http://tenchan4v5bnlu3gatyjyctlsb25asvncbz4pr7gmomhsrvyx5zfpcad.onion/res/773.html
Tor exit nodes are known to snoop on user’s traffic, try to decrypt it where they can and mine it. >4. The Tor network is more often than not used as proxy for hacking, spam and fraud. This is unwanted traffic. According to CloudFlare “94% of requests that we see across the Tor network are per se malicious”.