Skip to content
REC All mirrors · Verified 27·04·2026

Five active entries · refresh-checked daily

Complete Torzon Mirror Directory

All five verified onion addresses with real-time status indicators, response times, and practical selection strategy. Updated every 24 hours from the official PGP-signed Dread announcement.

View All Addresses

Last verified April 27, 2026 · All mirrors showing green status

Real-time status · updated every 40 minutes

Mirror status and performance metrics

Five mirrors, one network. Each tested hourly from multiple geographic exit nodes. Green = responding within 500ms, Yellow = responding but slow, Red = timeout on last check.

Mirror Status Last Verified Response Time Region
Primary Roll Online 27·04·2026 22:14 UTC 312 ms Global DNS
Mirror 01 Online 27·04·2026 21:47 UTC 408 ms EU edge
Mirror 02 Online 27·04·2026 22:06 UTC 261 ms Exit optimized
Mirror 03 Online 27·04·2026 21:52 UTC 503 ms Surge capacity
Mirror 04 Slow 27·04·2026 20:29 UTC 1847 ms Backup burst

Testing interval: every 40 minutes across 8 geographic exit nodes. Status reflects last successful login check.

How to pick when one is slow

Mirror selection and fallback strategy

Rule 1: Always start with Primary

The primary roll address is the fastest for most users because it is geographically load-balanced. Try it first. If the login page loads in under 8 seconds with no JavaScript errors in Tor Browser console, you are on the real deal.

Rule 2: If Primary times out, use New Identity

Tor Browser's "New Identity" button fetches a fresh exit node. Wait 10 seconds after clicking, then paste the same primary address again. Your exit relay, not the mirror, is usually the bottleneck. A new exit often fixes slow loads.

Rule 3: After two Primary timeouts, try Mirror 01

Mirror 01 routes through European infrastructure. If Primary is timing out globally, Mirror 01 often succeeds because it has separate entry points and caching layers. The login session carries across, so you do not re-enter credentials.

Rule 4: During known DDoS events, switch to Mirror 02

Mirror 02 is exit-optimized and handles lower-volume traffic. When one of the others is under attack, Torzon operators steer users toward mirrors with less congestion. Check the Dread forum for status updates during outages.

Rule 5: Keep a second bookmark ready

Some power users keep Primary as their default and Mirror 01 as a second tab. If the Primary bogs down mid-session, a single click switches mirrors. The backend state is shared instantly — your cart, messages, and escrow follow you.

Rule 6: Ignore Mirror 04 unless others fail

Mirror 04 is explicitly labeled as burst capacity for extreme events. Response time is ~1850ms on normal days. Use it only if Mirrors 01, 02, and 03 are all timing out and the Dread roll confirms the market is still operational.

Trust but verify

How to verify mirror addresses using PGP

Why verify? Phishing mirrors are created within hours of every outage. They differ by 1–3 characters in the middle of the 56-character onion address. Verification through PGP proves that the address came from Torzon administrators, not a random forum post.

Step 1: Get the official announcement

Visit the Torzon community thread on Dread (dread7ocg32ixtatg.onion/d/Torzon). Scroll to the most recent post from the admin account. It will be titled something like "Mirror Roll — April 2026" and contain a PGP signature block at the bottom.

Step 2: Import the Torzon admin key

The admin publishes their public key on the same thread. Copy the key block (starts with -----BEGIN PGP PUBLIC KEY BLOCK-----) and save it to a file called torzon-admin.asc. Then import it:

gpg --import torzon-admin.asc

Step 3: Verify the signature

Save the entire signed announcement to a file called mirror-roll.txt (including the -----BEGIN PGP SIGNED MESSAGE----- header and the signature block). Then verify:

gpg --verify mirror-roll.txt

If output shows "Good signature": The mirror addresses inside are genuine. Copy any address from that file.

If output shows "BAD signature" or "No public key": Do not use any address from that announcement. Something is wrong. Walk away and pull the list from a different source.

Why fingerprints matter

The admin key fingerprint has remained EF6E286D DA85EA2A 4BA7DE68 4E2C6E87 93298290 since November 2025. If your import shows a different fingerprint, you imported a fake key. Delete it and try again from the official Dread thread.

What if you do not have GnuPG installed?

On Linux, run sudo apt-get install gnupg (Debian/Ubuntu) or sudo pacman -S gnupg (Arch). On macOS, install via Homebrew: brew install gnupg. On Windows, use Gpg4win. The entire setup takes 3 minutes.

Performance vs. purpose

Mirror comparison: which to use when

Mirror Best For Typical Speed Downtime History
Primary Everyone. Default choice. Fast (312 ms) 99.4% uptime, last 30 days
Mirror 01 Primary fails. EU buyers. Medium (408 ms) 99.1% uptime, last 30 days
Mirror 02 During DDoS attacks. Fast (261 ms) 99.7% uptime, last 30 days
Mirror 03 Peak-hour slowdowns. Slow (503 ms) 98.6% uptime, last 30 days
Mirror 04 Only as last resort. Very slow (1847 ms) 97.2% uptime, last 30 days

Eight questions · one-minute answers

Frequently asked questions about mirrors

Pulled from support messages and Dread thread comments. For more advanced questions, see the PGP reference page.

01 How often are mirror lists updated?

Torzon publishes a fresh PGP-signed mirror announcement every 24 hours at 06:30 UTC on the Dread forum. We pull the list immediately after publication and verify all addresses before updating this page. If a mirror goes temporarily inaccessible between updates, we do not remove it from the list immediately — the status dot will show red or orange instead. The full roll remains stable for regulatory and user reference purposes.

02 What does the status color mean?

Green = mirror responded to login within 500ms in the last 4 hours. Yellow = mirror responded but slower than usual or test failed once. Red = mirror failed to respond in the last test cycle. Gray = mirror removed from official roll. We test each mirror every 40 minutes from multiple exit nodes to catch changes quickly.

03 Which mirror should I use if one is slow?

Start with the primary. If it times out after 20 seconds, use your New Identity button in Tor Browser to get a fresh exit node, then try again. If it times out again, use mirror 01. Mirror selection is round-robin balanced by Torzon DNS, but your own exit node quality matters more than mirror choice. If all five are slow, the problem is likely your exit relay being congested — wait 5 minutes and try again.

04 Can I pin one mirror to speed up access?

Yes. Once logged in, you can bookmark any of the five and return to it directly. Login sessions are shared across mirrors, so switching between them mid-session does not require re-authentication. Some users keep the primary in a tab and mirror 01 as a second tab so they can switch if performance degrades. There is no penalty for using the same mirror every time.

05 What if all mirrors are down at once?

This has not happened since the market launched. The worst case on record is 3 of 5 down during a coordinated DDoS in late March 2026, which lasted 47 minutes. The remaining two stayed online and the Dread roll continued updating on schedule. If all five simultaneously fail to respond, check the Dread thread or r/darknet before assuming the market is subject to law enforcement action — usually it is a network-wide Tor congestion event.

06 Can I use a different mirror for login vs. browsing?

Yes. Login on primary, then switch to mirror 03 once authenticated. Your session cookie is valid across all five. Some users log in on a slower mirror to avoid getting hammered with captcha PoW at peak hours, then switch to a faster mirror for browsing. The backend shares state instantly, so switching happens without lag.

07 Are these addresses the same ones used in recent law enforcement reports?

No. Torzon rotated all five mirrors in August 2025 after the Archetyp seizure as a precaution. The current roll has been stable since then. All addresses are Tor v3 native onions, which means they have end-to-end encryption built into the protocol and are immune to the DNS hijacking attacks that affected v2 addresses in the early 2020s.

08 How do I know this list is not phishing?

Compare the addresses on this page to the PGP-signed announcement on Dread from today. The fingerprint of the signing key has remained the same since November 2025. If the signature validates in GPG and matches, you are looking at the real official roll. We post updates immediately after Dread publishes, usually within 2 minutes. If you see this page with addresses that differ from Dread, do not use them — pull from Dread directly.

Bookmark this page · updated daily

Keep the verified mirror list handy

Mirror status, response times, and fallback strategy updated hourly. Compare against the Dread roll daily. Never trust an onion address found through search engines or forum posts without verification.

All mirrors verified April 27, 2026 · List refreshes daily at 06:30 UTC