Skip to main content
Investigating .onion services requires purpose-built search tools and strict operational security. Skipping OPSEC steps on the dark web can expose your real identity or machine fingerprint.

Quick reference

NeedSolutionURL
Search .onionAhmiaclean index
Check if data leakedHaveIBeenPwnedAPI
MarketsDarkOwl (paid)
ForumsOnionscan (cli)docker run --rm -it onionscan -service http://forum.onion
CredentialsDeHashed (freemium)
Search .onionTOR Linkhttps://tor.link
Scanner servicesOnionScanhttps://github.com/s-rah/onionscan
Verified directoryDark.failhttps://dark.fail
Old searcherTorch(only .onion)
Scraper onionDarkDumphttps://github.com/josh0xA/darkdump

Specialized tools

ToolFunctionURLRequirement
Ahmia.onion searcherhttps://ahmia.fiWeb browser
OnionScanService scannerhttps://github.com/s-rah/onionscanTor installed
Dark.failVerified directoryhttps://dark.failTor Browser
TorchOld searcher(only .onion)Tor Browser
DarkDumpOnion scraperhttps://github.com/josh0xA/darkdumpPython + Tor

Dark web OPSEC

Failure to follow these OPSEC practices can de-anonymize you or expose your host system. Read every step before connecting.
1

Use Tails OS

Boot from a Tails OS USB drive. Tails is amnesic — it leaves no trace on the host machine after shutdown.
2

Never combine VPN and Tor

Do not use a VPN together with Tor. This creates traffic correlation opportunities that reduce anonymity rather than increasing it.
3

Use bridges if Tor is blocked

If the Tor network is blocked in your location, configure obfs4 or other pluggable transport bridges before connecting.
4

Set NoScript to maximum

Disable all scripts with NoScript set to its maximum restriction level. JavaScript is the primary attack vector for browser fingerprinting and deanonymization.
5

Do not resize the browser window

Never maximize or resize the Tor Browser window. Window dimensions contribute to a unique browser fingerprint.
6

Do not download to persistent disk

Never download files to a persistent storage location. Any downloaded file may contain metadata or phone-home mechanisms that reveal your identity.

Build docs developers (and LLMs) love