Some of the Tor exit nodes are source of cyber attacks and spam messages.
In case you run sensitive online project, then you might consider monitoring or blocking the traffic from the latest Tor exit nodes.
We provide a service that will give you the latest Tor nodes. It's up to you how you will use this data.
Monitor this visits, add constraints to them, block them, prepare special services for them...
This service doesn't use check.torproject.org, it takes data directly from Tor network.
In case you have a any type of question regarding this service or you need self hosted version of it, drop us a note. contact[at]hqpeak[dot]com
Free:Tor exit list last updated >5h ago.
Premium:Tor exit list last updated every 5 minutes. Use any value for id parameter and will work!
In case format parameter is not set or unknown option is choosen then output is json.json
["126.96.36.199","188.8.131.52",...]How to use json service demo iptables
iptables -F TOR iptables -A TOR -s 184.108.40.206 -j DROP ... iptables -A TOR -j RETURNapache
order allow,deny deny from 220.127.116.11 ... allow from allphp
$torblock = array( "18.104.22.168", ... );