“Tor metrics are the ammunition that lets Tor and other security advocates argue for a more private and secure Internet from a position of data, rather than just dogma or perspective.”
— Bruce Schneier (June 1, 2016)
We estimate the number of users by analyzing the requests induced by clients to relays and bridges.
This graph shows the estimated number of directly-connecting clients; that is, it excludes clients connecting via bridges. These estimates are derived from the number of directory requests counted on directory authorities and mirrors. Relays resolve client IP addresses to country codes, so that graphs are available for most countries. Furthermore, it is possible to display indications of censorship events as obtained from an anomaly-based censorship-detection system (for more details, see this technical report). For further details see these questions and answers about user statistics.
The following events have been manually collected on this wiki page and might be related to the displayed graph.
The manually collected events in this table do not necessarily match the automatically generated possible censorship events shown in the graph.
|Dates||Places/Protocols||Description and Links|
|2018-02-12||Relays||Tor 0.3.3.2-alpha reaches deb.torproject.org repositories|
|2018-02-11||Relays||Tor 0.3.3.2-alpha reaches FreeBSD repositories|
|2018-02-10||Relays||Tor 0.3.3.2-alpha is released (containing important denial-of-service migitations for relays)|
|2018-02-08||ipv4 ipv6||geoip and geoip6 databases updated to "February 7 2018 Maxmind GeoLite2 Country" (|
|2018-01-20||Relays||Some more directory authorities upgrade to 0.3.2.9 which enforces new requirements for the exit flag. ~50 relays lose the exit flag|
|2018-01-16||Tor 0.3.2.9 reaches deb.torproject.org.|
Relay versions graph
|2018-01-08||ipv4 ipv6||geoip and geoip6 databases updated to "January 5 2018 Maxmind GeoLite2 Country" (|
|2018-01-05 to present||Outage of the op-hk OnionPerf instance.|
|2017-12-21||Release of tor 0.3.2.8-rc, intended to fix the KIST bug that enabled a DoS on relays by running them out of memory..|
|2017-12-20||ipv4 ipv6||geoip and geoip6 databases updated to "December 6 2017 Maxmind GeoLite2 Country" (|
|2017-12-12 to 2018-01-18||meek||Outage of the meek.bamsoftware.com (unthrottled for public use), meek.bamsoftware.com:7443 (former meek-azure, now unused), and gaeuploader.meek.bamsoftware.com (used by GAEuploader) bridges.|
|2017-12-04 to present||DDoS attack creates load on the network.|
Tor-relays threadRelay graphSummary postTicket
This material is supported in part by the National Science Foundation under Grant No. CNS-0959138. Any opinions, finding, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. "Tor" and the "Onion Logo" are registered trademarks of The Tor Project, Inc.. Data on this site is freely available under a CC0 no copyright declaration: To the extent possible under law, the Tor Project has waived all copyright and related or neighboring rights in the data. Graphs are licensed under a Creative Commons Attribution 3.0 United States License.