A look at the traffic originating from my Tor Exit relays

Have you ever wondered which clearnet web domains (as in not onions) are the most popular among users of The Onion Router project (Tor)? Is there any evidence to support the popular mainstream opinion that Tor is predominantly used by people with malicious and criminal intent? To add some spice to this question in 2026, I’ve aggregated non-identifiable data based on DNS queries made by my five Tor exit relays.

Disclaimer

This article does not pretend to be based on any scientific research, and the sample data is too small to provide any real value. I am also guilty of overstating the value of DNS logs when it comes to understanding traffic from Tor users. Only non-identifiable data has been used, and there are no attempts to perform any correlation with specific users or exit nodes.

Available data

  • Exit relays: 5
  • Log period: 1 week
  • Aggregated log files: 5
  • Total lines parsed: 60159688
DNS traffic from a Tor Exit Relay

An Unbound DNS server showing DNS queries from a Tor Exit Relay.

Classifying, extracting, and accumulating

All my Tor Exit relays use the Unbound DNS server. I have a mix of FreeBSD and Linux-based relays. I’ve made a Python script to parse the aggregated Ubound logs to identify and classify the data down to registrable domains and suffixes in a few steps.

Here is the gist of it.

Step one: Classify

  • WEB: Normal lookups
  • RDNS/PTR: Reverse DNS / PTR
  • IP-ISH: forward lookups where the hostname encodes an IP address

Step two: Normalize, extract, and discard

Extracting the registrable domains (eTLD+1) sounded like an easy task, but later, I realized that my increasingly growing list of regular expressions was not up to the task. My thanks to John Kurkowski for providing tldextract: A Python library to parse URLs.

The result

After discarding enumerated queries and malformed/unwanted patterns from the logs, we’re left with the following:

ClassCountShare
WEB2219264498.818%
IP-ISH2493161.110%
RDNS/PTR162240.072%
Total22458184100.000%

The top lists.

Finally, it’s time to break it all down. Let’s find out what the majority of Tor users are doing on the Internet.

A screenshot from the cult movie Hackers (1995)

Hackers (1995). Just because this article needed a cool image :)

The moment of truth, unfiltered.

#Registrable domainCountCategory
1digitaloceanspaces.com881207Cloud storage / object storage
2amazonaws.com568758Cloud infrastructure
3googlevideo.com467369Video CDN / streaming
4fbcdn.net271484CDN / static content
5google.com130091Search / web services
6googleapis.com103697API platform
7adsco.re95874Advertising / redirects
8REDACTED91342Adult content / video CDN
9blogspot.com90937Blogging / publishing
10REDACTED84911Adult content / video CDN
11REDACTED82825Adult content / media sharing
12cloudfront.net82121CDN
13tiktokcdn.com60569CDN / media delivery
14googlesyndication.com57701Advertising / ad-serving
15tiktokv.com55131Video delivery / backend
16apple.com51101Technology / official site
17REDACTED49051Adult content / video CDN
18gvt1.com48721CDN / cache / updates
19REDACTED42730Adult content / video CDN
20amazon-adsystem.com41343Advertising / tracking
21doubleclick.net39803Advertising / tracking
22REDACTED39792Adult content / video CDN
23cdninstagram.com38169CDN / media delivery
24outlook.com36901Email / webmail
25microsoft.com36735Technology / official site

To the surprise of no one, the Internet is currently being overrun by big tech and the advertising industry. The most surprising result in this list, as far as I’m concerned, is that Blogspot is still alive. And DigitalOcean is (apparently) a big player in the realm of object storage.

If we just focus on regular domains that users visit directly, we get a slightly different list.

#Registrable domainCountCategory
1google.com130091Search / web services
2blogspot.com90937Blogging / publishing
3apple.com51101Technology / official site
4outlook.com36901Email / webmail
5microsoft.com36735Technology / official site
6amazon.com36169E-commerce
7facebook.com31662Social media
8ipleak.net31348Security / testing
9sblo.jp31324Blogging / publishing
10reddit.com26889Forum / social news
11naver.com26299Portal / search
12trezor.io25623Crypto hardware wallet
13ask.com21820Search / web portal
14mozilla.net21782Software / services
15squarespace.com20862Website builder
16yahoo.com19915Portal / email / news
17torproject.org19785Privacy / nonprofit
18tumblr.com18621Blogging / social
19wordpress.com18515Blogging / publishing
20yandex.ru17417Portal / search
21roblox.com17006Gaming
22instagram.com16659Social media
23twitter.com16408Social media
24youtube.com15513Video / streaming
25live.com15161Email / web portal

Speaking of Blogspot, I’ve looked at the list of subdomains, and as far as I can see, it’s all just regular blogs by everyday people. The most popular one belongs to a techno artist promoting his music.

Other interesting findings

DNS queries seem like a more reliable indication of the popularity of your favorite Linux distro than Distrowatch’s infamous ranking.

#DistroRegistrable domainDNS rank
1Ubuntuubuntu.com349
2Debiandebian.org606
3Tailstails.net1104
4Qubes OSqubes-os.org1680
5Arch Linuxarchlinux.org3032
6Fedorafedoraproject.org3239
7Oracle Linuxoracle.com5859
8Gentoogentoo.org7445
9Manjaromanjaro.org7599
10Red Hat (RHEL)redhat.com8176

Quite the difference from Distrowatch’s top 10. In fact, a few of the top 10 distributions from Distrowatch’s list had zero DNS requests.

FQDN / subdomains

I won’t be publishing this information in detail, as some companies seem to believe that DNS zone files are hidden or somehow secret information. Alas, there is no need to guard the server on the other end of the pointer. Deploy and forget, I guess, the benefits of automation.

However, I’ll make one exception to this rule. Apple has a few peculiar ones, including pancake.apple[.]com and swallow.apple[.]com.

Additionally, the poor and starving children forced to assemble your next iPhone in a faraway country are sending Morse signals from captive.apple[.]com. Mean-spirited geo-political jokes aside, this record was probably coming from Tim Cook himself, being held captive and forced to watch the Melanie premiere from inside the White House.

Logs on Tor Exit relays?

You should always have a “no logging” policy on Tor relays!

This seems entirely reasonable if you’ve never hosted servers. Tor relays (like anything else available on the Internet) are constantly under attack, and without any logs, you’re just fumbling through the dark.

Roger Comply avatar
Roger Comply
Thank you for reading!
Feel free to waste more time by subscribing to my RSS feed.