en
Tor Exit Nodes vs .onion Hidden Services: Key Differences Explained
Two distinct concepts in Tor are often confused: exit relays (which route traffic from Tor to the public internet) and hidden services (.onion addresses that serve content without revealing server location). Understanding the difference matters for operators, users, and anyone studying Tor's architecture.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
What Is a Tor Exit Relay?
A Tor exit relay is the last hop in a Tor circuit before traffic exits to the public internet. When a Tor user visits a clearnet website (example.com), their traffic travels from their device through the Tor network and exits via an exit relay, which makes the connection to example.com on the user's behalf. The exit relay's IP address appears in the destination's connection logs - not the user's real IP. Exit relays can see: the destination hostname (or IP), the destination port, and the content of the connection if it is unencrypted (not HTTPS). Exit relays cannot see: the user's real IP address (it is anonymized by Tor's design), which specific user in the Tor network made the request. The Tor Project maintains a public list of exit relay IP addresses. Website operators can choose to block exit relays (some do), and Tor Browser informs users when they are using an exit relay.
What Is a Tor Hidden Service (.onion)?
A Tor hidden service (officially called an 'onion service') is a server that is accessible only via the Tor network and does not reveal its IP address. The .onion address encodes the service's public cryptographic key. Connection to a hidden service does not pass through an exit relay - both the client and the server build circuits into the Tor network to a shared rendezvous point, and the connection is fully within the Tor network. Key differences from exit relay traffic: the server's IP address is never revealed (not even to Tor relays carrying the traffic), no exit relay is involved (the traffic never leaves the Tor network), the .onion address is cryptographically tied to the service (cannot be impersonated without the private key), and both client and server are anonymous to each other (unless they reveal identifying information).
Traffic Flow Comparison
Exit relay traffic flow: User device -> guard relay -> middle relay -> exit relay -> destination (clearnet). The destination sees the exit relay's IP. Exit relay sees the destination. No party sees both the user's IP and destination simultaneously. Hidden service traffic flow: User device -> guard -> middle -> rendezvous relay <- middle <- guard <- hidden service. Rendezvous relay sees only encrypted traffic from both sides - does not know who is communicating or what service they are accessing. The 6-hop circuit (3 from user, 3 from server) means neither side's IP is exposed anywhere in the path. This is why .onion services provide stronger anonymity than clearnet Tor browsing - there is no exit relay that sees the destination, and no destination that sees an exit relay IP associated with the Tor network.
Legal Implications for Operators
Exit relay operators: historically receive abuse complaints because their IP addresses appear in connection logs for user activity. Law enforcement inquiries to exit relay operators asking for user identification are common. Since exit relays cannot identify Tor users (by design), they cannot provide identifying information. The EFF provides guidance for exit relay operators on handling law enforcement requests. Some jurisdictions have legal protections for relay operators as 'common carriers.' Many commercial hosting providers prohibit exit relay operation due to abuse complaint handling overhead. Hidden service operators: operators of .onion services do not have the same abuse complaint exposure as exit relays (their IP is never exposed in connection logs). The legal risk for hidden service operators relates entirely to the service's content - running a legal service carries no operational legal risk from the Tor mechanism; running an illegal service carries the legal risk of that content regardless of Tor.
Which to Run: Relay, Bridge, or Hidden Service?
Running a Tor relay (guard or middle, not exit): contributes to Tor's capacity and speed. Low legal risk (no exit traffic, no .onion hosting). Good for organizations that want to contribute to Tor without operational risk. Running a Tor exit relay: highest contribution to Tor (exit bandwidth is the most needed), highest operational hassle (abuse complaints). Recommended for organizations with technical staff and a clear abuse response policy. Running a Tor bridge: helps users in censored countries access Tor. Very low legal and operational risk. Bridges are not listed publicly, reducing abuse. Most impactful for users in high-censorship countries. Running a .onion hidden service: provides an anonymous service to users. Legal risk depends on content. Ideal for privacy-focused services, journalism platforms, and legitimate privacy applications. All three are complementary; supporting the Tor network through relays while also using it for hidden services is common practice among privacy-focused organizations.
Related Services
Why Anubiz Host
100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included
Ready to get started?
Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.