Complete Tor Exit Node List 2026
Real-time database of 2000+ Tor exit nodes. Detect anonymized traffic, prevent fraud, and protect your platform from abuse.
What Are Tor Exit Nodes?
Tor (The Onion Router) is an anonymity network that routes internet traffic through multiple encrypted layers. A Tor exit node is the final relay in this chainβwhere encrypted traffic exits the Tor network and reaches the regular internet.
From your application's perspective, requests appear to originate from the exit node's IP address, not the user's real IP. This creates both legitimate privacy use cases and fraud risks.
Why Flag Tor Traffic?
β οΈ Risk Indicators
- β’ Account creation fraud (bulk fake accounts)
- β’ Credential stuffing attacks
- β’ Scraping and data harvesting
- β’ Payment fraud and chargebacks
- β’ Review and rating manipulation
β Legitimate Uses
- β’ Privacy-conscious users
- β’ Journalists and activists
- β’ Users in censored regions
- β’ Security researchers
- β’ Whistleblowers
Best practice: Don't block Tor outright. Instead, apply risk-based restrictions: require email verification, rate-limit actions, or flag for manual review.
Tor Exit Nodes by ASN
Tor exit nodes are hosted across various providers. Some ASNs are specifically created for Tor infrastructure, while others (like VPS and cloud providers) host exit nodes among regular traffic.
Known Tor Exit Node IP Addresses
20 IPs (sample)Click any IP to view detailed threat intelligence and detection results.
How to Detect Tor Traffic with IPASIS
IPASIS detects Tor exit nodes in real-time (<20ms latency) through multiple detection methods:
- β’Live Tor directory consensus parsing (updated hourly)
- β’ASN analysis for known Tor infrastructure providers
- β’Traffic pattern analysis and fingerprinting
- β’Historical abuse data and threat intelligence feeds
curl -X POST https://api.ipasis.com/v1/detect \
-H "Authorization: Bearer YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"ip": "185.220.101.44"
}'
# Response:
{
"ip": "185.220.101.44",
"tor": true,
"tor_exit_node": true,
"vpn": false,
"proxy": false,
"trust_score": 85,
"asn": {
"number": 60068,
"name": "Datacamp Limited",
"risk_level": "high"
},
"threats": ["tor", "anonymizer"],
"recommendation": "require_verification"
}Blocking Tor Traffic (Code Examples)
Express.js Middleware
const ipasis = require('@ipasis/node');
app.use(async (req, res, next) => {
const ip = req.ip;
const result = await ipasis.detect(ip);
if (result.tor_exit_node) {
return res.status(403).json({
error: 'Tor traffic not allowed'
});
}
next();
});Next.js Middleware
import { NextResponse } from 'next/server';
import { detect } from '@ipasis/node';
export async function middleware(req) {
const ip = req.ip || req.headers.get('x-forwarded-for');
const result = await detect(ip);
if (result.tor) {
return NextResponse.json(
{ error: 'Tor not allowed' },
{ status: 403 }
);
}
}Related Resources
Start Detecting Tor Traffic Today
Free tier includes 1,000 requests per day. No credit card required. Integrate in minutes with our REST API or SDK.