Help Center

Get answers for the most common questions

We allow legitimate use of Tor. We do not require users to first connect in the clear and register with services, like some networks, to allow connecting via Tor; however, we reserve the right to disable or limit new connections during times of abuse.

Network bans

Given the "anonymous" nature of Tor, it is often used for abuse, such as ban evasion and spamming. While we do our best to not adversely affect Tor users not engaging in abuse, from time to time we may ban exit nodes to mitigate said abuse.

Disabled connections

We may prevent new connections via Tor during times of heavy abuse. That is, new connections will be refused while those who can maintain their connection will not be affected. This measure is a last resort and often lasts so long as we continue to see abuse attempts.

Bypassing restrictions

Most Tor-related network bans and connection restrictions can be bypassed by users who have a registered account, allowing them to continue to connect and use DareNET even though we are blocking a particular exit node or new anonymous connections. This requires use of the SASL or login-on-connect methods.

Hidden service

We provide an onionv2 hidden service as well as onionv3 (prop224), they are as follows:

Onionv2 gxspxkzq5zy5ij3e.onion

Prop224 gg5kq3jrfshwr7qygs3tl5vwnwf4ocfh6jeahumejdct6frld3kvaqqd.onion

You'll need to use port 6667 (plaintext) or 6697 (TLS). While the Tor process and server reside on the same machine (i.e., the last mile remains encrypted), you will still need to connect using TLS if you intend to join TLS-only channels and/or use the SASL EXTERNAL mechanism to authenticate. Note that due to the TLS certificates not matching the hidden service (we only serve certificates for and, you might have to disable the verification in your client.

To help minimize abuse, use of the hidden service requires use of the SASL or login-on-connect methods.

Should you still need assistance, stop by #Help on IRC.