- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
06-25-2025 12:10 PM - edited 06-25-2025 12:20 PM
Hi Everyone,
Some members in the community have recently been exploring ways to detect Tor traffic within their environments. I’ve spent some time working on a solution to this challenge, and I wanted to turn that work into a dedicated post so more people can benefit from it.
Detecting communication with Tor exit nodes gives your team visibility into potentially suspicious behavior, regardless of the application or protocol used.
Instead of relying on rate-limited or unstable feeds, I recommend using this curated and regularly updated list:
https://firewalliplists.gypthecat.com/lists/kusto/kusto-tor-exit.csv.zip
The CSV file already includes a header named IPAddress
, which is required for XSIAM ingestion.
Settings > Configurations > Data Management > Dataset Management
tor_nodes
This creates a reusable dataset that can be referenced in your detection logic.
Use the following XQL query to identify any network events involving known Tor exit nodes:
dataset = xdr_data
| filter event_type = ENUM.NETWORK
| join type = inner (
dataset = tor_nodes
| fields IPAddress
) as tor_list action_remote_ip = tor_list.IPAddress
| fields agent_hostname, action_remote_ip, event_timestamp, IPAddress
This method has already helped a few teams gain better visibility into anonymized traffic, and I hope it proves just as useful for others here. If you have feedback, enhancements, or alternative approaches, I’d genuinely appreciate hearing them.
The strength of this community lies in our willingness to share, challenge, and refine ideas together.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!