Tor Bridges
Triplebit operates high performance, unfiltered, and high capacity bridges on the Tor network. We are compliant with Tor Proposal 326.
Triplebit's goal is to enable IPv6 connectivity and promote IPv6 adoption across the Tor network and the internet as a whole. As such, our relays and infrastructure are 100% dual-stack.
Snowflake
Triplebit currently operates 9 NAT-free, unfiltered Snowflake proxy servers across our points of presence. Snowflake servers do not have any public identifiers, so they are not enumerated on this page.
Snowflake is the easiest way to contribute to the Tor Project, and you can do so yourself from any web browser. Visit snowflake.torproject.org for more information about this technology.
WebTunnel and obfs4
Triplebit currently operates the following Tor bridges (by hashed fingerprint):
AF12E95D9D0409ED8D96A23336D6B51E1E310648
2F1E367E0249054DCCD4FC337BDC2930AC38CF09
AE75E63FF743A38B12501D60647479188E522FC1
C4611E6CBF9C100FBA59888C8DE29E57CE78B58A
55EABDDB9424C49C4AA69FE7448BF94BCDEBCFF8
8111D3C8BE6E8935C3BDE14996598127B7CE4DA9
98AA3815AEA4FFCD1F14E114A7103B28AF4771F4
9241E733ECB06606DD89A09863F0E37875FEB73C
CD6428D5149090D4DD5D1EB8637520EB4FDB0E3B
24FA7F61A42E567DAE19A60C70CF9E1EBF40E332
D284B3CD12B6CFCEADC6372E66F23F32160C1D0E
790A4CD6D547AACED753ACF88CA24E312BA8AD77
2D896DF7C9D5296FE0A02C8EB065A54041F2AD24
6A778974D471BE64BEB4FBC78E8936A1E33C992A
9905781272EDBE5D1CB642503E380DE9E9076B7C
2DEE1C0E13D9AC7BEA1D9FC10896137B867BFC53
355D621F8B3AB6C27A1B43FC7B2B236946CBECD0
5E331068DE010ED8A56DA227FDE07824DA560535
8A1F4E5FACBC18032AE36B4E31848F509C0322B3
9A04A7F4B1FC201B2D2B10AB667B1A8B23E23353
E800432F7E2CC8AAA064E5EC55473C8938962B9F
4E4D74CC1A99A00A0EE2CEEE14166080A4D5A905
D36777F4B36397AAAE1D6BAA859C934CFE549FE5
BF32B9C30DFE5D142D909A5367E72AE715BAC628
F8AF448B5038387EF3E9AF6057D9A4A264495D1F
11CEF3957D1003C3D31DE493575018B0C30D94E2
1A0628CD5F4BA4FCCF353206D408862E15C8495E
2E188D2C74A0C508EB3F6D8179BCEDAA2DF1F35A
04DEE38FC0071717DE91AADB22B4634361D1F400
979CFA3AE6C062B74EE62D6861FD838037C74DA4
B84E2C4BCB09EEBB554500733E4F335764207D60
FDE5E5442A24CCD4FA6F1ABC6771139ECD9543D5
65BCA1A819C07D85152978923CF508E5030DE2B0
93F2E5F6647E5C1DFB5639FBDD37698D7CE176D7
ABB38B7D85A0D9BA835C1107120D9A0CE72CD78E
133267D91CE7774A22FDE85F36AF156CC6F6D457
CFB737FDE14C8D8C9328B926C1B71228C122620A
49F73B2AB0A89CD112AC26065896CA94CEEEA0F1
3C97BFD09F5C2316D66FA63112F3EA1EDC1985DA
D9DA69D3EAD0DF7D1328C5473D3560B55DC0900F
However, it may be more useful for you to browse this interactive list of our bridges for more information. Note that this list is based on nickname and not validated, so other operators could impersonate us and be listed. You should cross-reference list entries with the hashed fingerprints listed above if you need to confirm the validity of a Triplebit Tor bridge.
Private Bridges
Triplebit operates private Tor bridges for non-profits/NGOs, activists, and researchers on a case-by-case, as-needed basis. To provide you with a private bridge line we will need to understand your specific requirements:
- How many users do you have?
- Where are your users located?
- What is your threat model?
- What platforms are your users using? Desktop? Android?
- Can you run your own bridges? Or do you need bridges from us?
If this service would be helpful to your organization, please feel free to contact us.