH="$PATH:/usr/local/bin/" pihole updatechecker remote reboot

*** [ DIAGNOSING ]: contents of /var/log/lighttpd

-rw-r--r-- 1 www-data www-data 257 sty  1 21:54 /var/log/lighttpd/error.log
   2018-01-01 21:51:28: (log.c.217) server started
   2018-01-01 21:54:13: (server.c.1828) server stopped by UID = 0 PID = 1
   2018-01-01 21:54:14: (log.c.217) server started
   2018-01-01 21:54:14: (server.c.1295) WARNING: unknown config-key: alias.url (ignored)

*** [ DIAGNOSING ]: contents of /var/log

-rw-r--r-- 1 pihole pihole 3769 sty  1 23:30 /var/log/pihole-FTL.log
   [2018-01-01 21:54:16.420]
   [2018-01-01 21:54:16.420] FTL branch: (no branch)
   [2018-01-01 21:54:16.420] FTL version: v2.13.1
   [2018-01-01 21:54:16.420] FTL tag: v2.13.1
   [2018-01-01 21:54:16.420] FTL date: 2017-12-28 07:44:48 -0800
   [2018-01-01 21:54:16.420] FTL user: pihole
   [2018-01-01 21:54:16.420] Notice: Found no readable FTL config file
   [2018-01-01 21:54:16.420]         Using default settings
   [2018-01-01 21:54:16.420] Starting config file parsing (/etc/pihole/pihole-FTL.conf)
   [2018-01-01 21:54:16.420]    SOCKET_LISTENING: only local
   [2018-01-01 21:54:16.420]    TIMEFRAME: Rolling 24h
   [2018-01-01 21:54:16.420]    QUERY_DISPLAY: Show queries
   [2018-01-01 21:54:16.420]    AAAA_QUERY_ANALYSIS: Show AAAA queries
   [2018-01-01 21:54:16.421]    MAXDBDAYS: max age for stored queries is 365 days
   [2018-01-01 21:54:16.421]    RESOLVE_IPV6: Resolve IPv6 addresses
   [2018-01-01 21:54:16.421]    RESOLVE_IPV4: Resolve IPv4 addresses
   [2018-01-01 21:54:16.421]    DBINTERVAL: saving to DB file every minute
   [2018-01-01 21:54:16.421]    DBFILE: Using /etc/pihole/pihole-FTL.db
   [2018-01-01 21:54:16.421] Finished config file parsing
   [2018-01-01 21:54:16.426] Found no other running pihole-FTL process
   [2018-01-01 21:54:16.428] PID of FTL process: 9478
   [2018-01-01 21:54:16.429] Error: failed to read /etc/pihole/list.preEventHorizon
   [2018-01-01 21:54:16.429] Gravity list entries: -1
   [2018-01-01 21:54:16.429] No blacklist present
   [2018-01-01 21:54:16.429] No wildcard blocking list present

*** [ DIAGNOSING ]: Pi-hole log
-rw-r--r-- 1 dnsmasq root 257955 sty  1 23:30 /var/log/pihole.log
   -----head of pihole.log------
   Jan  1 21:54:13 dnsmasq[9300]: uruchomiony, wersja 2.76, 10000 miejsc w pamięci podręcznej
   Jan  1 21:54:13 dnsmasq[9300]: opcje kompilacji: IPv6 GNU-getopt DBus i18n IDN DHCP DHCPv6 no-Lua TFTP conntrack ipset auth DNSSEC loop-detect inotify
   Jan  1 21:54:13 dnsmasq[9300]: uwaga: ignoruję opcję resolv-file, ponieważ wybrano tryb no-resolv
   Jan  1 21:54:13 dnsmasq[9300]: używam serwera nazw 8.8.4.4#53
   Jan  1 21:54:13 dnsmasq[9300]: używam serwera nazw 8.8.8.8#53
   Jan  1 21:54:13 dnsmasq[9300]: wczytałem /etc/hosts - 5 adresów
   Jan  1 21:54:13 dnsmasq[9300]: nie potrafię wczytać nazw z /etc/pihole/local.list: Nie ma takiego pliku ani katalogu
   Jan  1 21:54:13 dnsmasq[9300]: nie potrafię wczytać nazw z /etc/pihole/black.list: Nie ma takiego pliku ani katalogu
   Jan  1 21:54:13 dnsmasq[9300]: nie potrafię wczytać nazw z /etc/pihole/gravity.list: Nie ma takiego pliku ani katalogu
   Jan  1 21:54:17 dnsmasq[9300]: query[AAAA] raw.githubusercontent.com from 127.0.0.1
   Jan  1 21:54:17 dnsmasq[9300]: forwarded raw.githubusercontent.com to 8.8.4.4
   Jan  1 21:54:17 dnsmasq[9300]: forwarded raw.githubusercontent.com to 8.8.8.8
   Jan  1 21:54:17 dnsmasq[9300]: reply raw.githubusercontent.com is <CNAME>
   Jan  1 21:54:17 dnsmasq[9300]: reply github.map.fastly.net is NODATA-IPv6
   Jan  1 21:54:17 dnsmasq[9300]: query[A] raw.githubusercontent.com from 127.0.0.1
   Jan  1 21:54:17 dnsmasq[9300]: cached raw.githubusercontent.com is <CNAME>
   Jan  1 21:54:17 dnsmasq[9300]: forwarded raw.githubusercontent.com to 8.8.4.4
   Jan  1 21:54:17 dnsmasq[9300]: reply raw.githubusercontent.com is <CNAME>
   Jan  1 21:54:17 dnsmasq[9300]: reply github.map.fastly.net is 151.101.0.133
   Jan  1 21:54:17 dnsmasq[9300]: reply github.map.fastly.net is 151.101.64.133


********************************************
********************************************
[✓] ** FINISHED DEBUGGING! **

    * The debug log can be uploaded to tricorder.pi-hole.net for sharing with developers only.
    * For more information, see: https://pi-hole.net/2016/11/07/crack-our-medical-tricorder-win-a-raspberry-pi-3/
    * If available, we'll use openssl to upload the log, otherwise it will fall back to netcat.

I will be very grateful to help me with this.
Thanks for all.
Greetings.

It looks like some important files have not been generated:

[2018-01-01 21:54:16.429] Error: failed to read /etc/pihole/list.preEventHorizon

nie potrafię wczytać nazw z /etc/pihole/gravity.list: Nie ma takiego pliku ani katalogu

Try running this command:

pihole -g

pihole -g
[i] Neutrino emissions detected...
[✓] Pulling blocklist source list into range

[i] Target: raw.githubusercontent.com (hosts)
[✓] Status: Retrieval successful

[i] Target: mirror1.malwaredomains.com (justdomains)
[✓] Status: No changes detected

[i] Target: sysctl.org (hosts)
[✓] Status: No changes detected

[i] Target: zeustracker.abuse.ch (blocklist.php?download=domainblocklist)
[✓] Status: No changes detected

[i] Target: s3.amazonaws.com (simple_tracking.txt)
[✓] Status: No changes detected

[i] Target: s3.amazonaws.com (simple_ad.txt)
[✓] Status: No changes detected

[i] Target: hosts-file.net (ad_servers.txt)
[✓] Status: No changes detected

[✓] Consolidating blocklists
[✓] Extracting domains from blocklists
[i] Number of domains being pulled in by gravity: 130280
[✓] Removing duplicate domains
[i] Number of unique domains trapped in the Event Horizon: 107129

[i] Number of blocklist source domains being added to the whitelist: 6
[i] Number of whitelisted domains: 7
[✓] Parsing domains into hosts format
[✓] Cleaning up stray matter

[✓] Force-reloading DNS service
[✓] DNS service is running
[✓] Pi-hole blocking is Enabled

That's what terminal print.
Is all okay ?

Yes, that looks good. Run pihole -d for a new debug token. Are ads being blocked now?

*** [ INITIALIZING ]
[i] 2018-01-02:17:51:30 debug log has been initiated.

*** [ INITIALIZING ] Sourcing setup variables
[i] Sourcing /etc/pihole/setupVars.conf...

*** [ DIAGNOSING ]: Core version
[i] Core: v3.2.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
[i] Branch: master
[i] Commit: v3.2.1-0-ge602008

*** [ DIAGNOSING ]: Web version
[i] Web: v3.2.1 (https://discourse.pi-hole.net/t/how-do-i-update-pi-hole/249)
[i] Branch: master
[i] Commit: v3.2.1-0-g31dddd8

*** [ DIAGNOSING ]: FTL version
[✓] FTL: v2.13.1

*** [ DIAGNOSING ]: dnsmasq version
[i] 2.76

*** [ DIAGNOSING ]: lighttpd version
[i] 1.4.45

*** [ DIAGNOSING ]: php version
[i] 7.0.19

*** [ DIAGNOSING ]: Operating system
[✓] Raspbian GNU/Linux 9 (stretch)

*** [ DIAGNOSING ]: SELinux
[i] SELinux not detected

*** [ DIAGNOSING ]: Processor
/opt/pihole/piholeDebug.sh: linia 474: $'[\E[32m✓\E[0m] \E[32marmv7l\E[0m': nie znaleziono polecenia

*** [ DIAGNOSING ]: Networking
[✓] IPv4 address(es) bound to the eth0 interface:
   192.168.0.110/24 matches the IP found in /etc/pihole/setupVars.conf

[✓] IPv6 address(es) bound to the eth0 interface:
   fe80::d65c:fe48:609e:a23c does not match the IP found in /etc/pihole/setupVars.conf (https://discourse.pi-hole.net/t/use-ipv6-ula-addresses-for-pi-hole/2127)

   ^ Please note that you may have more than one IP address listed.
   As long as one of them is green, and it matches what is in /etc/pihole/setupVars.conf, there is no need for concern.

   The link to the FAQ is for an issue that sometimes occurs when the IPv6 address changes, which is why we check for it.

[i] Default IPv4 gateway: 192.168.0.1
   * Pinging 192.168.0.1...
[✓] Gateway responded.

*** [ DIAGNOSING ]: Ports in use
[10000] is in use by miniserv.
[53] is in use by dnsmasq
[7829] is in use by sshd
[80] is in use by lighttpd
[4711] is in use by pihole-FTL

*** [ DIAGNOSING ]: Name resolution (IPv4) using a random blocked domain and a known ad-serving domain
[✓] lvbet.pl is 192.168.0.110 via localhost (127.0.0.1)
[✓] lvbet.pl is 192.168.0.110 via Pi-hole (192.168.0.110)
[✓] doubleclick.com is 172.217.20.174 via a remote, public DNS server (8.8.8.8)

*** [ DIAGNOSING ]: Pi-hole processes
[✓] dnsmasq daemon is active
[✓] lighttpd daemon is active
[✓] pihole-FTL daemon is active

*** [ DIAGNOSING ]: Setup variables
    PIHOLE_INTERFACE=eth0
    IPV4_ADDRESS=192.168.0.110/24
    IPV6_ADDRESS=
    PIHOLE_DNS_1=8.8.8.8
    PIHOLE_DNS_2=8.8.4.4
    QUERY_LOGGING=true
    INSTALL_WEB=true
    LIGHTTPD_ENABLED=1
    API_EXCLUDE_DOMAINS=freedns.afraid.org,checkip.dyndns.org
    API_EXCLUDE_CLIENTS=127.0.0.1,localhost
    API_QUERY_LOG_SHOW=all
    API_PRIVACY_MODE=false

*** [ DIAGNOSING ]: Dashboard and block page
[✓] X-Pi-hole: A black hole for Internet advertisements.
[✓] X-Pi-hole: The Pi-hole Web interface is working!

*** [ DIAGNOSING ]: Gravity list
-rw-r--r-- 1 root root 3946882 sty  2 17:44 /etc/pihole/gravity.list
   -----head of gravity.list------
   192.168.0.110 0.0.0.0
   192.168.0.110 0000mps.webpreview.dsl.net
   192.168.0.110 0001.2waky.com
   192.168.0.110 000dom.revenuedirect.com

   -----tail of gravity.list------
   192.168.0.110 zzsyw.com
   192.168.0.110 zztxdown.com
   192.168.0.110 zzz.clickbank.net
   192.168.0.110 zz.zeroredirect1.com

*** [ DIAGNOSING ]: contents of /etc/pihole

-rw-r--r-- 1 root root 633 sty  1 21:54 /etc/pihole/adlists.list
   https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts
   https://mirror1.malwaredomains.com/files/justdomains
   http://sysctl.org/cameleon/hosts
   https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
   https://s3.amazonaws.com/lists.disconnect.me/simple_tracking.txt
   https://s3.amazonaws.com/lists.disconnect.me/simple_ad.txt
   https://hosts-file.net/ad_servers.txt

-rw-r--r-- 1 root root 52 sty  2 17:44 /etc/pihole/local.list
   192.168.0.110 rpi3ch3atSHIELD
   192.168.0.110 pi.hole

-rw-r--r-- 1 root root 234 sty  1 21:52 /etc/pihole/logrotate
   /var/log/pihole.log {
        su root root
        daily
        copytruncate
        rotate 5
        compress
        delaycompress
        notifempty
        nomail
   }
   /var/log/pihole-FTL.log {
        su root root
        weekly
        copytruncate
        rotate 3
        compress
        delaycompress
        notifempty
        nomail
   }

-rw-r--r-- 1 root root 131 sty  1 23:34 /etc/pihole/whitelist.txt
   raw.githubusercontent.com
   mirror1.malwaredomains.com
   sysctl.org
   zeustracker.abuse.ch
   s3.amazonaws.com
   hosts-file.net
   bongacams.com

*** [ DIAGNOSING ]: contents of /etc/dnsmasq.d

-rw-r--r-- 1 root root 1502 sty  1 21:54 /etc/dnsmasq.d/01-pihole.conf
   addn-hosts=/etc/pihole/gravity.list
   addn-hosts=/etc/pihole/black.list
   addn-hosts=/etc/pihole/local.list
   localise-queries
   no-resolv
   cache-size=10000
   log-queries
   log-facility=/var/log/pihole.log
   local-ttl=2
   log-async
   server=8.8.8.8
   server=8.8.4.4
   interface=eth0

*** [ DIAGNOSING ]: contents of /etc/lighttpd

-rw-r--r-- 1 root root 3027 sty  1 21:52 /etc/lighttpd/lighttpd.conf
   server.modules = (
        "mod_access",
        "mod_accesslog",
        "mod_auth",
        "mod_expire",
        "mod_compress",
        "mod_redirect",
        "mod_setenv",
        "mod_rewrite"
   )
   server.document-root        = "/var/www/html"
   server.error-handler-404    = "pihole/index.php"
   server.upload-dirs          = ( "/var/cache/lighttpd/uploads" )
   server.errorlog             = "/var/log/lighttpd/error.log"
   server.pid-file             = "/var/run/lighttpd.pid"
   server.username             = "www-data"
   server.groupname            = "www-data"
   server.port                 = 80
   accesslog.filename          = "/var/log/lighttpd/access.log"
   accesslog.format            = "%{%s}t|%V|%r|%s|%b"
   index-file.names            = ( "index.php", "index.html", "index.lighttpd.html" )
   url.access-deny             = ( "~", ".inc", ".md", ".yml", ".ini" )
   static-file.exclude-extensions = ( ".php", ".pl", ".fcgi" )
   compress.cache-dir          = "/var/cache/lighttpd/compress/"
   compress.filetype           = ( "application/javascript", "text/css", "text/html", "text/plain" )
   include_shell "/usr/share/lighttpd/use-ipv6.pl " + server.port
   include_shell "/usr/share/lighttpd/create-mime.assign.pl"
   include_shell "find /etc/lighttpd/conf-enabled -name '*.conf' -a ! -name 'letsencrypt.conf' -printf 'include \"%p\"
' 2>/dev/null"
   $HTTP["url"] =~ "^/admin/" {

       setenv.add-response-header = (
           "X-Pi-hole" => "The Pi-hole Web interface is working!",
           "X-Frame-Options" => "DENY"
       )
       $HTTP["url"] =~ ".ttf$" {

           setenv.add-response-header = ( "Access-Control-Allow-Origin" => "*" )
       }
   }
   $HTTP["url"] =~ "^/admin/\.(.*)" {
        url.access-deny = ("")
   }
   include_shell "cat external.conf 2>/dev/null"

*** [ DIAGNOSING ]: contents of /etc/cron.d

-rw-r--r-- 1 root root 1630 sty  1 21:52 /etc/cron.d/pihole
   38 3   * * 7   root    PATH="$PATH:/usr/local/bin/" pihole updateGravity
   00 00   * * *   root    PATH="$PATH:/usr/local/bin/" pihole flush once quiet
   @reboot root /usr/sbin/logrotate /etc/pihole/logrotate
   */10 *  * * *   root    PATH="$PATH:/usr/local/bin/" pihole updatechecker local
   24 16  * * *   root    PATH="$PATH:/usr/local/bin/" pihole updatechecker remote
   @reboot root    PATH="$PATH:/usr/local/bin/" pihole updatechecker remote reboot

*** [ DIAGNOSING ]: contents of /var/log/lighttpd

-rw-r--r-- 1 www-data www-data 839 sty  1 23:56 /var/log/lighttpd/error.log
   2018-01-01 21:51:28: (log.c.217) server started
   2018-01-01 21:54:13: (server.c.1828) server stopped by UID = 0 PID = 1
   2018-01-01 21:54:14: (log.c.217) server started
   2018-01-01 21:54:14: (server.c.1295) WARNING: unknown config-key: alias.url (ignored)
   2018-01-01 23:34:32: (mod_fastcgi.c.2543) FastCGI-stderr: PHP Warning:  preg_split(): Delimiter must not be alphanumeric or backslash in /var/www/html/admin/scripts/pi-hole/php/auth.php on line 122
   2018-01-01 23:34:32: (mod_fastcgi.c.2543) FastCGI-stderr: PHP Warning:  Invalid argument supplied for foreach() in /var/www/html/admin/scripts/pi-hole/php/auth.php on line 123
   2018-01-01 23:56:40: (server.c.1828) server stopped by UID = 0 PID = 1
   2018-01-01 23:56:49: (log.c.217) server started
   2018-01-01 23:56:49: (server.c.1295) WARNING: unknown config-key: alias.url (ignored)

*** [ DIAGNOSING ]: contents of /var/log

-rw-r--r-- 1 pihole pihole 1583 sty  2 17:44 /var/log/pihole-FTL.log
   [2018-01-02 00:00:01.658] NOTICE: pihole.log has been flushed
   [2018-01-02 00:00:01.659]   Resetting internal data structure
   [2018-01-02 00:00:01.659]   Queries in memory before flushing: 1247
   [2018-01-02 00:00:01.864] Gravity list entries: 107129
   [2018-01-02 00:00:01.865] No blacklist present
   [2018-01-02 00:00:01.865] No wildcard blocking list present
   [2018-01-02 00:00:01.865] Reading from /var/log/pihole.log.1 (rw-r--r--)
   [2018-01-02 00:00:01.865] Notice: Increasing queries struct size from 0 to 10000 (320.19 KB)
   [2018-01-02 00:00:01.865] Notice: Increasing overTime struct size from 0 to 100 (324.19 KB)
   [2018-01-02 00:00:01.865] Notice: Increasing forwarded struct size from 0 to 4 (324.26 KB)
   [2018-01-02 00:00:01.901] New forward server: 8.8.4.4 google-public-dns-b.google.com (0/4)
   [2018-01-02 00:00:01.901] Notice: Increasing domains struct size from 0 to 1000 (344.30 KB)
   [2018-01-02 00:00:01.901] Notice: Increasing clients struct size from 0 to 10 (344.48 KB)
   [2018-01-02 00:00:01.901] New client: 127.0.0.1 localhost (0/10)
   [2018-01-02 00:00:01.937] New forward server: 8.8.8.8 google-public-dns-a.google.com (1/4)
   [2018-01-02 00:00:01.951] New client: 192.168.0.103 (1/10)
   [2018-01-02 00:00:02.014] New client: 192.168.0.110 rpi3ch3atshield (2/10)
   [2018-01-02 00:00:02.046] Reading from /var/log/pihole.log (rw-r--r--)
   [2018-01-02 17:44:24.330] NOTICE: Received signal SIGHUP - re-reading gravity files
   [2018-01-02 17:44:24.540] Gravity list entries: 107129
   [2018-01-02 17:44:24.540] No blacklist present
   [2018-01-02 17:44:24.540] No wildcard blocking list present

*** [ DIAGNOSING ]: Pi-hole log
-rw-r--r-- 1 dnsmasq root 452880 sty  2 17:51 /var/log/pihole.log
   -----head of pihole.log------
   Jan  2 00:00:01 dnsmasq[515]: query[PTR] 4.4.8.8.in-addr.arpa from 127.0.0.1
   Jan  2 00:00:01 dnsmasq[515]: forwarded 4.4.8.8.in-addr.arpa to 8.8.4.4
   Jan  2 00:00:01 dnsmasq[515]: forwarded 4.4.8.8.in-addr.arpa to 8.8.8.8
   Jan  2 00:00:01 dnsmasq[515]: reply 8.8.4.4 is google-public-dns-b.google.com
   Jan  2 00:00:01 dnsmasq[515]: query[PTR] 8.8.8.8.in-addr.arpa from 127.0.0.1
   Jan  2 00:00:01 dnsmasq[515]: forwarded 8.8.8.8.in-addr.arpa to 8.8.4.4
   Jan  2 00:00:01 dnsmasq[515]: reply 8.8.8.8 is google-public-dns-a.google.com
   Jan  2 00:00:01 dnsmasq[515]: query[PTR] 103.0.168.192.in-addr.arpa from 127.0.0.1
   Jan  2 00:00:01 dnsmasq[515]: forwarded 103.0.168.192.in-addr.arpa to 8.8.4.4
   Jan  2 00:00:02 dnsmasq[515]: query[PTR] 110.0.168.192.in-addr.arpa from 127.0.0.1
   Jan  2 00:00:02 dnsmasq[515]: /etc/pihole/local.list 192.168.0.110 is rpi3ch3atSHIELD
   Jan  2 00:00:02 dnsmasq[515]: query[PTR] 103.0.168.192.in-addr.arpa from 127.0.0.1
   Jan  2 00:00:02 dnsmasq[515]: forwarded 103.0.168.192.in-addr.arpa to 8.8.4.4
   Jan  2 00:00:02 dnsmasq[515]: query[PTR] 110.0.168.192.in-addr.arpa from 127.0.0.1
   Jan  2 00:00:02 dnsmasq[515]: /etc/pihole/local.list 192.168.0.110 is rpi3ch3atSHIELD
   Jan  2 00:00:59 dnsmasq[515]: query[A] cdn.onenote.net from 192.168.0.103
   Jan  2 00:00:59 dnsmasq[515]: forwarded cdn.onenote.net to 8.8.4.4
   Jan  2 00:00:59 dnsmasq[515]: forwarded cdn.onenote.net to 8.8.8.8
   Jan  2 00:00:59 dnsmasq[515]: reply cdn.onenote.net is <CNAME>
   Jan  2 00:00:59 dnsmasq[515]: reply cdn.onenote.net.edgekey.net is <CNAME>


********************************************
********************************************
[✓] ** FINISHED DEBUGGING! **

    * The debug log can be uploaded to tricorder.pi-hole.net for sharing with developers only.
    * For more information, see: https://pi-hole.net/2016/11/07/crack-our-medical-tricorder-win-a-raspberry-pi-3/
    * If available, we'll use openssl to upload the log, otherwise it will fall back to netcat.

That's what I have now.

But advertisements on mobile still here.

Sorry for double post, I can't edit my last reply.
I have a strange thing.

Im using WiFi and:
On iPhone / iPad I have advertisements
On Samsung I dont have advertisements
And on Asus ZenFone 2 / Huawei I have advertisements ..

What should I do ? Its strange for me.

Try restarting your devices to make sure the cache is cleared. Make sure you only have the Pi-hole as a DNS server, and check this on one of your devices (Windows can use ipconfig /all, Unix can use cat /etc/resolv.conf).

Can you reach http://pi.hole/admin on all of your devices?

Here is what I have when ipconfig /all

Ethernet adapter Ethernet:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Realtek PCIe GBE Family Controller
   Physical Address. . . . . . . . . : D8-CB-8A-E5-98-E4
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 192.168.0.103(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : sobota, 30 grudnia 2017 21:28:08
   Lease Expires . . . . . . . . . . : poniedziałek, 11 lutego 2154 03:03:45
   Default Gateway . . . . . . . . . : 192.168.0.1
   DHCP Server . . . . . . . . . . . : 192.168.0.1
   DNS Servers . . . . . . . . . . . : 192.168.0.110
                                       4.4.4.4
   NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter Teredo Tunneling Pseudo-Interface:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:9d38:6abd:3cbd:2606:3f57:ff98(Preferred)
   Link-local IPv6 Address . . . . . : fe80::3cbd:2606:3f57:ff98%4(Preferred)
   Default Gateway . . . . . . . . . : ::
   DHCPv6 IAID . . . . . . . . . . . : 117440512
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-21-B3-3E-A4-D8-CB-8A-E5-98-E4
   NetBIOS over Tcpip. . . . . . . . : Disabled

http://pi.hole/admin - only on PC
On mobile device i can get there by: 192.168.0.110/admin

I restart raspberry few times.

There is more than one DNS server. 4.4.4.4 is being handed out alongside Pi-hole. If you can't remove this server via the router's settings, then try turning off DHCP on the router and enable it in the Pi-hole's settings.

So it should be only 1 DNS yes?
This 192.168.0.110 ?

Yes, you should only have that DNS server enabled.

Okay, so I will try and give a reply :slight_smile:

Should I put the DNS adress to router too ?
Because now I have on router "Get dynamically DNS from ISP"
I could change it but it's nessesary ?

Well, it works. I set on my computer only 1 DNS, and I changed on router manually DNS to this 1.
But, on few websites with HTTPS I see advertisements.
It's possible to hide/delete advertisements on every page ?

You dont have to set "WAN DNS" on the router to point to the Pi-hole IP.
You can leave it default "Get dynamically DNS from ISP".

Pi-hole does not distinct between http or https as it only deals with DNS resolution and doesnt deal with type of content on pages.
Make sure you cleared cache on clients (bottom section "More Complexity" in below FAQ):

I should set manually DNS on router, because when I have "Get dynamically DNS from ISP" ads was on mobile.

This probably indicates your mobile is/was still using the router for DNS resolution while instead it should use Pi-hole's IP address for DNS resolution.
If Android, run below ones in a terminal window to find out:

getprop net.dns1

getprop net.dns2

getprop net.dns3

Dont know how to check for Apple mobiles but am sure an app exists that can show you network details.