PIHOLEKILLER
If your pi-hole blocks them all — it's the real deal.
If it misses even one — you'd never have known.
> why_another_test?
Most ad-blocker test pages give pi-hole users a false pass. They check for HTML ad elements that wouldn't exist at DNS level anyway — so your pi-hole looks perfect while real-world trackers waltz right past it.
PIHOLEKILLER fires actual requests to 100+ live ad networks, pop-under scripts, fingerprinters, and DoH bypass endpoints. The exact mix pi-hole users should be blocking but usually aren't.
If your pi-hole can't survive this, it's not really blocking anything.
> read the full breakdown: why pi-hole fails most ad blocker tests →
> current_leaderboard
| 01 | joncarlson | Pi-Hole + Hagezi Pro++ + uBlock Origin | 84/103 |
| 02 | Pi-Hole + uBlock (common combo) | reference setup | 82/103 |
| 03 | sarah.m | AdGuard Home + Brave Strict Shields | 80/103 |
| 04 | dan_chen | NextDNS Full + Firefox RFP enabled | 77/103 |
| 05 | Brave Strict Shields (solo) | reference browser-only | 74/103 |
| 06 | kitkatbar | Pi-Hole + OISD + uBlock Origin | 71/103 |
| 07 | Pi-Hole (Hagezi only, no browser ext) | reference DNS-only | 68/103 |
| 08 | cloudphil | AdGuard DNS cloud · default profile | 65/103 |
| 09 | uBlock Origin alone (no DNS filter) | reference browser-ext-only | 62/103 |
| 99 | Chrome default · no protection | the unprotected baseline | 0/103 |
// leaderboard updates weekly · community submissions mixed with reference configurations
> what_gets_tested
> the_only_thing_that_scores_103
[ REDACTED ] — we built something that survives this gauntlet every single time. Not quite ready for sale yet. Drop your email and we'll let you know the second it ships.
- > passes every test on this page — every time
- > plug-and-play · no config · no CLI
- > built by paranoids, for paranoids
- > launching soon · waitlist only
> common_questions
Will this actually break my browser?
If you have good protection — no. If you don't — possibly. Pop-unders and redirect loops can hijack your tab for a minute. Close and relaunch if it gets stuck.
Do you serve the ads yourself?
No. We load tags from real third-party networks (DoubleClick, PropellerAds, etc.) and watch whether your blocker catches them. If an ad renders, it's from the network directly — not us.
Is this dangerous?
The ad networks we use are also used by thousands of websites you already visit. The risk isn't different from browsing the open web without a blocker — it's just concentrated into one minute instead of spread across a month.
Why is pi-hole in the name?
Because pi-hole users specifically get false-positive passes on other test sites. This test is calibrated to catch the things pi-hole misses.
My pi-hole scored 71/103 — is that bad?
It's average. Default pi-hole blocklists cover mainstream ads but miss pop-unders, DoH bypass, and fingerprinting. To get above 90, you need additional lists (Hagezi, OISD, etc.) and a blocker that handles DoH.