http://g7cpug4k6ydyq5dlxrji35xnfq5n5rba3n7holux4tmdsm42ju543tad.onion
Note Both Tor and I2P likely have spy nodes as well, but the de-anonymization process is much more expensive and complicated. Moreover, if a privacy coin chooses to disallow clearnet connections and use anonymous networks, a spy node operator will need to control spy nodes in the P2P network of the privacy coin and maintain enough spy nodes in both Tor and I2P simultaneously.