Investigator Use
Onion Links is a surface web directory that aggregates and categorizes .onion addresses for Tor hidden services, functioning as an index of dark web resources accessible through the standard web browser without Tor. It is one of several dark web link directories that aim to make Tor service addresses discoverable.
For OSINT investigators, Onion Links serves as a reference tool for identifying and categorizing known Tor hidden services relevant to an investigation. When a specific onion address appears in a criminal communication or seized device, cross-referencing it against directories like Onion Links can quickly identify whether the service is a known entity — a marketplace, forum, or communication platform — or an unlisted, private service.
Investigators use dark web link directories during the reconnaissance phase of investigations to map the ecosystem of services in a particular niche (drug markets, fraud forums, credential trading, hacking services) and to identify the current active addresses for services that periodically change their onion URLs due to law enforcement pressure or technical issues.
Onion Links and similar directories also help investigators understand the dark web landscape relevant to a specific criminal market. Knowing which markets are active, which have been taken down, and which are new entrants provides context for identifying suspect behavior patterns.
Limitations: Dark web directories capture a voluntary, curated subset of Tor hidden services — there is no comprehensive index of all onion addresses. Many significant dark web operations deliberately avoid directory listings. Content and availability listings in directories can be outdated by days or weeks, and services frequently move to new addresses. Directories also index services across all legality spectrums; investigators should exercise appropriate caution about accessing specific services.
For evidentiary purposes, never rely solely on a directory listing to confirm the existence or nature of a hidden service. Verify independently using Tor Browser in a properly isolated environment with appropriate legal authority. Record the directory URL, the entry as displayed, and the timestamp of your query in case notes.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
Ahmia
Dark Web OSINT
Ahmia indexes Tor hidden services, enabling investigators to search .onion sites by keyword without the Tor browser.
BlackWeb
Dark Web OSINT
BlackWeb is a community-maintained blacklist of malicious and spam domains for network filtering and threat infrastructure identification.
Dark Web Tools
Dark Web OSINT
IACA Dark Web Tools is a law enforcement-oriented collection of resources for searching Tor hidden services and dark web content.
Onion Inspector
Dark Web OSINT
Onioff inspects .onion URLs to verify availability, extract page metadata, and map Tor hidden service content for dark web OSINT.
Onion Scan
Dark Web OSINT
OnionScan investigates dark web sites for misconfigurations, operator errors, and links to clearnet infrastructure revealing real identities.
Onion Scan Tool
Dark Web OSINT
OnionScan is a free and open source tool for investigating the Dark Web.