This page inspired greatly from: abuse

As can be seen from the Tor overview page, the Tor network is designed to make tracing of users impossible. This is because the Tor network is a censorship resistance, privacy, and anonymity system used by whistle blowers, journalists, Chinese dissidents skirting the Great Firewall, abuse victims, stalker targets, the US military, and law enforcement, just to name a few. See the Tor users page for more info.

Although Tor can be abused, it is not illegal to operate exit nodes. In terms of applicable law, the best way to understand Tor is to consider it a network of routers operating as common carriers, much like the Internet backbone. However, unlike the Internet backbone routers, Tor routers explicitly do not contain identifiable routing information about the source of a packet.

As such, there is little the operator of this router can do to help you track the connection further. This router maintains no logs of any of the Tor traffic, so there is little that can be done to trace either legitimate or illegitimate traffic (or to filter one from the other). Attempts to seize any of our equipment will accomplish nothing.


That being said, if you still have a complaint about one of our routers, you can email us at If complaints are related to a particular service that is being abused, we can remove that service from the node exit policy, which would prevent our own Tor routers from allowing that traffic to exit through it. We can only do this on a IP+destination port basis, however, and we have no influence on the hundreds of other Tor routers. Common SMTP ports are already blocked. We do not endorse illegal usage of Tor.

Email: Emergency Phone: +45 2026 6000 Henrik Kramshøj