Skip to content

simple CLI tool to verify whether an IP was or is part of the Tor network (realtime via Onionoo, historic via ExoneraTor).

License

Notifications You must be signed in to change notification settings

baruhifraimov/TorIPCheck

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Tor Checker

Usage

python3 tor_checker.py -i <IP>            # or --ip <IP>
python3 tor_checker.py -i <IP> -t <DATE>  # or --time <DATE>

Example (historic):

python3 tor_checker.py -i 1.2.3.4 -t 2025-11-03

Behavior / output

  • The script performs two kinds of checks:
    • Realtime (no -t/--time): queries Onionoo for current relay/bridge info.
    • Historic (with -t/--time): queries ExoneraTor for the given date.
  • The -t / --time option expects a date in YYYY-MM-DD format and must be older than yesterday (the script will exit if you give today or yesterday).
  • Output: the script prints a single integer at the end:
    • 1 means the IP was identified as Tor-related for the chosen check.
    • 0 means it was not.
  • Note: Onionoo (realtime) may also print human-readable lines such as " is a Tor relay, and currently online" before the final 0/1 is printed.

Options

  • -i, --ip Target IPv4 address (required).
  • -t, --time Date for historic check (optional). Use YYYY-MM-DD and pick a date older than yesterday.
  • -h, --help Show argparse help (if implemented).

Short note

The script prints 0 or 1 as the final result; the README now matches the actual flags and behavior. If you want, I can add an argument-parsing help text or make the script print a clearer multi-field summary instead of a lone integer.

About

simple CLI tool to verify whether an IP was or is part of the Tor network (realtime via Onionoo, historic via ExoneraTor).

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages