Hi @Manoj, and thanks for responding.
I see the connections in the Blokada 5 tracker-blocking app. Besides the usual mtalk.google.com, which if I’m not mistaken is unavoidable, even on /e/, Blokada noted all these:
- 
Opening App Lounge, a connection is made to clients3.google.comandandroid.clients.google.com.
- 
Selecting Anonymous Login within the app triggers a connection to play-lh.googleusercontent.com.
- 
Checking for updates to installed apps, calls clients3.google.comagain.
- 
Clicking to App Lounge Home sends android.clients.google.comagain.
- 
Searching for a specific app calls play-lh.googleusercontent.comagain.
- 
Opening the landing page of the searched-for app sends to clients3.google.comagain.
- 
Clicking on a category, e.g. “Medical,” within the Categories tab calls clients3.google.comagain.
- 
Clicking on Terms of Service calls clients3.google.comagain.
- 
Closing the app calls clients3.google.comagain.
I was connected to my home WiFi during this test, but interestingly my Pi-hole application didn’t register a single one of these. (Only mtalk.google.com.)
I’m not qualified to say if these represent anything nefarious or exploitative, but I instinctively distrust any connection to a Google domain, so I would be appreciative of any clarification.