You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some customers may wish to block tracking requests from TOR exit nodes, since these can often be used for more nefarious reasons than just normal browsing.
It is important to note that there may exist relays that do not allow TOR exits from that relay, but are only used to pass traffic within the TOR network, we would preferably only want to have the option to block exit node IPs from being tracked.
This should be really simple as TOR is not intended to keep the exit node IPs secret, so one just has to check the official list of IPs: https://check.torproject.org/torbulkexitlist
Some customers may wish to block tracking requests from TOR exit nodes, since these can often be used for more nefarious reasons than just normal browsing.
It is important to note that there may exist relays that do not allow TOR exits from that relay, but are only used to pass traffic within the TOR network, we would preferably only want to have the option to block exit node IPs from being tracked.
There exists this GitHub repo which has a list of IPs: https://github.com/SecOps-Institute/Tor-IP-Addresses
As well as this website https://www.dan.me.uk/tornodes
Which provides an exit node IP list: https://www.dan.me.uk/torlist/?exit
There may be other methods of gathering TOR exit node IPs.
The text was updated successfully, but these errors were encountered: