Experiencing disruptions

Network DDoS →

v3 Onion Services

We are experiencing a network-wide DDoS attempt impacting the performance of the Tor network, which includes both onion services and non-onion services traffic. We are currently investigating potential mitigations.

Update, 2022-10-25 12:00UTC: There are several different kinds of overload going on that we are working on addressing. We are seeing performance degredation from an overload of exit connections and onion service circuit handshakes, causing our relays to deny circuit creations and…


Tor Network   (?) Core services that are integral to the Tor Network.
v3 Onion Services   (?) Third generation onion services – running private services (e.g. websites) that are only accessible through the Tor network. Disrupted
Directory Authorities   (?) Special-purpose relays that maintain a list of currently-running relays and periodically publish a consensus together. Operational
Network Experiments   (?) Experiments running on the Tor network. None
Tor Project websites   (?) Official websites and services hosted and maintained by the Tor Project.
torproject.org   (?) Our official website and its associated portals (e.g. community.torproject.org). Operational
Tor Check   (?) The check.torproject.org website, used to confirm you're connected to the Tor Network. Operational
metrics.torproject.org   (?) The metrics.torproject.org website, used to easily access metrics related to Tor. Operational
Internal systems   (?) Tools and services that help us collaborate with one another, managed by the Tor Project System Administration Team (TPA).
GitLab   (?) Our code-review, bug tracking, and collaboration platform of choice (gitlab.torproject.org). Operational
Gitolite   (?) An access control layer on top of git, used to provide read/write access. Operational
Email   (?) General email delivery from within the Tor Project. Operational
Mailing lists   (?) Our public and private mailing lists (lists.torproject.org) powered by Mailman, the GNU Mailing List Manager. Operational
DNS   (?) Domain name resolution for the Tor Project infrastructure. Operational
v2 Onion Services   (?) Second generation onion services – running private services (e.g. websites) that are only accessible through the Tor network. Operational

Incident history


2023 (1)

February 4, 2023 at 1:57 AM

outage at main provider

Resolved after 1h 36m of downtime

2022 (4)

December 7, 2022 at 3:15 AM

DNS services disruption

Resolved after 39h 15m of downtime
November 30, 2022 at 8:00 PM

Email delivery problems

Resolved after 361h 48m of downtime
June 9, 2022 at 2:00 PM

Network DDoS

▲ This issue is not resolved yet
January 25, 2022 at 6:00 AM

routing issues at main provider

Resolved after 60h 58m of downtime

2021 (4)

June 3, 2021 at 8:00 AM

Disruption of Metrics website and relay search

Resolved after 272h 0m of downtime
May 6, 2021 at 4:45 PM

V2 Onion Services deprecation

Resolved after 4447h 15m of downtime
January 27, 2021 at 11:00 PM

Disruption of v3 onion services and consensus building

Resolved after 30h 30m of downtime
January 25, 2021 at 9:40 PM

Email delivery problems to Google

Resolved in under a minute