Investigator Use
IACA Dark Web Tools is a resource portal maintained by the International Association of Chiefs of Police (IACA) that provides law enforcement and investigators with guidance, tools, and references for conducting lawful investigations on the dark web and anonymizing networks. It functions as a curated starting point for practitioners navigating dark web OSINT.
For law enforcement and authorized investigators, the IACA Dark Web Tools portal aggregates operational guidance and tool references that have been vetted for legitimate investigative use. This includes approaches for safely accessing Tor hidden services, techniques for correlating dark web identities with surface web activity, and guidance on evidence preservation standards for dark web sourced material.
The portal is particularly valuable for investigators new to dark web environments who need a structured, professionally endorsed approach rather than assembling ad-hoc tooling. It contextualizes dark web investigation within legal and procedural frameworks that matter for law enforcement, ensuring that evidence collected will withstand judicial scrutiny.
Common investigative scenarios addressed include: identifying and monitoring dark web marketplaces where illicit goods are sold, locating forums where stolen data, credentials, or malware are traded, tracing cryptocurrency payment flows referenced in dark web transactions, and correlating dark web personas with surface web identities through operational security failures.
The resource also provides guidance on documentation standards specific to dark web evidence — capturing Tor circuit information, recording .onion addresses with timestamps, preserving page archives, and maintaining chain of custody for evidence collected in environments where URLs and content are ephemeral.
Limitations: Access to dark web environments always requires proper authorization under applicable law. The tools and techniques referenced assume investigators are operating within their lawful authority. Dark web content is volatile and addresses change frequently, so references may become outdated. Always verify operational currency of any specific tool or resource before relying on it in an active investigation.
Law enforcement investigators should coordinate with their agency's legal counsel before conducting dark web operations to ensure compliance with applicable surveillance and computer access laws.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
Ahmia
Dark Web OSINT
Ahmia indexes Tor hidden services, enabling investigators to search .onion sites by keyword without the Tor browser.
BlackWeb
Dark Web OSINT
BlackWeb is a community-maintained blacklist of malicious and spam domains for network filtering and threat infrastructure identification.
Onion Inspector
Dark Web OSINT
Onioff inspects .onion URLs to verify availability, extract page metadata, and map Tor hidden service content for dark web OSINT.
Onion Links
Dark Web OSINT
Find the best onion links list here. Working onion links for 2025 with the best dark web links to explore. All working and updated.
Onion Scan
Dark Web OSINT
OnionScan investigates dark web sites for misconfigurations, operator errors, and links to clearnet infrastructure revealing real identities.
Onion Scan Tool
Dark Web OSINT
OnionScan is a free and open source tool for investigating the Dark Web.