JS
LOGS
KYC
Third-Party Audit by Digilol [PDF Report]
tsjo3q2zevkrldvtj6empn4kfxqm6ns7xak5zzgnzi2sku2l2brvduyd.onion:18089
captxmrbyebnq3n4zwyqzbwob4e75itmpvhyijvfc5amma4zxxtq.b32.i2p:18089
Node Stats: [Clearnet] / [Tor]

CaptainCanary LLC

I sometimes sell my personal XMR. I've made this LLC to protect my privacy.

I accept the following payment methods:

Sometimes I sell my personal cryptocurrency.

I've made this LLC to protect my privacy.

DNS Resolver  Status: offline

Self-hosted recursive resolver — no logs, no filtering, DNSSEC.

DNS-over-HTTPS (DoH)

https://dns.captaincanarynode.org/dns-query

DoHoT — Tor hidden service

http://lczd7vkeb3i4ifxtoccxaik45o4wisyz3ch2jb2zr6yrpcqz4csiukid.onion/dns-query

dnscrypt-proxy stamp (DoH via Tor)

sdns://AgMAAAAAAAAAAAAZZG5zLmNhcHRhaW5jYW5hcnlub2RlLm9yZwovZG5zLXF1ZXJ5

How it works

DNS translates hostnames into IP addresses. Every connection starts with a DNS query. By default these are sent in plaintext to your ISP — who can log every site you visit even over HTTPS.

DoH (DNS-over-HTTPS) encrypts queries inside HTTPS, blocking ISP-level snooping. Trust shifts from your ISP to the resolver operator.

DoHoT (DNS-over-HTTPS-over-Tor) routes encrypted queries through Tor first. The resolver only sees a Tor exit node — not your IP. No single party holds both your identity and query history.

Stack: nginx SNI → dnsdist 1.9 (TLS/HTTP2) → unbound (recursive, no logs)

Setup

Firefox

Settings → Privacy & Security → DNS over HTTPS → Custom → paste DoH URL above.

Chrome / Chromium

Settings → Security → Use secure DNS → Custom → paste DoH URL above.

Android (Private DNS)

dns.captaincanarynode.org

Linux — dnscrypt-proxy + Tor

proxy = 'socks5://127.0.0.1:9050'

[static]
  [static.captain-canary]
    stamp = 'sdns://AgMAAAAAAAAAAAAZZG5zLmNhcHRhaW5jYW5hcnlub2RlLm9yZwovZG5zLXF1ZXJ5'

Linux — systemd-resolved

# /etc/systemd/resolved.conf.d/doh.conf
[Resolve]
DNS=https://dns.captaincanarynode.org/dns-query
FallbackDNS=

VPN Setup

Privacy VPNs accepting Monero. Set custom DNS to use this resolver inside the tunnel.

iVPN — CLI

ivpn dns -doh https://dns.captaincanarynode.org/dns-query 62.76.229.30

GUI: Settings → DNS → DNS over HTTPS → Custom

Mullvad — CLI

mullvad dns set custom 62.76.229.30

GUI: Settings → VPN Settings → Custom DNS → enable → enter IP

AirVPN (Eddie)

Preferences → DNS → Override DNS → Custom → 62.76.229.30

OVPN

Settings → DNS Servers → Custom → 62.76.229.30

WireGuard — any provider

[Interface]
DNS = 62.76.229.30

OpenVPN — any provider

dhcp-option DNS 62.76.229.30