blocked daily
protected
engine
Mini-SOC
A network-level DNS sinkhole deployed on a Raspberry Pi Zero 2 WH, intercepting DNS queries across the entire home network before they resolve. Every device — phones, laptops, smart TVs, IoT sensors — is protected automatically with zero per-device configuration required.
Beyond ad-blocking, DNS query logs feed directly into the Mini-SOC Splunk pipeline. When a device queries a flagged domain, the event appears alongside Suricata IDS alerts — enabling correlation between DNS behaviour and network intrusion data.
"A single Raspberry Pi transforms from an ad-blocker into a network-wide threat sensor, feeding real intelligence into a production SIEM."
sudo nmap -sn 10.0.0.0/24
ssh pi@10.0.0.153
passwd
sudo apt update && sudo apt full-upgrade -y
sudo apt autoremove -y
sudo apt install -y curl git htop vim net-tools
# Add to /etc/dhcpcd.conf:
interface eth0
static ip_address=10.0.0.153/24
static routers=10.0.0.1
static domain_name_servers=1.1.1.1 8.8.8.8
sudo systemctl restart dhcpcd
ip -4 addr show eth0 # verify
curl -sSL https://install.pi-hole.net | bash
pihole -a -p # set admin password
pihole -g # update blocklists
pihole -w domain.com # whitelist a false positive
pihole -t # live DNS query log (tail mode)
sudo apt install fail2ban -y
sudo systemctl enable fail2ban
sudo systemctl start fail2ban
nslookup google.com 10.0.0.153 # should resolve
nslookup doubleclick.net 10.0.0.153 # should return 0.0.0.0
- Network-wide ad and tracker blocking across all devices — phones, laptops, smart TVs, IoT sensors
- ~15,000 DNS queries blocked daily from default + custom blocklists
- Noticeable reduction in page load times — ad scripts are never fetched
- DNS query log feeds into Mini-SOC Splunk index for SIEM correlation
- Regex filtering catches DGA-pattern (algorithmically generated) domain queries
- Custom blocklist additions: known C2 domains from AbuseIPDB and OTX feeds
- DNS-level filtering intercepts threats before any network connection is established — earlier in the kill chain than IDS
- A single Raspberry Pi adds negligible latency (<2ms) while protecting every device on the network
- Integrating Pi-hole logs into Splunk transforms a simple ad-blocker into a network visibility tool
- Regular blocklist updates are essential — threat actors rotate domains frequently, static lists decay
- Whitelisting requires ongoing attention — aggressive blocklists break legitimate services regularly
- Automated feed from AlienVault OTX: add newly flagged domains to Pi-hole blocklist daily
- ML-based domain classification to catch DGA domains not yet in any blocklist
- Network segmentation with pfSense — different DNS policies per VLAN (IoT vs. laptop vs. guest)
- Dashboard in Splunk showing Pi-hole block rate alongside Suricata alert volume over time