⚠ WARNING · AGGRESSIVE ADS AHEAD · YOUR BROWSER MAY SCREAM · PROCEED AT OWN RISK ⚠ WARNING · AGGRESSIVE ADS AHEAD · YOUR BROWSER MAY SCREAM · PROCEED AT OWN RISK ⚠ WARNING · AGGRESSIVE ADS AHEAD · YOUR BROWSER MAY SCREAM · PROCEED AT OWN RISK
[[ the internet's harshest test ]]

PIHOLEKILLER

103 ads. 47 trackers. 12 DoH bypass attempts.
If your pi-hole blocks them all — it's the real deal.
If it misses even one — you'd never have known.
> 103 ad slots > 47 networks > 17 fingerprinters > 12 DoH endpoints > 3 pop-under gauntlets
[!] READ ME FIRST
This page loads real ads from real networks. Your browser will fire 100+ HTTP requests to known ad/tracker/pop-under domains. If your protection fails, you will see pop-unders, redirect attempts, and possibly malware-adjacent banners. No ads are served by us — we just watch you die trying.

> why_another_test?

Most ad-blocker test pages give pi-hole users a false pass. They check for HTML ad elements that wouldn't exist at DNS level anyway — so your pi-hole looks perfect while real-world trackers waltz right past it.

PIHOLEKILLER fires actual requests to 100+ live ad networks, pop-under scripts, fingerprinters, and DoH bypass endpoints. The exact mix pi-hole users should be blocking but usually aren't.

If your pi-hole can't survive this, it's not really blocking anything.

> current_leaderboard

01[ REDACTED · coming soon ]103/103
02Pi-Hole + uBlock Origin94/103
03NextDNS (Full Blocking)88/103
04AdGuard Home81/103
05Pi-Hole alone (default lists)71/103
06AdGuard DNS (cloud)68/103
99Chrome default · no blocker0/103

// leaderboard updates weekly from community submissions · submit your score below

> what_gets_tested

01
Display ads
Google · Taboola · Outbrain · Criteo · Media.net · Amazon · Bidvertiser · PropellerAds
02
Trackers
Google Analytics · Facebook Pixel · Mixpanel · Amplitude · Segment · Heap · FullStory · Hotjar
03
Fingerprinters
FingerprintJS · PerimeterX · DataDome · Imperva · CreepJS battery
04
Pop-under gauntlet
Adsterra · PopCash · PopAds · PropellerAds popunder · redirect chains
05
DoH / DoT bypass
cloudflare-dns · dns.google · quad9 · NextDNS · AdGuard DoH · DoT :853
06
Malware domains
PhishTank test entries · URLhaus samples · known C2 sinkholes
[[ advertisement ]]

> common_questions

Will this actually break my browser?

If you have good protection — no. If you don't — possibly. Pop-unders and redirect loops can hijack your tab for a minute. Close and relaunch if it gets stuck.

Do you serve the ads yourself?

No. We load tags from real third-party networks (DoubleClick, PropellerAds, etc.) and watch whether your blocker catches them. If an ad renders, it's from the network directly — not us.

Is this dangerous?

The ad networks we use are also used by thousands of websites you already visit. The risk isn't different from browsing the open web without a blocker — it's just concentrated into one minute instead of spread across a month.

Why is pi-hole in the name?

Because pi-hole users specifically get false-positive passes on other test sites. This test is calibrated to catch the things pi-hole misses.

My pi-hole scored 71/103 — is that bad?

It's average. Default pi-hole blocklists cover mainstream ads but miss pop-unders, DoH bypass, and fingerprinting. To get above 90, you need additional lists (Hagezi, OISD, etc.) and a blocker that handles DoH.