List of Tor onion services
Appearance
This is an alphabetized list of notable .onion hidden services accessible through the Tor anonymity network. Most are considered dark web services. Defunct services are marked.
Category | Percentage |
---|---|
Gambling | |
Gun | |
Chat | |
New (not yet indexed) |
|
Abuse | |
Books | |
Directory | |
Blog | |
Porn | |
Hosting | |
Hacking | |
Search | |
Anonymity | |
Forum | |
Counterfeit | |
Whistleblower | |
Wiki | |
Bitcoin | |
Fraud | |
Market | |
Drugs |
Category | % of total | % of active |
---|---|---|
Violence | ||
Arms | ||
Illicit Social | ||
Hacking | ||
Illicit links | ||
Illicit pornography | ||
Extremism | ||
Illicit Other | ||
Illicit Finance | ||
Illicit Drugs | ||
Non-illicit+Unknown | ||
Illicit total | ||
Inactive | ||
Active |
Content
Hidden services by category
Commerce
- Assassination market
- Agora (on hiatus)
- Atlantis (defunct)
- AlphaBay Market
- Babylon, an Italian language darknet market, shut down in August 2015[4]
- Black Market Reloaded (defunct)
- C'thulhu - An assassination group that advertises a variety of services, including rape, "underage rape," maiming, bombing, crippling, and murder apparently run by former French foreign legionnaires[5][6]
- Evolution (defunct)
- Hitman network, a site that claims to offer murder for hire[7]
- The Farmer's Market (defunct)
- Sheep Marketplace (defunct)
- Silk Road (defunct)
- TheRealDeal
- Utopia (defunct)
Communications
- Bitmessage.ch
- Cryptocat[8]
- Lelantos, a private and secure email host[9][10]
- Mailpile[11]
- Riseup
- Tor Mail (defunct)
- TorChat
- SKS OpenPGP Public Key Server[12]
Culture
- Deep Web Radio - Worldwide music radio station.[13]
File storage
- Free Haven - A distributed anonymous file storage system that places focus on persistent availability of data. The MIT students' work on the project led to collaboration with DARPA to develop Tor.[14][15][16]
- Freedom Hosting (defunct) - Formerly the largest Tor-specific web host, until the arrest of its owner in August 2013.[17][18]
Financial
- BitBlender, a popular cryptocurrency tumbler. It was hacked in October 2014, but stayed open with the admin promising to pay back lost bitcoins by dropping their commission.[19][20]
- Bitcoin Fog
- Blockchain.info
- Fund the Islamic Struggle without leaving a trace - site claiming to solicit Bitcoin donations for Islamic terrorism since 2013.[21] A fake version was once seized by the FBI during Operation Onymous.[22]
- Helix
Hidden services directories, portals, and information
- All You're Wiki - a wiki similar to The Hidden Wiki additionally featuring static content[23][24]
- The Hidden Wiki
- Tor Links - a static index of .onion links still around from the earlier days of Tor[25][26]
News, whistleblowing and archives of document archives
- BuggedPlanet
- DeepDotWeb
- Doxbin (defunct)
- Filtrala, a Spanish whistleblowing initiative operated by Associated Whistleblowing Press
- GlobaLeaks
- Independent Media Center
- The Intercept
- Ljost, an Icelandic whistleblowing initiative operated by Associated Whistleblowing Press
- NawaatLeaks, an Arabic whistleblowing initiative operated by Nawaat
- ProPublica
- Wikileaks
Nonprofit organizations
- Courage Foundation
- Debian (package repositories)[27]
- Freedom of the Press Foundation
- La Quadrature du Net[28]
- Qubes OS[29]
- Telecomix[30]
- Whonix[31][32]
Pornography
- Cruel Onion Wiki - a hidden service wiki featuring sexualised torture and killing of animals.[33]
- Lolita City (defunct)
- Pink Meth - a hidden service featuring revenge porn, driven to Tor from the clearnet by legal action,[34] the site was shut down in Operation Onymous,[35] only for an archive to later return.[36] In October 2015 it was reported that someone may be trying to make the archive interactive once more.[37]
Search engines
- Ahmia, hidden service search
- BTDigg[38]
- DuckDuckGo
- Grams
- Onion Link, a clearnet based search engine which features its own Tor2web implementation to allow direct site access via the .onion link domain.[39][40]
- Sci-Hub, search engine which bypasses paywalls to provide free access to scientific and academic research papers and articles[41]
- The Pirate Bay[42]
- TORCH, a hidden search search engine which scans lists of .onion addresses to build its indexes[43]
- TorSearch, the first hidden service search engine launched in October 2013 based on spidering a Hidden Wiki[44][45]
Social media and forums
- 8chan
- Chinese dark web - one of the very few Mandarin Internet forums. Launched in October 2014 the forum encourages free discussion and trade with Bitcoin similar to the Russian Anonymous Marketplace.[46] The site does not have much illegal activity but has featured discussions about creating improvised explosive devices.[47]
- Darkode
- Facebook[48]
- HackBB (defunct)
- Hell, a notorious hacking and scamming forum. It shut down for 2 weeks in July 2015 following May's Adult FriendFinder hack.[49][50] It returned some time in early 2016.[51]
- The Hub
- TorBook - social network[52]
- Tor Carding Forum (defunct)
- Russian Anonymous Marketplace
Other
- Yale University, Computer Architecture and Security Laboratory
See also
- Tor software
- .onion
- SecureDrop, a secure communications platform for use between journalists and sources. The first implementation was The New Yorker's Strongbox website.[53][54][55]
- Tor2web, clearnet to hidden service software
References
- ^ Owen, Gareth. "Dr Gareth Owen: Tor: Hidden Services and Deanonymisation". Retrieved 20 June 2015.
- ^ Moore, Daniel. "Cryptopolitik and the Darknet". Survival: Global Politics and Strategy. Retrieved 2016-03-20.
- ^ Cox, Joseph (2016-02-01). "Study Claims Dark Web Sites Are Most Commonly Used for Crimes". Retrieved 2016-03-20.
- ^ DeepDotWeb (2 August 2015). "Italian police Bust "Babylon" Dark Web Market". Retrieved 8 August 2015.
- ^ Peters, Sara (23 June 2015). "Child Exploitation & Assassins For Hire On The Deep Web". Retrieved 4 August 2015.
- ^ Daily Mail Reporter (11 October 2013). "The disturbing world of the Deep Web, where contract killers and drug dealers ply their trade on the internet". Retrieved 25 May 2015.
- ^ Lake, Eli (17 October 2013). "Hitman Network Says It Accepts Bitcoins to Murder for Hire". Retrieved 9 August 2015.
- ^ https://mobile.twitter.com/cryptocatapp/status/402885544247840769
- ^ Hacker10 (1 October 2013). "Lelantos, a secure, anonymous email provider through Tor". Retrieved 7 August 2015.
{{cite news}}
: CS1 maint: numeric names: authors list (link) - ^ Stone, Jeff (2 July 2015). "Dark Net Browser Operator Discovers 255 Faked Sites, Leaving Countless Passwords Vulnerable". Retrieved 7 August 2015.
- ^ https://www.mailpile.is/
- ^ "GnuPG News for September and October 2015: Tor Support". GnuPG. The GnuPG Project. November 3, 2015. Retrieved January 13, 2016.
- ^ Ciancaglini, V.; Balduzzi, M.; McArdle, R.; M., Rösler (2015). "Below the Surface: Exploring the Deep Web" (PDF). TrendLabs Research Paper: 8.
- ^ Dingledine, R.; Mathewson, N.; Syverson, P. (2007). "Deploying Low-Latency Anonymity: Design Challenges and Social Factors" (PDF). IEEE Security & Privacy. 5 (5): 83–87. doi:10.1109/MSP.2007.108.
- ^ Jordan, Tim (2008). "The Politics of Technology: Three Types of 'Hacktivism'". In Häyhtiö, Tapio; Rinne, Jarmo (eds.). Net Working/Networking: Citizen Initiated Internet Politics. University of Tampere. p. 267. ISBN 9789514474644.
- ^ Oram, Andy (2001). Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly Media.
- ^ Howell O'Neill, Patrick (4 August 2013). "An in-depth guide to Freedom Hosting, the engine of the Dark Net". Retrieved 30 May 2015.
- ^ Gallagher, Sean (4 August 2013). "Alleged Tor hidden service operator busted for child porn distribution". Retrieved 30 May 2015.
- ^ White, Mike. "Deep Web Bitcoin Mixer's Recent Hack Restarted The Debate Of Darkcoin Vs Trusted Mixers and Trusted Mixers Won". Retrieved 8 August 2015.
- ^ Greenberg, Andy (11 July 2014). "Waiting for Dark: Inside Two Anarchists' Quest for Untraceable Money". Retrieved 8 August 2015.
- ^ Cox, Joseph (26 February 2015). "Is the Islamic State Using Bitcoin? That's the Last Thing We Should Worry About". Retrieved 11 August 2015.
- ^ Cubrilovic, Nik (17 November 2014). "FBI seizes fake Tor hosted Jihad funding website as part of Operation Onymous, leaves up real site". Retrieved 11 August 2015.
- ^ Stokes, Natasha (19 November 2014). "The Deep Web: Surfing the Dark Side". Retrieved 6 August 2015.
- ^ S. Zavia, Matías (12 February 2015). "Kit de supervivencia en la "deep web"". Retrieved 6 August 2015.
- ^ Chacos, Brad (12 August 2013). "Meet Darknet, the hidden, anonymous underbelly of the searchable Web". Retrieved 6 August 2015.
- ^ Poladian, Charles (26 November 2014). "Tour The Deep Web: Illegal Marketplaces, Book Clubs And Everything In Between". Retrieved 6 August 2015.
- ^ http://richardhartmann.de/blog/posts/2015/08/24-Tor-enabled_Debian_mirror/
- ^ Tor Project (20 Jan 2016). "Our friends La Quadrature Du Net now provide a #Tor onion service! lqdnwwwmaouokzmg.onion". twitter.com. Retrieved 21 January 2016.
- ^ https://qubes-os.org/
- ^ http://telecomix.org/
- ^ https://www.whonix.org/wiki/Verification_Assets#Whonix_Sites
- ^ https://www.whonix.org/wiki/Datenschutz#Technical_Information
- ^ Cox, Joseph (11 November 2014). "As the FBI Cleans the Dark Net, Sites Far More Evil Than Silk Road Live On". Retrieved 3 August 2015.
- ^ Markowitz, Eric (10 July 2014). "The Dark Net: A Safe Haven for Revenge Porn?". Retrieved 3 August 2015.
- ^ Gilbert, David (10 November 2014). "Pink Meth Revenge Porn Darknet Website Shut Down by FBI in Operation Onymous". Retrieved 4 August 2015.
- ^ Cox, Joseph (29 June 2015). "Revenge Porn Returns to the Dark Web". Retrieved 3 August 2015.
- ^ Cox, Joseph (14 October 2015). "Someone Is Trying to Bring Back the Most Infamous Dark Web Revenge Porn Site". Retrieved 14 October 2015.
- ^ https://btdigg.org/
- ^ Paganini, Pierluigi (23 February 2015). "Onion.City: Access the Deep Web From A Browser". Retrieved 15 October 2015.
- ^ Stockley, Mark (18 February 2015). "Onion.city - a search engine bringing the Dark Web into the light". Retrieved 15 October 2015.
- ^ Van der Sar, Ernesto (21 November 2015). "Sci-Hub, BookFi and LibGen Resurface After Being Shut Down". TorrentFreak. Archived from the original on 22 November 2015. Retrieved 16 January 2016.
{{cite web}}
: Italic or bold markup not allowed in:|publisher=
(help) - ^ Andy (31 December 2015). "Pirate Bay is Back to Square One After Months of Domain Hopping". TorrentFreak. Retrieved 16 January 2016.
The TOR/Onion address uj3wazyk5u4hnvtk.onion should also be fine longer term but it's hardly the most memorable set of digits for anyone to recall.
{{cite web}}
: Italic or bold markup not allowed in:|publisher=
(help) - ^ Alex (7 August 2015). "Mass 'Dark Web' Scanning With PunkSPIDER". Retrieved 8 August 2015.
- ^ Koetsier, John (10 October 2013). "TorSearch launches to be the Google of the hidden Internet". Retrieved 8 August 2015.
- ^ Couts, Andrew (11 October 2013). "TorSearch makes finding the next Silk Road a lot easier". Digital Trends. Retrieved 8 August 2015.
- ^ Cox, Joseph (25 February 2015). "What Firewall? China's Fledgling Deep Web Community". Retrieved 3 August 2015.
- ^ Cox, Joseph (18 May 2015). "The Chinese Deep Web Takes a Darker Turn". Retrieved 3 August 2015.
- ^ Facebook (2014, October 31). Facebook Protect the Graph blog. Retrieved 31 October 2014
- ^ Kamath, Maya (22 July 2015). "HELL hacking forum on Dark Web just went to hell". Retrieved 6 August 2015.
- ^ Stone, Jeff (6 August 2015). "Dark Net Hacking Forum 'Hell' Returns Months After Adult Friend Finder Breach". Retrieved 6 August 2015.
- ^ Franceschi-Bicchierai, Lorenzo (4 January 2016). "The Dark Web Hacking Forum 'Hell' Is Back Online". Retrieved 10 January 2016.
- ^ Sharma, Rakesh (14 April 2015). "What is the Deep Web and How Does It Work?". Retrieved 29 August 2015.
- ^ Strongbox. The New Yorker. Retrieved 15 November 2013.
- ^ Biryukov, Alex; Pustogarov, Ivan; & Weinmann, Ralf-Philipp. (2013). Content and popularity analysis of Tor hidden services. ArXiv.org (Cornell University Library). Retrieved 15 November 2013.
- ^ Davidson, Amy. (2013, May 15). Introducing Strongbox. The New Yorker. Retrieved 26 December 2013.