Watch how the tool searches, discovers, and analyzes hidden services in real-time
Enter a query to search the dark web
Select a result to analyze
Metadata, vulnerabilities, link graph
This is a simulated demo. The actual tool searches real Tor hidden services.
Everything you need to search, monitor, and analyze the dark web for threat intelligence.
Search across thousands of Tor hidden services, onion sites, and dark web marketplaces in real-time.
Full vulnerability assessment, metadata extraction, and security posture analysis of any .onion site.
Discover connections between hidden services. Map inbound and outbound links to understand the network.
Access archived versions of dark web pages. Track changes over time with Wayback-style snapshots.
Extract emails, crypto wallet addresses, phone numbers, and external links from any hidden service.
Visualize your search history, most analyzed sites, and threat intelligence trends over time.
Enter any query — keywords, URLs, or topics. The engine searches across thousands of indexed Tor hidden services.
Browse results with risk ratings and status indicators. Click any result to begin deep analysis.
Get full metadata, vulnerabilities, link graphs, and historical snapshots. Export findings as JSON or CSV.