The trouble now is too many are sites apply blanket bans on Tor exits.
Starting with tor 0.3.0.x if your exit relay has multiple public IP addresses you can use one of them for exiting only without the need of an additional VPN (which degrades performance)
Depending on setup, shuffling exit traffic between two private points (via whatever means, your own, or a commercial service) may not be terrible performance compared to another tor hop, to internet issues, or to otherwise poor performance in the tor circuit and its boxes. Such shuffling of already exited traffic no longer uses the tor process with its associated crypto and other CPU / RAM overhead, has no need to be encrypted, and adds one more bind / localhost / lan / wan hop which can be quite fast in comparison.
this not-announced exiting IP address will also be listed in the list of exit addresses. https://collector.torproject.org/recent/exit-lists/
Thankfully this is not the only list that the "internet" subscribes to. Many other lists do not list such addresses. Holes in censorship are a good thing.
Including around hosters that do let you run relays but don't let you run exit traffic, thus making you shuffle it elsewhere, made easier if some market dynamic has bandwidth nearly free to the operator.