17
©
SOLIDA SYSTEMS INTERNATIONAL 2017
5.1 About Tor Exit Nodes
The Tor exit nodes list contains IP addresses of known Tor network end point IP addresses. It is
common for hackers to use Tor exit nodes for their attack traffic to mask its origin. In some rare
cases, the use of the Tor network is valid. Examples would be in countries that censor their
citizens' Internet traffic. In those circumstances the Tor network can be used to circumvent such
censorship. Then it is recommended to disable the inclusion of Tor endpoints in the IP blacklist.