Technical guide to onion services, Tor hidden services, onion routing, and .onion marketplaces
Onion services (formerly called hidden services) represent websites accessible only through the Tor network, identified by .onion addresses. Unlike traditional websites with IP addresses, onion services remain hidden behind multiple layers of encryption and routing, making server locations untraceable. Darknet marketplaces operate exclusively as onion services, leveraging Tor's anonymity to protect both operators and users.
Onion services provide bidirectional anonymity - neither the server operator nor users can determine each other's IP addresses. Traditional websites expose server IPs, enabling law enforcement to locate and seize servers. Onion services eliminate this vulnerability through Tor's onion routing protocol, creating truly anonymous communication channels. This architecture makes onion marketplaces significantly more resilient than traditional dark web sites.
Onion addresses have evolved through three versions, with v3 addresses becoming standard in 2026. Version 1 (v1) used 16-character addresses but was deprecated due to security weaknesses. Version 2 (v2) used 16-character addresses with better security but was phased out in 2021. Version 3 (v3) uses 56-character addresses providing stronger cryptography and improved security.
| Version | Length | Example | Status |
|---|---|---|---|
| v1 | 16 chars | example123456.onion | Deprecated 2017 |
| v2 | 16 chars | exampleabcdef123.onion | Deprecated 2021 |
| v3 | 56 chars | exampleabcd...xyz.onion | Current standard |
Onion routing encrypts data in multiple layers (like an onion), with each Tor relay decrypting one layer to reveal the next destination. When accessing an onion marketplace, your connection passes through three random Tor relays (entry guard, middle relay, exit relay for clearnet or rendezvous point for onion services). Each relay knows only the previous and next hop, never the complete path.
Darknet marketplaces operate as onion services because traditional hosting would expose server locations to law enforcement. Onion services provide server anonymity, making physical seizure nearly impossible without operational mistakes. Additionally, onion services cannot be taken down through DNS manipulation or ISP blocking, requiring users to actively access through Tor.
These nine onion marketplaces operate as Tor hidden services, accessible only through Tor Browser. Each .onion address represents a v3 onion service with 56-character address.
Drug Hub operates as a Tor hidden service with verified .onion address and secure onion routing.
Apocalypse operates as a Tor hidden service with verified .onion address and secure onion routing.
TorZon operates as a Tor hidden service with verified .onion address and secure onion routing.
Black Ops operates as a Tor hidden service with verified .onion address and secure onion routing.
Nexus operates as a Tor hidden service with verified .onion address and secure onion routing.
Atlas operates as a Tor hidden service with verified .onion address and secure onion routing.
WarpZone operates as a Tor hidden service with verified .onion address and secure onion routing.
Dark Matter operates as a Tor hidden service with verified .onion address and secure onion routing.
Sklad operates as a Tor hidden service with verified .onion address and secure onion routing.
The Tor network consists of thousands of volunteer-operated relays routing encrypted traffic through multiple hops. Understanding Tor architecture helps users appreciate the anonymity protections enabling onion marketplaces to operate securely.
The Tor network includes several component types working together to provide anonymity. Directory authorities maintain consensus about network state, relays forward traffic, entry guards serve as first hop, middle relays provide intermediate routing, and exit relays connect to clearnet (not used for onion services).
| Node Type | Function | Knows |
|---|---|---|
| Directory Authority | Maintains network consensus | All relay information |
| Entry Guard | First hop in circuit | Your IP, next relay |
| Middle Relay | Intermediate routing | Previous/next relay only |
| Exit Relay | Connects to clearnet | Destination (not for onion) |
| Rendezvous Point | Connects to onion service | Neither client nor server |
When accessing an onion marketplace, Tor Browser creates a circuit through three randomly selected relays. The first relay (entry guard) is chosen from a small set of stable relays used consistently for months, reducing timing attack risks. The second (middle relay) and third (rendezvous point for onion services) are randomly selected for each circuit.
Connecting to an onion marketplace involves more complex process than accessing regular websites. The onion service publishes its existence to introduction points, clients learn about these through hidden service directories, and connections occur through rendezvous points where neither party learns the other's location.
Data traveling through Tor to an onion marketplace receives multiple encryption layers. Each relay decrypts one layer, revealing only the next destination. This layered approach (hence "onion") ensures no single relay can determine both source and destination.
When sending data to onion marketplace:
Successfully accessing onion marketplaces requires understanding technical aspects of Tor usage, onion address verification, and common pitfalls to avoid.
Phishing represents the primary threat to onion marketplace users. Attackers create fake sites with similar onion addresses, stealing credentials and cryptocurrency. Always verify onion addresses through multiple trusted sources including Dread forum, PGP-signed messages from administrators, and community verification sites.
Tor Browser requires proper configuration for optimal security when accessing onion marketplaces. Set security level appropriately, disable JavaScript when possible, and understand trade-offs between security and functionality.
Onion services typically load slower than regular websites due to multiple encryption layers and routing hops. Six Tor relays participate in each connection (three for client, three for service), each adding latency. Patient users understand this trade-off between speed and anonymity.
Connection failures to onion marketplaces can result from various issues including service downtime, Tor network problems, or local configuration issues. Understanding troubleshooting steps helps resolve access problems.
| Problem | Possible Cause | Solution |
|---|---|---|
| Cannot connect | Service offline or wrong address | Verify address, try later |
| Very slow loading | Circuit performance or service load | Request new circuit |
| Timeout errors | Tor network congestion | Wait and retry |
| Certificate warnings | Normal for onion services | Proceed if address verified |