IPASIS - IP Reputation and Risk Intelligence API
πŸ§…

Complete Tor Exit Node List 2026

Real-time database of 2000+ Tor exit nodes. Detect anonymized traffic, prevent fraud, and protect your platform from abuse.

2000+ Active NodesUpdated Daily

What Are Tor Exit Nodes?

Tor (The Onion Router) is an anonymity network that routes internet traffic through multiple encrypted layers. A Tor exit node is the final relay in this chainβ€”where encrypted traffic exits the Tor network and reaches the regular internet.

From your application's perspective, requests appear to originate from the exit node's IP address, not the user's real IP. This creates both legitimate privacy use cases and fraud risks.

Why Flag Tor Traffic?

⚠️ Risk Indicators

  • β€’ Account creation fraud (bulk fake accounts)
  • β€’ Credential stuffing attacks
  • β€’ Scraping and data harvesting
  • β€’ Payment fraud and chargebacks
  • β€’ Review and rating manipulation

βœ… Legitimate Uses

  • β€’ Privacy-conscious users
  • β€’ Journalists and activists
  • β€’ Users in censored regions
  • β€’ Security researchers
  • β€’ Whistleblowers

Best practice: Don't block Tor outright. Instead, apply risk-based restrictions: require email verification, rate-limit actions, or flag for manual review.

Tor Exit Nodes by ASN

Tor exit nodes are hosted across various providers. Some ASNs are specifically created for Tor infrastructure, while others (like VPS and cloud providers) host exit nodes among regular traffic.

Known Tor Exit Node IP Addresses

20 IPs (sample)

Click any IP to view detailed threat intelligence and detection results.

How to Detect Tor Traffic with IPASIS

IPASIS detects Tor exit nodes in real-time (<20ms latency) through multiple detection methods:

  • β€’Live Tor directory consensus parsing (updated hourly)
  • β€’ASN analysis for known Tor infrastructure providers
  • β€’Traffic pattern analysis and fingerprinting
  • β€’Historical abuse data and threat intelligence feeds
curl -X POST https://api.ipasis.com/v1/detect \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "ip": "185.220.101.44"
  }'

# Response:
{
  "ip": "185.220.101.44",
  "tor": true,
  "tor_exit_node": true,
  "vpn": false,
  "proxy": false,
  "trust_score": 85,
  "asn": {
    "number": 60068,
    "name": "Datacamp Limited",
    "risk_level": "high"
  },
  "threats": ["tor", "anonymizer"],
  "recommendation": "require_verification"
}

Blocking Tor Traffic (Code Examples)

Express.js Middleware

const ipasis = require('@ipasis/node');

app.use(async (req, res, next) => {
  const ip = req.ip;
  const result = await ipasis.detect(ip);
  
  if (result.tor_exit_node) {
    return res.status(403).json({
      error: 'Tor traffic not allowed'
    });
  }
  
  next();
});

Next.js Middleware

import { NextResponse } from 'next/server';
import { detect } from '@ipasis/node';

export async function middleware(req) {
  const ip = req.ip || req.headers.get('x-forwarded-for');
  const result = await detect(ip);
  
  if (result.tor) {
    return NextResponse.json(
      { error: 'Tor not allowed' },
      { status: 403 }
    );
  }
}

Related Resources

Start Detecting Tor Traffic Today

Free tier includes 1,000 requests per day. No credit card required. Integrate in minutes with our REST API or SDK.