Tor VPS
Tor VPS optimized for Tor network services. Deploy .onion sites on hardened infrastructure with high uptime, DDoS protection, and anonymous cryptocurrency payments. No logs, no KYC, no questions.
DDoS Mitigation
Protection against attacks targeting hidden services and Tor nodes
Monero Payments
Pay with XMR for cryptographic transaction privacy beyond Bitcoin
No Logs Ever
Zero logging policy — we cannot identify users even if compelled
Fast Hardware
NVMe storage and dedicated CPU cores for responsive hidden services
Available Plans
Offshore Iceland I
1 CPU Core, 1 GB RAM, 20 GB SSD, 1 TB Traffic - Iceland jurisdiction
Available locations:
Offshore Romania I
1 CPU Core, 1 GB RAM, 20 GB SSD, 1 TB Traffic - DMCA-ignored, Privacy-focused
Available locations:
n8n Offshore Pro
High-performance offshore n8n hosting for complex workflows.
Available locations:
Bulletproof VPS Large
2 vCPU, 4 GB RAM, 80 GB NVMe, 3 TB Traffic
Available locations:
Bulletproof VPS Medium
1 vCPU, 2 GB RAM, 40 GB NVMe, 2 TB Traffic
Available locations:
Bulletproof VPS Small
1 vCPU, 1 GB RAM, 20 GB NVMe, 1 TB Traffic
Available locations:
Hosting for the Tor Network
Tor (The Onion Router) provides anonymous communication by routing traffic through multiple encrypted relays. Hosting Tor services requires infrastructure that is reliable, private, and resistant to external pressure. AnubizHost provides server infrastructure optimized for Tor hidden services (.onion sites), relay nodes, and bridge nodes, backed by our offshore jurisdiction and no-logs policies.
Hidden Service Hosting
Tor hidden services allow you to host websites accessible only through the Tor network via .onion addresses. Our servers provide the uptime and performance needed for reliable hidden service operation. Full root access lets you configure Tor, install your web stack, and manage your hidden service with complete control. Our no-logs policy ensures that even we cannot identify the traffic patterns of your hidden service.
Infrastructure Requirements for Tor
Tor services benefit from servers with high uptime (for descriptor availability), fast storage (for responsive page loading), and reliable networking (for stable Tor circuits). Our NVMe-equipped servers with 99.9% uptime SLA meet these requirements. DDoS protection is particularly important for Tor services, which are frequent attack targets, and is included on all plans.
Frequently Asked Questions
How do I pay for Tor VPS privately?
Monero (XMR) provides the highest level of payment privacy for Tor hosting. Bitcoin is also accepted but is pseudonymous rather than private. We also accept Ethereum, Litecoin, and 20+ other cryptocurrencies. No identity verification is required for any payment method.
What OS is recommended for Tor VPS?
We recommend Debian or Ubuntu for Tor hosting as they have the best support for the Tor software packages. The Tor Project maintains official repositories for both distributions with timely security updates. However, you have full root access and can use any Linux distribution that supports the Tor software.
Is hosting Tor services legal?
Hosting Tor services is legal in all jurisdictions where we operate. Tor itself is a legitimate privacy tool used by journalists, activists, researchers, and privacy-conscious individuals worldwide. The legality of your specific content depends on local law, but the act of hosting Tor infrastructure is not illegal.
What is the uptime for Tor VPS?
We maintain a 99.9% infrastructure uptime SLA. Tor hidden services depend on both server availability and Tor network health. Our high uptime ensures your .onion service descriptor remains published and accessible. We recommend monitoring your hidden service independently to detect Tor-specific issues.
Do you monitor Tor traffic on your servers?
No. We do not monitor, inspect, or log any traffic flowing through your server, whether it is Tor traffic or regular traffic. We cannot see the content of encrypted Tor connections, and we make no attempt to analyze traffic patterns or identify Tor users connecting to your services.
Is DDoS protection effective for Tor hidden services?
Our DDoS protection filters volumetric attacks at the network level, which protects the underlying server infrastructure. However, application-layer attacks specifically targeting Tor hidden services require additional measures like rate limiting and proof-of-work challenges that you configure within your Tor hidden service setup.
Get Started with Tor VPS
Deploy your tor vps server in minutes. Pay with cryptocurrency, no identity verification required.
Browse VPS Plans