top targets are typically large network/hosting 
providers, which are probably willing to assist if 
approached correctly (e.g. with judicial orders). Still, 
a significant share of traffic is extremely distributed, 
and especially for smaller providers the necessary 
knowledge, resources, and willingness might be 
limited. So if attacks were detected automatically, 
notifying targets would result in a perceptible 
burden, as many organizations need to be contacted. 
If data from an “exit” (=uplink) of a normal 
small/medium-size ISP were available, a comparison 
to ordinary traffic would become possible. In this 
way it could perhaps be (dis-)proven that Tor exit 
traffic closely resembles normal traffic and therefore 
does not pose a special danger of illegal use. 
A large share of traffic could be unencrypted 
(HTTP), but without content investigation this 
cannot be guaranteed and remains a task for further 
investigation - including deep packet inspection, if 
associated privacy&legal issues can be solved. Still 
a significant part, (presumably) about one third, is 
encrypted, and direct content investigation is 
impossible. While definitively (apart from probably 
– see above) unencrypted traffic is only a tiny part, 
this still amounts to a significant amount of data, 
posing notable risk if a fraudulent exit node were 
involved. 
Some traffic we see on our exit node appears 
strange already from the outer metadata. While it 
might be useful to ask for the owner of a domain 
anonymously, e.g. when considering to buy it, this 
cannot explain the large number of WhoIs requests. 
Similarly, part of the SSH traffic is suspicious: 
While using it to connect to a server does not grant 
anonymity against this server but only anyone 
observing the traffic, the tiny average connection 
size hints at brute-force password cracking. 
ACKNOWLEDGEMENTS 
We would like to thank both the Johannes Kepler 
University Linz as well as the AcoNet for supporting 
this project by granting permission and providing 
necessary bandwidth. We also thank Heinrich 
Schmitzberger for patching the Tor source code to 
enable marking exit traffic for correct monitoring. 
REFERENCES 
asn, Some statistics about onions, [online] Available at: 
https://blog.torproject.org/blog/some-statistics-about-
onions [Accessed 21.9.2016] 
Ailanthus. 2015. Ethical Tor research: Guidelines, [online] 
https://blog.torproject.org/blog/ethical-tor-research-
guidelines [Accessed 21.9.2016] 
Akamai, 2015. akamai’s [state of the internet] / security 
Q2 2015 report, [online] https://www.akamai.com/uk/ 
en/multimedia/documents/state-of-the-internet/2015-
q2-cloud-security-report.pdf [Accessed 21.9.2016] 
Biryukov, A., Pustogarov, I., Thill, F, and Weinmann, R.-
P. 2014. Content and Popularity Analysis of Tor 
Hidden Services, ICDCS Workshops 2014, 188-193 
Callahan, T., Allman, M., and Paxson, V. 2010. A 
longitudinal view of HTTP traffic. Proceedings of the 
11th international conference on Passive and active 
measurement (PAM'10), Springer-Verlag, 222-231. 
Chaabane, A., Manils, P., and Kaafar, M.2010. Digging 
into anonymous traffic: A deep analysis of the Tor 
anonymizing network, Proceedings of the 4th  
International Conference on Network and System 
Security (NSS), 2010, 167–174. 
INS, 2016. Tor system setup, [online] Available at 
https://www.ins.tor.net.eu.org/tor-info/index.html 
[Accessed 21.9.2016] 
Jansen, R., Johnson, A., 2016. Safely Measuring Tor. 
Proceedings of CCS’16. To appear 
Ling, Z., Luo, J., Wu, K., Yu, W., and Fu, X. 2015. 
TorWard: Discovery, Blocking, and Traceback of 
Malicious Traffic Over Tor, IEEE Tr. on Information 
Forensics and Security, Vol 10/12, 2515 - 2530 
Loesing, K., Sandmann, W., Wilms, C., and Wirtz, G. 
2008. Performance Measurements and Statistics of Tor 
Hidden Services, Applications and the Internet. SAINT 
2008. Turku, 2008, 1-7 
Loesing, K., Murdoch, S. J., and Dingledine, R. 2010. A 
case study on measuring statistical data in the tor 
anonymity network, Proceedings of the 14th 
international conference on Financial cryptograpy 
and data security (FC'10), Springer, 203-215 
MaxMind,  GeoLite2 Legacy Downloadable Databases, 
[online] https://dev.maxmind.com/geoip/legacy/geolite 
[Accessed 21.9.2016] 
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., and 
Sicker, D. 2008. Shining light in dark places: 
Understanding the Tor network, Proceedings of the 
8th International Symposium on Privacy Enhancing 
Technol. (PETS), 63–76 
Pmacct project, [online] http://www.pmacct.net/ 
[Accessed 21.9.2016] 
Soghoian, C., 2011. Enforced Community Standards For 
research on Users of the Tor Anonymity Network, 
Proc. 2011 International Conference on Financial 
Cryptography and Data Security, Springer, 146-153 
Sonntag, M., 2015. Rechtsfragen im Zusammenhang mit 
dem Betrieb eines Anonymisierungsdienstes. JusIT 6, 
2015, 215-222