Investigator Use
Onion Search Engine is a search engine specifically designed to index and search content hosted on Tor hidden services (.onion domains). Unlike surface web search engines, it crawls .onion addresses and provides keyword-based search across dark web content, making it accessible through a standard web browser.
For OSINT investigators, Onion Search Engine serves as an accessible entry point for dark web intelligence gathering without requiring Tor Browser. By indexing .onion content and surfacing it through a standard HTTPS interface, it allows investigators to search for specific terms, usernames, email addresses, product listings, or other indicators across the dark web ecosystem.
Common investigative workflows include: searching for a suspect's known username across dark web forums and markets to identify their dark web presence, looking for leaked data from a specific organization on dark web paste sites or markets, identifying which dark web services discuss a specific topic relevant to an investigation, and finding the current active addresses for dark web services that frequently change URLs.
Onion Search Engine provides search results with titles, descriptions, and cached content from indexed .onion pages. This cached content is particularly valuable when a specific site has gone offline — the index may retain content from when the site was active, preserving evidence that would otherwise be lost.
Limitations significant to investigators: The search engine's index is incomplete by design and by technical limitation. Not all onion services are discoverable, and rapidly changing content (live forum posts, market listings) may not be current. Results require independent verification — always confirm findings in Tor Browser with appropriate precautions when content matters for evidentiary purposes.
The index also captures content without editorial filtering, including illegal content categories. Investigators should approach results with awareness of legal obligations around accessing or possessing certain content types.
Record all search queries, result URLs, and retrieval timestamps. For evidentiary findings, capture and preserve the primary source through Tor Browser in a properly isolated investigation environment.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
Ahmia
Dark Web OSINT
Ahmia indexes Tor hidden services, enabling investigators to search .onion sites by keyword without the Tor browser.
BlackWeb
Dark Web OSINT
BlackWeb is a community-maintained blacklist of malicious and spam domains for network filtering and threat infrastructure identification.
Dark Web Tools
Dark Web OSINT
IACA Dark Web Tools is a law enforcement-oriented collection of resources for searching Tor hidden services and dark web content.
Onion Inspector
Dark Web OSINT
Onioff inspects .onion URLs to verify availability, extract page metadata, and map Tor hidden service content for dark web OSINT.
Onion Links
Dark Web OSINT
Find the best onion links list here. Working onion links for 2025 with the best dark web links to explore. All working and updated.
Onion Scan
Dark Web OSINT
OnionScan investigates dark web sites for misconfigurations, operator errors, and links to clearnet infrastructure revealing real identities.