Investigation into finding unknown onion addresses on the Tor Network.
We are not responsible for the bad use of the Hidden Services information discovered or the information contained in them.
Some of the following addresses may contain questionable images, explicit or offensive content, not recommended for everyone.
All results that contain detected with pedophilic content have been excluded from this repo and have been given to the Department for Child Protection. ( > 60 addresses)
Over the last year, as part of a larger research project on the anonymous Tor Network, we found ourselves needing to building a spider so that we could discover the addresses of new hidden services.
These addresses have been obtained by extracting them directly from the Tor nodes, instead of scraping web pages. This gave us the ability to find onion addresses that have not been published anywhere before.
In this repo we share the results of our investigation, with the hope that others find these onion addresses useful in their experiments.
For each discovered Onion address, the following process was carried out:
- Resolve HS Descriptor
- Port Scanning
- Capture Website Screenshot
- Capture of Hidden Services keywords
As a summary, the investigation found:
- 76.987 onion addresses discovered
- 34.150 active onions
- 18.081 onions scanned and with open ports detected
- 13.822 web screenshots taken
Dashboard- all hidden services that were captured during the investigation.Search Engine(beta) - search for content found within the investigation.