How to Create Custom Domains with PiHole and NGINX Proxy Manager

If you run your own home lab, you know that things can get pretty wild when trying to remember IP addresses and port numbers. There is a way to fix that!

In my case, I run multiple services on multiple different machines. Unraid and most of my Docker containers on my Dell PowerEdge server, Home Assistant on a Raspberry Pi 4, Multiple PiHole instances on more Raspberry Pis with automatic sync and failover, opnSense on an HP Thin Client, and a few others. It gets really confusing to remember what IP everything is on and then you have to remember ports on top of that!

Sure, you can use a dashboard like Flame to list all of your services, and that is a perfectly viable option. But some of my devices and services I would like to access just as if I was accessing it as a normal website. To do this, I leverage NGINX Proxy Manager and PiHole to create a fake domain that I can use within my network!


For the most part, taking care of remembering all of the IPs is pretty easy by setting up host names for each of your devices. For example, instead of having to remember “” for my primary PiHole instance, I would just have to remember “pihole” and type that in to my address bar to access it. But there are a couple of problems with using this method:

  • You can have the same hostname on multiple devices. This can eventually confuse the network and make things not load.
  • The network needs to be set up to allow the use of host names. Most modern devices allow this by default.

Instead, I use the local DNS records of PiHole to create a custom domain that can be used within my network. It doesn’t even need to be a TLD domain like .com or .net. I use .sudo in my network. This allows me to separate each device in to its own ‘domain’.

If you want to take this even further, you can also use NGINX Proxy Manager to reverse proxy your custom domain to services that uses ports. This is especially useful if you use a particular service a lot. An instances I use within my network: I use Apprise API to send notifications to devices or programs. Instead of having to remember “”, I can shorten the url down to “apprise.sudo/notify” and use the service like I was typing out the IP and port. Much easier to remember.

Another advantage of using this method is that if an IP changes for whatever reason, you only have to change the IP in one location instead of having to go to each and every application and changing IPs to reference other services.


To follow along with this guide, you will need the following set up and running:

  • PiHole
  • Docker (If you want to use NGINX Proxy Manager)
  • NGINX Proxy Manager (If you want to forward to ports)

I am assuming that you have your routers DNS settings pointed to your PiHole instance so that every device on your network is using PiHole.



If you want to set up a service that redirects to a specific port, pleas skip to the next section.

Log in to your PiHole admin panel.

On the left menu, click on “Local DNS” > “DNS Records”.

The top section should read “Add a new domain/IP combination”.

  • For “Domain”, enter in the domain that you would like to use. It does not have to be a valid domain. For example, all of my domains end in “.sudo”.
  • For “IP Address” enter in the LAN IP address that the domain will point to.

In my case, if I wanted to add my domain of “tower.sudo” to point to the LAN IP of “”, I would enter in “tower.sudo” under domain and “” for the IP.

Setting up ports

Navigate to and log in to your PiHole admin panel.

On the left menu, click on “Local DNS” > “DNS Records”.

The top section should read “Add a new domain/IP combination”.

  • For “Domain”, enter in the domain that you would like to use. It does not have to be a valid domain. For example, all of my domains end in “.sudo”.
  • For “IP Address” enter in the IP of your NGINX Proxy Manager instance. NPM has to have ports 80 and 443 accessible to NPM. If 80 and 443 are forwarded to a different service, this will not work.

Now navigate to and log in to NGINX Proxy Manager.

Click on the “Hosts” button and then add a host.

In the pop-up, we only need to fill out the “Details” tab since we are keeping everything in house.

  • Domain Names: Enter in the domain that you used in PiHole.
  • Scheme: Usually you can just leave this as “http”. Some programs, such as NextCloud and opnSense, you have to access via “https”.
  • Forward Hostname / IP: This is the IP that will be the IP that the service is running on.
  • Forward Port: Enter the port number that you are forwarding to.


Make sure you hit Enter or Return after typing the URL! If you do not do this, the URL field will not populate. The URL should be surrounded with a gray bubble like in the image below if you did it correctly.

For the toggles below, I usually just toggle “Block Common Exploits” and “Websockets Support”.

Now, you can click “Save”.



The first time you access the new domain on a device, you will have to enter in “http://{domain}” for the DNS to propagate correctly. Every time afterwards, you wont have to enter in “http://”.

At this point, you should be able to access your domain through any web browser as long as both devices are within your network. The nice thing is that you don’t have to use a proper TLD and customize the domain to your content.


  1. Mellow Bill on March 5, 2022 at 8:32 am

    I’m curious, can you reverse proxy Pi-Hole and even NgxPM with this method? I tried and it doesn’t seem to work – I guess because I am trying to DNS the DNS, and reverse-proxy the reverse-proxy!?!? So, with pi-hole and NgxPM, you would have to stick with calling the ip address only on these two services?

    One last thing; I tried to add my router address to the pi-hole DNS (basically but this resulted in not working. It constantly forced https, and then failed. It doesn’t specify a port to access, so don’t need to rout to NPM, but as it wasn’t working as just a DNS setting, I tried it any way with host and redirect… both had the same issue as just DNS entry. I can’t figure out why this is, but I am putting it down to a security feature on my (internet provider provided) router, do you think that’s a reasonable assumption?


    • LTM on March 20, 2022 at 5:57 pm

      You should be able to, yes. I have both my PiHoles proxied so I can use pihole.sudo and pihole2.sudo and can access them. I actually did this with just PiHole since you access the UI on port 80 alone so there is no need for NPM on this one. I have not tried to reverse proxy NPM but I don’t see why it wouldn’t work.

      Usually routers have a security feature that doesn’t allow rebound addresses without specifically setting it up within the router itself. Since it is an ISP provided router and they usually give you pretty crappy ones, I doubt it would have that feature.

Leave a Comment