Select Page


Darknet & Tor Exit Nodes Data

Darknet websites are accessible only through networks such as Tor (“The Onion Routing” project) and I2P (“Invisible Internet Project”).[17] Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain “.onion”.

What is TOR?

The Tor software keeps a user’s identity hidden by bouncing communications around a distributed network of relays run by volunteers all around the world. This prevents somebody (i.e. a network administrator, an ISP, or even a government) from watching your Internet connection and also stops sites from learning a user’s your physical location.

TOR has been a valuable tool in protecting journalists, researchers, and whistleblowers by keeping their identity hidden while browsing the internet. Unfortunately, these same tools have been used by cybercriminals to launch cyberattacks and operate illegal online marketplaces, part of the so called “darkweb”.

Certain threats can arise from legitimate privacy tools such as VPN (virtual private networks) and anonymous browsers such as TOR. We provide datafeeds to protect against network abuse from anonymous traffic.

Stop Anonymous Abuse

We believe privacy is crucial for a free and open internet, but understand how it can be abused to harm your customers and your business operations. Our threat intelligence data can block TOR exit nodes and connections via VPN tunnels to keep your users safe from malicious traffic via anonymizing services. Threat-specific intelligence easily configurable for almost any network environment.

DROP Bad Traffic

Everyone needs security. That’s why we provide our DROP (Do-Not-Route-or-Peer) dataset free of charge. Our “drop all traffic” lists, powered by Spamhaus, contains the “worst of the worst” of known netblocks used by cybercriminals to disseminate malware, trojan downloaders, botnet controllers, and spam. For more information on the terms and usage of our publicly available feeds, check out our installation guide.