Understanding .onion and Other Dark Web Extensions

Learn what .onion addresses are, how they work within the Tor network, and what other dark web extensions exist in different anonymity systems.

Explore how .onion domains differ from normal web addresses, why they exist, and discover other addressing systems used in alternative anonymity networks such as I2P, Freenet, and ZeroNet.


What Is an `.onion` Address?

An .onion address is a special domain suffix used exclusively on the Tor network.

You cannot access it using normal browsers or DNS lookups — it works only through the Tor Browser or other Tor-connected software.

Example

web
http://facebookcorewwwi.onion/
http://protonirockerxow.onion/ http://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/

Each .onion address corresponds to a hidden service (now called an “Onion Service”).

Unlike standard websites where the domain name is registered via a centralized authority (ICANN), .onion addresses are self-generated cryptographically from a public key.

That means the long, random-looking string in the address actually encodes part of the site’s cryptographic identity — it’s self-authenticating, which makes phishing harder and anonymity stronger.


How `.onion` Works

When you visit an .onion site through Tor:

  1. Your Tor Browser connects through multiple relays (nodes) — at least three — forming a private encrypted route.
  1. The .onion site itself is also hidden behind the Tor network — its server IP address is never exposed.
  1. Both sides meet inside Tor, keeping both the user and the server anonymous.

This system provides end-to-end encryption and location anonymity, making it useful for:

  • Journalists protecting sources.
  • Whistleblowers sharing sensitive documents.
  • Users in censored regions accessing blocked content.
  • Organizations hosting privacy-preserving portals.


Examples of Legitimate `.onion` Websites

ServicePurposeOnion Address
FacebookPrivate social networking access in censored countriesfacebookcorewwwi.onion
ProtonMailAnonymous encrypted emailprotonirockerxow.onion
The New York TimesSecure whistleblower portalnytimes3xbfgragh.onion
DuckDuckGoPrivate search engineduckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion
These examples are **official** and maintained by the organizations themselves for privacy and anti-censorship purposes.


Other Dark Web Extensions and Networks

While .onion belongs to Tor, other anonymity networks use their own internal addressing systems — each with its own design goals and structure.

NetworkExample AddressExtension/FormatDescription
Torabc123xyz.onion.onionMost popular network for anonymous browsing and hosting.
I2P (Invisible Internet Project)example.i2p.i2pUses "eepsites" for internal anonymous services and messaging.
Freenetfreenet://USK@...none (key-based)Fully decentralized content store with data persistence.
ZeroNet1HeLLo4uzjaLetFx6NH3PMwFP3qbRbTf3DBitcoin-style addressCombines BitTorrent & Bitcoin crypto for distributed sites.
Lokinethttp://example.loki/.lokiBased on the Oxen blockchain, focuses on secure routing and messaging.
GNUnet(no TLD, peer IDs only)Academic network for decentralized, censorship-resistant communication.

Each of these operates outside the regular DNS system and requires its own client or browser configuration to access.


Why So Many?

Each network reflects a different philosophy of privacy:

  • Tor emphasizes global anonymity and simple access.
  • I2P focuses on internal services and peer-to-peer connections.
  • Freenet aims for censorship resistance through distributed storage.
  • ZeroNet experiments with blockchain-style identities.
  • Lokinet explores mix networks over blockchain infrastructure.

Together, they form an ecosystem of technologies all designed to reduce reliance on centralized control and preserve privacy — though not all are equally secure, active, or widely used.


Risks and Ethical Considerations

While these technologies have legitimate uses, not all content or activity within them is lawful.

Illegal marketplaces, data leaks, and scams often exist alongside privacy tools and research forums.

Use anonymity networks responsibly:

  • Do not download or interact with illegal content.
  • Keep systems isolated and patched.
  • Verify sources before trusting links or data.
  • Always prioritize legality, ethics, and safety.


Answer the questions

What network uses `.onion` addresses?

Answer: Tor

What is the equivalent extension used by I2P?

Answer: .i2p

Which network uses Bitcoin-style addresses instead of domains?

Answer: ZeroNet


Closing Thoughts

.onion and other dark web extensions are gateways to privacy-preserving technologies, not inherently criminal tools.

They empower journalists, activists, researchers, and everyday users seeking security and freedom from surveillance — but must always be used responsibly and legally.

Understanding how these extensions work helps demystify the dark web, turning fear into knowledge and encouraging ethical exploration of internet privacy technologies.