VPS for Hosting Tor Hidden Services and .onion Sites
Running a Tor hidden service requires a hosting provider that understands the network topology, respects operational privacy, and will not terminate your server at the first sign of unusual traffic patterns. AnubizHost offers offshore VPS specifically suited for .onion site operators.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
What Makes a VPS Suitable for Tor Hidden Services
Not all VPS providers are equal when it comes to running Tor hidden services. The key requirements are: a provider that does not flag or terminate accounts based on Tor relay traffic, a jurisdiction that does not compel disclosure of service operators without a court order, stable uptime (Tor hidden services lose their directory entry if the server goes offline for extended periods), and full root access to configure the Tor daemon correctly.
AnubizHost meets all four criteria. Our offshore locations in Romania and Iceland sit outside the reach of US subpoenas and UK RIPA orders. Our abuse policy requires a valid legal process from the hosting jurisdiction before any action is taken. Tor relay and hidden service traffic does not trigger automatic account suspension.
Stable uptime is critical for hidden service operators. Tor's Hidden Service Directory (HSD) protocol requires that your introduction points remain available. Extended outages cause your .onion address to become unreachable even after the server comes back online, requiring a full re-announcement cycle. AnubizHost's 99.9% uptime SLA and redundant network infrastructure minimize this risk.
Full root access allows you to configure Tor exactly as your use case requires - including HiddenServicePort mappings, introduction point count, authorization cookies for restricted access, and integration with application-layer anonymization layers like Whonix or torsocks.
Setting Up a Tor Hidden Service on Your VPS
Configuring a Tor hidden service on an AnubizHost VPS is straightforward. After receiving your server credentials, install Tor from the official repository for your chosen Linux distribution. Edit the torrc configuration file to add HiddenServiceDir and HiddenServicePort directives pointing to your application's listening port.
Tor will generate your .onion address automatically in the HiddenServiceDir folder. For vanity addresses (addresses that start with specific characters), tools like mkp224o allow offline generation of matching key pairs - you then transfer the generated private key to your server. This process can take hours to days depending on desired prefix length.
Best practice for hidden service operators includes running the application (web server, database) only on localhost, never exposing it on the public IP. Use separate system users for the Tor process and the application process. Consider running the application inside a Docker container or dedicated VM for additional isolation.
AnubizHost VPS plans include kernel-level network isolation that prevents cross-tenant traffic inspection. Your hidden service traffic exits through the Tor network before reaching the internet - AnubizHost's network sees encrypted Tor traffic, not your application's content. This is the correct threat model for most hidden service operators.
Jurisdictional Advantages for .onion Operators
The legal environment around Tor hidden services varies significantly by country. US-based providers operate under laws that can compel disclosure of server contents and operator identity with relatively low judicial thresholds. The Electronic Communications Privacy Act (ECPA) and National Security Letters (NSLs) create backdoor disclosure risks even for providers with good privacy policies.
AnubizHost's Romanian and Icelandic datacenter locations operate under EU data protection law (GDPR) and local constitutional protections respectively. A court order from a Romanian or Icelandic court is required before any server access or data disclosure. These jurisdictions do not honor US or UK extrajudicial requests.
Iceland in particular has a strong tradition of press freedom and digital rights, codified in the Icelandic Modern Media Initiative (IMMI). The country has hosted privacy-focused organizations, journalists, and whistleblower platforms for decades. Iceland's legal framework is among the most protective available for privacy-sensitive operators.
Choosing AnubizHost's Iceland location for your hidden service means your infrastructure is protected by one of the strongest privacy-friendly legal frameworks available. Combined with Tor's network-layer anonymization, this creates a defense-in-depth approach that protects both operator identity and service availability.
Pricing and Getting Started
Entry VPS plans start at $17.90/mo and include sufficient resources for a lightweight Tor hidden service. For sites expecting significant traffic - forums, marketplaces, media archives - mid-tier plans with 4-8 vCPUs and 8-16GB RAM provide the headroom needed for concurrent connections through Tor's circuit system.
Payment is accepted in Bitcoin, Monero, ETH, and USDT. No account registration with personal details is required. You provide an email address for service notifications - a disposable or anonymous email works fine. No identity documents, no phone verification, no credit card.
Server provisioning is automated. After payment confirmation, you receive SSH credentials within minutes. Choose your preferred Linux distribution at checkout - Debian, Ubuntu, CentOS, and other major distributions are available. From there, Tor installation takes under ten minutes.
Support for Tor hidden service configuration questions is available via our ticket system. Our technical team has experience with Tor infrastructure and can assist with complex configurations including onion balance for load-balanced hidden services, authentication-gated services, and integration with privacy-preserving application stacks.
Related Services
Why Anubiz Host
Ready to get started?
Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.