Investigator Use
Ahmia is a surface-web search engine specifically designed to index and search Tor hidden services — websites that operate on the .onion top-level domain and are only natively accessible through the Tor network. By making .onion content searchable without requiring Tor Browser, Ahmia provides investigators with a window into dark web content from a standard browser session.
What investigators use Ahmia for: discovering .onion sites related to a target individual or organization, searching dark web content for keywords without exposing their network to Tor exit traffic, finding dark web forums and marketplaces to monitor during investigations, and building a landscape of active hidden services in a particular niche.
What data Ahmia exposes: indexed content from .onion sites including page titles, descriptions, and crawled text, search results across currently active hidden services, and the ability to pivot between related dark web resources. Ahmia filters out child sexual abuse material and actively removes illegal content from its index.
Ahmia's search capability covers a meaningful subset of the dark web — marketplaces, forums, leak sites, privacy services, and underground communities. However, the dark web is not fully crawlable; many sites require registration or are invitation-only, meaning Ahmia's index reflects only the publicly accessible surface of Tor-hosted content.
Using Ahmia in an investigation: enter keywords, email addresses, usernames, or domain names to discover whether they appear on any indexed dark web sites. If a target's credentials or personal data appear on a dark web forum, Ahmia often surfaces those references. Screenshot any relevant results immediately, as dark web content is highly volatile.
Limitations: Ahmia does not index the entire dark web, and many .onion services block web crawlers. Sites with registration walls or those hosted on less-common anonymity networks (I2P, Freenet) are not indexed. Results should be treated as a partial view, not a comprehensive dark web search.
In a workflow: use Ahmia alongside other dark web tools like DarkOwl or Torch. If Ahmia returns relevant results, follow up with a direct Tor Browser session to gather additional context. Document all .onion addresses accessed during an investigation, as they may become unreachable quickly. Combine Ahmia searches with IntelX for broader dark web coverage.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
BlackWeb
Dark Web OSINT
BlackWeb is a community-maintained blacklist of malicious and spam domains for network filtering and threat infrastructure identification.
Dark Web Tools
Dark Web OSINT
IACA Dark Web Tools is a law enforcement-oriented collection of resources for searching Tor hidden services and dark web content.
Onion Inspector
Dark Web OSINT
Onioff inspects .onion URLs to verify availability, extract page metadata, and map Tor hidden service content for dark web OSINT.
Onion Links
Dark Web OSINT
Find the best onion links list here. Working onion links for 2025 with the best dark web links to explore. All working and updated.
Onion Scan
Dark Web OSINT
OnionScan investigates dark web sites for misconfigurations, operator errors, and links to clearnet infrastructure revealing real identities.
Onion Scan Tool
Dark Web OSINT
OnionScan is a free and open source tool for investigating the Dark Web.