Veils of the Onion
This is a Tor exit node.
If you're here to report abuse from the 'Veils of the Onion' network (tor-exit***.veilsoftheonion.eu), please keep in mind that we do not store any logs of who uses our node. Because of that, we are unable to help you investigate any abuse.
Still want to submit an abuse report? Please feel free to send it to abuse@veilsoftheonion.eu.
Remember to include the following information:
- Our IP address (where the abuse came from)
- Your IP address (where the abuse was targeted)
- We can blacklist your IP ranges from our node network. If you'd like us to do that, please also include your AS number.
If you don't have one, just include your IP address.
DMCA takedown notices are not processed. We don't host anything - we can't do anything.
Any other questions? Mail us at hello@veilsoftheonion.eu
Tor is a protocol, mostly used in the Tor Browser. It's fully anonymous, often used by whistleblowers, journalists, people escaping censorship, abuse victims and more.
The anonymity also gives a possibility to malicious use, but that is a very small proportion of the total traffic going trough Tor nodes.
Learn more about Tor
Privacy is a human right. Read more about it here.