Tor 主機代管

Tor 主機代管 with DDoS 保護 — Keep Your .onion Online

Distributed denial-of-service attacks are one of the biggest threats to Tor 隱藏服務. AnubizHost's DDoS-protected 主機代管 combines Tor-native defenses, proof-of-work challenges, intelligent rate limiting, and multi-server redundancy to keep your .onion site accessible even under sustained attack.

Need this done for your project?

We implement, you ship. Async, documented, done in days.

Start a Brief

DDoS Threats to Hidden Services

Tor 隱藏服務 face unique DDoS challenges that clearnet websites do not. Traditional DDoS mitigation services like Cloudflare cannot protect .onion addresses because they operate at the network layer, while Tor connections are 端對端加密 and routed through multiple 中繼. Attackers exploit this by flooding hidden services with connection requests that overwhelm the Tor process and web server.

Common attack vectors include introduction point flooding, where attackers exhaust the hidden service's introduction points to prevent new connections; rendezvous flooding, where massive numbers of rendezvous circuits consume server resources; and application-layer attacks that send valid-looking HTTP requests designed to consume CPU, memory, or 資料庫 resources.

Without protection, a moderately resourced attacker can take a standard Tor 隱藏服務 offline within minutes. AnubizHost's DDoS 保護 addresses each attack vector with targeted countermeasures, keeping your .onion site accessible to legitimate users while mitigating malicious traffic at multiple layers.

Tor-Native DDoS Mitigation

Tor version 0.4.8+ includes built-in proof-of-work (PoW) defense for hidden services. We enable and optimize this feature on all DDoS-protected plans. When attack traffic is detected, Tor automatically requires connecting clients to solve a computational puzzle before establishing a circuit. Legitimate users solve the puzzle in seconds on modern hardware, while attackers must expend proportionally more resources to maintain their flood.

We configure the PoW difficulty to adapt dynamically based on current load. Under normal conditions, the puzzle is trivial and adds imperceptible delay. Under attack, difficulty scales automatically to match the attack volume, making it economically impractical for attackers to sustain the flood. This adaptive approach ensures legitimate users can always connect, even during large-scale attacks.

Our Tor configuration also uses multiple introduction points distributed across diverse Tor 中繼, making introduction point flooding less effective. If some introduction points are overwhelmed, others continue functioning. We monitor introduction point health and rotate to fresh 中繼 if sustained targeting is detected.

Application-Layer Protection

Application-layer DDoS attacks 繞過 Tor-level defenses by establishing valid Tor 電路 and then sending resource-intensive HTTP requests. Our Nginx configuration includes rate limiting per circuit, connection limits, request size limits, and slow-request timeouts that mitigate these attacks without affecting normal users.

We 部署 a Web Application Firewall (WAF) that inspects HTTP traffic for attack patterns: slowloris connections, repeated requests to expensive endpoints, oversized POST payloads, and malformed requests designed to trigger error handling overhead. The WAF operates locally with no external dependencies and adds minimal latency to legitimate requests.

For sophisticated attacks that mimic legitimate traffic patterns, we implement challenge-response mechanisms at the application layer. Under attack conditions, new visitors receive a lightweight JavaScript challenge page that verifies they are using a real browser before granting access to the application. This stops bot-driven attacks while allowing Tor 瀏覽器 users through with a brief delay.

Redundancy and Failover

The most effective DDoS 保護 for hidden services combines mitigation with redundancy. Our DDoS-protected plans include OnionBalance configuration with multiple backend servers sharing your .onion address. If one backend is overwhelmed by an attack, OnionBalance distributes new connections to healthy backends, maintaining availability even under sustained pressure.

Backend servers are distributed across multiple physical locations, ensuring that a DDoS attack targeting one data center does not affect backends in other locations. Geographic distribution also improves normal-operation performance by reducing circuit length to the nearest healthy backend.

Automatic health checking monitors each backend every 30 seconds and removes unresponsive backends from the OnionBalance rotation within one minute. When a backend recovers, it is automatically re-added. Manual override is available through the control panel for planned maintenance. This self-healing architecture means your .onion service adapts to attacks automatically without requiring human intervention in most scenarios.

Why Anubiz Host

100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included

Ready to get started?

Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.

Support Chat

Online