[tor-talk] Large spike in .onion addresses - port scan?

René Ladan r.c.ladan at gmail.com
Sun Feb 21 07:33:37 UTC 2016


Op 21 feb. 2016 1:39 a.m. schreef "Roger Dingledine" <arma at mit.edu>:
>
> On Sat, Feb 20, 2016 at 02:28:37AM -0600, CANNON NATHANIEL CIOTA wrote:
> > With the large sudden spike in hidden services addresses, any way to
> > view what the newly registered .onion addresses are or at least a
> > list of hidden services during the suspected time frame?
>
> No, there is no easy way to do this. That's because there is no central
> repository of onion addresses. There are services like Ahmia that try to
> enumerate what they can, by looking at various sources like the content
> on a set of known onion sites. But that only lets you learn about sites
> that wanted to let you find out about them.
>
> This is actually a really complicated topic, because there are a wide
> variety of ways of learning about onion addresses, each of which has
> its own ethical questions around how invasive you have to be. For
> example, you can get them by Googling for .onion addresses (probably
> fine), or by being Verizon or Comcast and spying on the people who
> use your DNS servers (not so fine), or by running Tor relays and spying
> on the hidden service descriptors that people upload (not fine).
>
Another service is http://tor.luakt.net , which managed to find my
otherwise unpublished (dummy) onion site after 1 to 2 weeks. It does listen
on port 80 though.

René


More information about the tor-talk mailing list