UnveilTech

DNS Filtering and Smart Home Devices

Essential Domains to Whitelist for Every Major IoT Brand
March 27, 2026 · 12 min read
← Back to Blog

The Problem: DNS Filtering Meets Smart Home

DNS filtering is one of the most effective tools in your security arsenal. It blocks ads, trackers, phishing domains, and malware before a single packet leaves your network. For browsers, laptops, and phones, it works beautifully. But the moment you point your entire home network at a filtering DNS resolver, something unexpected happens: your smart home starts falling apart.

The issue is straightforward. Smart home devices depend on cloud services to function. Your Amazon Echo needs to reach Alexa Voice Service servers to understand what you say. Your Philips Hue bridge contacts cloud endpoints for remote control and firmware updates. Your Ring doorbell streams video through Amazon's infrastructure. Every one of these connections starts with a DNS query, and if your filtering resolver blocks that query, the device fails silently.

Unlike a web browser that shows a clear error page when a domain is blocked, IoT devices give you almost nothing to work with. Your Alexa simply says "I'm having trouble understanding right now." Your Hue lights become unresponsive in the app. Your Ring doorbell shows a spinning loader instead of a live feed. There are no pop-ups, no error codes, and no helpful suggestions. The device just stops working, and you are left wondering whether it is a network issue, a hardware failure, or something else entirely.

The solution is not to disable DNS filtering. It is to whitelist the specific domains each device needs while keeping everything else filtered. This article provides the exact domain lists for the most popular smart home brands.

How to Whitelist Domains

In your DNS filtering dashboard, navigate to Black/White and open the Allowlist tab. For each domain you add, use the wildcard prefix format (*.example.com) to automatically cover all subdomains. This is important because IoT devices frequently use region-specific or dynamically generated subdomains like na-prod-1.example.com that you cannot predict in advance.

After adding domains for a specific device, reboot that device to force it to re-resolve all its DNS queries through the updated allowlist. Then monitor the Query Log for the next 10 to 15 minutes to confirm the device is reaching all the endpoints it needs. If you still see blocked queries from that device's IP address, add those domains to the allowlist as well.

Tip: Use a consistent naming convention when adding domains to your allowlist. For example, prefix each entry with the brand name in your notes: "Alexa — voice service", "Hue — bridge discovery". This makes it easy to audit your allowlist later and understand why each domain was added.

Device-by-Device Whitelisting Guide

Amazon Alexa / Echo

Amazon's Echo devices and Alexa-enabled hardware depend heavily on AWS infrastructure and Amazon's own API endpoints. Blocking any of these will break voice commands, skills, music playback, or smart home control.

*.amazon.com *.amazonaws.com *.amazonalexa.com device-metrics-us.amazon.com api.amazonalexa.com avs-alexa-*.amazon.com unagi-na.amazon.com
Required for: voice recognition, skill execution, music streaming, smart home control hub, software updates, and device health reporting.

Google Home / Nest / Chromecast

Google's ecosystem uses a broad range of subdomains across its infrastructure. The connectivity check domain is particularly critical — without it, many Google devices assume they have no internet connection and refuse to operate.

*.google.com *.gstatic.com *.googleapis.com connectivitycheck.gstatic.com clients3.google.com time.google.com *.googlevideo.com
Required for: Google Assistant voice processing, Chromecast streaming and casting, Nest camera feeds, Nest thermostat cloud sync, network connectivity checks, and NTP time synchronization.

Apple HomeKit / HomePod / Apple TV

Apple devices rely on iCloud for HomeKit data synchronization between devices. The mesu.apple.com domain is used for software update catalogs and should always remain accessible for security patches.

*.apple.com *.icloud.com *.cdn-apple.com gsp-ssl.ls.apple.com configuration.apple.com mesu.apple.com
Required for: HomeKit automation sync across devices, Siri voice processing, Apple TV streaming and App Store, AirPlay discovery, software updates, and device configuration profiles.

Philips Hue

Hue lights work locally via the bridge for basic on/off control, but remote access, voice assistant integration, and firmware updates all require cloud connectivity. The discovery domain is essential for the initial bridge setup.

discovery.meethue.com diag.meethue.com *.meethue.com firmware.meethue.com
Required for: bridge discovery during setup, remote control via the Hue app outside your home, Alexa/Google Home integration, firmware updates, and diagnostics reporting.

Ring (Amazon)

Ring devices share infrastructure with Amazon (AWS) but also use their own dedicated domains for video streaming and firmware delivery. The prd-rng-* subdomains handle regional video streaming servers.

*.ring.com fw.ring.com nw.ring.com *.amazonaws.com app.ring.com prd-rng-*.ring.com
Required for: live video feed, motion detection alerts, video recording and playback, doorbell press notifications, firmware updates, and mobile app connectivity.

Samsung SmartThings

SmartThings uses a combination of Samsung's IoT cloud and region-specific API endpoints. The graph API endpoint varies by region — the example below is for US East; your region may differ.

*.smartthings.com *.samsungiotcloud.com api.smartthings.com graph-na04-useast2.api.smartthings.com
Required for: device control and status updates, automation rule execution, remote access via the SmartThings app, and third-party service integrations (IFTTT, Alexa, Google).

Sonos

Sonos speakers need cloud access for music service integration, voice control, and firmware updates. If you use Spotify, the scdn.co domain is also required for Spotify Connect functionality.

*.sonos.com update-firmware.sonos.com api.sonos.com *.scdn.co
Required for: music streaming service integration, firmware updates, Sonos Voice Control and Alexa/Google integration, Spotify Connect, and multi-room audio synchronization.

Roku

Roku devices need their core domains for channel installation, streaming, and updates. Be aware that Roku is known for aggressive advertising and telemetry — some blocked domains from Roku are intentionally blocked and should stay that way.

*.roku.com *.brightcove.com *.tinyspeck.com
Required for: channel store browsing and installation, video streaming infrastructure, and device software updates. Note: domains containing "ads", "analytics", or "scribe" in the subdomain are advertising/tracking and can remain blocked.

TP-Link Kasa / Tapo

TP-Link's smart home products use region-specific API endpoints. The domains below cover both the US and EU regions. If your devices are unresponsive, check the Query Log for your specific regional API endpoint.

*.tplinkcloud.com *.tplinkdns.com euw1-api.tplinkcloud.com use1-api.tplinkcloud.com
Required for: remote control when away from home, scheduled on/off timers, Alexa/Google Home voice control integration, and device firmware updates.

Xiaomi / Mi Home

Xiaomi devices are functional with these core domains, but be selective. Xiaomi hardware is known to send significant telemetry data to a wide range of subdomains. Whitelist only what is strictly necessary for device operation.

*.xiaomi.com *.io.mi.com *.micloud.xiaomi.net api.io.mi.com
Required for: device control and status, automation rules, cloud storage for camera recordings, and firmware updates. Domains containing "tracking", "metrics", or "stat" can safely remain blocked.

General Tips for IoT DNS Filtering

Start strict, then whitelist as needed. Do not preemptively whitelist everything on this page. Enable DNS filtering first, then add devices one at a time. Check your Query Log after connecting each new device to see exactly which domains it tries to reach. This approach gives you the tightest possible filtering while keeping devices functional.

Always whitelist NTP domains. Nearly every IoT device needs accurate time to function correctly. TLS certificate validation, scheduled automations, and event logging all depend on synchronized clocks. These three NTP domains should be on every allowlist:

Never block firmware update domains. It is tempting to block update servers to prevent devices from changing behavior unexpectedly. Do not do this. Firmware updates patch security vulnerabilities, and an unpatched IoT device on your network is a far greater risk than any inconvenience from an update. Domains containing "update", "firmware", "ota", or "fota" from legitimate manufacturers should always be allowed.

CDN domains are generally safe. Many IoT devices load resources from shared CDN infrastructure like Akamai (*.akamaized.net), Cloudflare (*.cloudflare.com), and Amazon CloudFront (*.cloudfront.net). These are typically safe to allow and are used by many services beyond the IoT device itself.

Use wildcard domains when possible. Adding *.brand.com is almost always better than adding individual subdomains. IoT manufacturers frequently rotate subdomains, add regional prefixes, or use dynamically generated hostnames. A wildcard entry future-proofs your allowlist against these changes.

What to Keep Blocked

Not every domain your IoT device contacts is essential. Many smart home devices phone home with telemetry, analytics, and advertising data that has nothing to do with their core functionality. Here is what you should keep blocked:

Important: This list is a starting point. Smart home ecosystems change their domains frequently. Manufacturers add new cloud services, migrate infrastructure, and rotate hostnames. If a device stops working after enabling DNS filtering, check your Query Log for recently blocked domains from that device's IP address. The answer is almost always a single blocked domain that needs to be added to your allowlist.
Pro tip: Assign static IP addresses to your IoT devices via DHCP reservation on your router. This makes it much easier to filter your Query Log by device IP and identify exactly which blocked domains are causing issues for a specific device.

Protect Your Smart Home Without Breaking It

UnveilDNS lets you whitelist essential IoT domains while blocking ads, trackers, and malware across your entire network. Add notes to every allowlist entry so you always know why a domain was whitelisted. Monitor your Query Log in real time to catch issues before your family notices.

Get Started Free