Fresh Onions has been one of the better link lists to exist on Tor over the past few years. Unfortunately, it has come and gone several times, under different URLs. Luckily, it is online at the time of this writing, at the URL http://vps7nsnlz3n4ckiie5evi5oz2znes7p57gmrvundbmgat22luzd4z2id.onion/. All previous incarnations of the site, to my knowledge, are offline now.
It’s likely that this version of the site isn’t affiliated with the original in any way, but just uses the same source code. After all, it is available at GitHub – freshonions-torscraper. In all likelihood, what happened was that after the original went down, different developers cloned or forked the source code and just made their own versions. Whatever the case may be, I’m sure people are happy about it!
Interestingly, if you check out the GitHub link, it explains some of the crawler’s features quite well (quoted from their page):
- Crawls the darknet looking for new hidden service[s]
- Find[s] hidden services from a number of clearnet sources
- Optional fulltext elasticsearch support
- Marks clone sites of the /r/darknet superlist
- Finds SSH fingerprints across hidden services
- Finds email addresses across hidden services
- Finds bitcoin addresses across hidden services
- Shows incoming / outgoing links to onion domains
- Up-to-date alive / dead hidden service status
- Search for “interesting” URL paths, useful 404 detection
- Automatic language detection
- Fuzzy clone detection (requires elasticsearch, more advanced than superlist clone detection)
- Doesn’t fuck around in general.
One of the tools it uses is the web scanner WhatWeb, which you can read more about at WhatWeb – MorningStar Security, if that intrigues you. Part of its description, in fact, explains some of how Fresh Onions finds the sites that end up on its list:
All that being said, I know that many people who stop by here are searching for the l-word (links, that is), so it’s reasonable to share some from Fresh Onions, right?