# # This list is for people who want to double check that the DNS server # they're using while on the VPN is one of our DNS servers. # # These were once public servers, but we're phasing out public DNS because # there's too many vulnerabilities inherent in the DNS protocol that make # us more susceptible to distributed/reflected denial of service attacks, # and other forms of DNS related abuse. # # The Paris (163.172.34.56) and Switzerland (190.211.255.227, 146.70.135.59) # servers are the only one's still running public DNS servers, but they will # eventually be closed as well. # # Our DNSCrypt resolvers ( https://cryptostorm.is/cs-resolvers.md ) and # relays ( https://cryptostorm.is/cs-relays.md ) are still open to everyone, # and we have no plans to close those down in the foreseeable future. # If you're a customer of ours and you're trying to protect your DNS before # you connect to the VPN, use DNSCrypt. If you're not a customer of ours, # you can still use our DNSCrypt resolvers/relays to encrypt your DNS. Your # traffic helps obfuscate the DNS traffic generated by our VPN clients, # making it more difficult for DNS-based correlation attacks by whoever # may be listening. # 146.70.135.59 185.107.80.84 78.129.248.67 89.163.221.181 85.114.138.119 213.202.216.236 185.117.118.20 128.127.104.108 37.120.232.43 190.211.255.227 146.70.66.227 109.248.149.133 198.7.58.227 173.234.56.115 155.254.21.250 64.42.181.227 209.58.147.36 195.206.104.203 64.120.5.251 37.120.147.2 179.61.223.47 37.120.235.187 37.120.211.91 86.106.74.219 37.120.152.235 217.138.220.243 94.198.41.235 217.138.219.219 37.120.207.131 185.183.106.83 37.120.142.115 37.120.236.11 91.219.215.227 195.12.48.171 193.37.255.227 37.120.193.219 37.120.234.251 146.70.31.43 108.181.101.27 108.181.63.163 108.181.101.67 196.240.79.163 23.19.117.55 23.19.117.51 177.54.145.131 178.175.129.16 103.14.26.190 163.172.34.56 91.205.230.224 165.231.253.163 37.120.217.75 146.70.82.3 108.181.124.27 108.181.50.218 176.113.74.19 37.120.151.11 146.70.154.67