Tor Bridges
Triplebit operates high performance, unfiltered, and high capacity bridges on the Tor network. We are compliant with Tor Proposal 326.
Triplebit's goal is to enable IPv6 connectivity and promote IPv6 adoption across the Tor network and the internet as a whole. As such, our relays and infrastructure are 100% dual-stack.
Manual Bridges
Many of our bridges are only distributed via private methods, such as bridge distribution methods operated by the Tor Project, or private bridges we operate for NGOs and other groups, so that they are not easily blocked. However, if you would like to use Triplebit-operated bridges in place of your guard node and are not experiencing censorship yourself, we operate 5 public bridges in two locations for you to choose from.
Please read the Tor Project's bridge documentation for information on how to set up manual bridges in Tor Browser. These bridges, like all of our infrastructure, run on bare-metal servers owned by Triplebit.
Near Kansas City, USA:
Bridge obfs4 103.17.154.136:443 224C0D16115E030C50579B0B9C2A644421072F66 cert=q7b3in5QkM7/w+Pu+Aze2PPJaPfW7UIygHBg1Y1Wbi/2vH6UQGJsSsgUlvdeG5qPhdC2Og iat-mode=1
webtunnel 10.0.2.2:443 D965164C1D9FB4FDD92E4FD5CDC6005E7820A687 url=https://cdn-25.triplebit.dev/nLcyjWAU3ILGenSItxtDAIJy
Near Warsaw, Poland:
Bridge obfs4 103.17.153.49:443 E3E13A69A1A6947E3D5B8C0A3C16D07829F57F07 cert=qULg51W+WSsESmuB46yimCcCpSDkkifwO1ctodpmaGuV2a9GKANf/Cwy7tdaBiucdIRCWA iat-mode=1
webtunnel 10.0.2.3:443 B094B41CA85C7A61FCBC11E671AA6D31737F9FB4 url=https://cdn-47.triplebit.dev/ua5noh9xeHiehe4h
Near Minneapolis, USA: Via Cloudflare! (1)
- This WebTunnel bridge in Minneapolis is behind Cloudflare's IP addresses and network, which can be worse for performance and privacy, but potentially better for circumventing censorship. Of course, Tor traffic is always end-to-end encrypted.
webtunnel 10.0.2.4:443 E4D6ECD7C758A22854A5BCC50B05EA901F4CA46E url=https://mastodon.neat.computer/shi0aiphohL1ooca
Using a trustworthy bridge can be preferable to using a standard guard node, because it can typically offer better performance and it significantly lowers the risk of your entry point to the Tor network being compromised or malicious. On the other hand, it can make you stand out from other Tor clients (particularly to local network operators), because you will likely be the only Tor user locally using that bridge. This may be of particular note to you if you use Tor while traveling between different public networks, and don't want to be physically tracked between them. You should understand your needs and threat model before changing any Tor settings.
Private Snowflake (Beta)
Triplebit operates a private Snowflake broker, completely independently of Tor Project's Snowflake infrastructure. Our Snowflake proxies can only be used by adding our custom Snowflake bridge lines to your Tor Browser or torrc
configuration.
One benefit of our private broker is higher performance. We are only running dedicated proxies on high-speed networks, whereas the public Snowflake network is run by the public on all manner of devices and browser extensions. Of course, the flip side of this is that we lack the high IP diversity which makes the traditional Snowflake network difficult to block.
Via Google Amp Cache (Recommended): (1)
- Google Amp is only used to locate a Snowflake proxy. Your actual Tor traffic will be forwarded directly to a private Snowflake proxy.
snowflake 10.0.3.1:443 53B65F538F5E9A5FA6DFE5D75C78CB66C5515EF7 fingerprint=53B65F538F5E9A5FA6DFE5D75C78CB66C5515EF7 url=https://snowflake-broker.triplebit.dev/ ampcache=https://cdn.ampproject.org/ front=www.google.com ice=stun:stun.l.google.com:19302,stun:stun.ooma.com:3478,stun:stun2.l.google.com:19302,stun:stun3.l.google.com:19302,stun:stun.gmx.de:3478,stun:stun.gmx.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
snowflake 10.0.3.2:443 A478B32B16FC1F371677F9F41D9C5272B8EBB0F7 fingerprint=A478B32B16FC1F371677F9F41D9C5272B8EBB0F7 url=https://snowflake-broker.triplebit.dev/ ampcache=https://cdn.ampproject.org/ front=www.gstatic.com ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
Via Bunny.net: (1)
- Bunny.net is only used to locate a Snowflake proxy. Your actual Tor traffic will be forwarded directly to a private Snowflake proxy.
snowflake 10.0.3.1:80 53B65F538F5E9A5FA6DFE5D75C78CB66C5515EF7 fingerprint=53B65F538F5E9A5FA6DFE5D75C78CB66C5515EF7 url=https://triplebit-snowflake-broker.b-cdn.net/ fronts=www.bunny.net,fonts.bunny.net ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
snowflake 10.0.3.2:80 A478B32B16FC1F371677F9F41D9C5272B8EBB0F7 fingerprint=A478B32B16FC1F371677F9F41D9C5272B8EBB0F7 url=https://triplebit-snowflake-broker.b-cdn.net/ fronts=fonts.bunny.net,www.bunny.net ice=stun:stun.l.google.com:19302,stun:stun.ooma.com:3478,stun:stun2.l.google.com:19302,stun:stun3.l.google.com:19302,stun:stun.gmx.de:3478,stun:stun.gmx.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
Via Triplebit:
snowflake 10.0.3.1:8080 53B65F538F5E9A5FA6DFE5D75C78CB66C5515EF7 fingerprint=53B65F538F5E9A5FA6DFE5D75C78CB66C5515EF7 url=https://snowflake-broker.triplebit.dev/ ice=stun:stun.antisip.com:3478,stun:stun.epygi.com:3478,stun:stun.uls.co.za:3478,stun:stun.voipgate.com:3478,stun:stun.mixvoip.com:3478,stun:stun.nextcloud.com:3478,stun:stun.bethesda.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
snowflake 10.0.3.2:8080 A478B32B16FC1F371677F9F41D9C5272B8EBB0F7 fingerprint=A478B32B16FC1F371677F9F41D9C5272B8EBB0F7 url=https://snowflake-broker.triplebit.dev/ ice=stun:stun.l.google.com:19302,stun:stun.ooma.com:3478,stun:stun2.l.google.com:19302,stun:stun3.l.google.com:19302,stun:stun.gmx.de:3478,stun:stun.gmx.net:3478,stun:stun.nextcloud.com:443 utls-imitate=hellorandomizedalpn
- Bridge: TriplebitSnowflake1
- Bridge: TriplebitSnowflake2
Snowflake
Triplebit currently operates 4 NAT-free, unfiltered Snowflake proxy servers across our points of presence, which are registered to the Tor Project's public broker. If you choose to use the built-in Snowflake bridge in Tor Browser your traffic may be routed through these proxies, but there is no way to select them manually. Snowflake servers do not have any public identifiers, so they are not enumerated on this page.
Snowflake is the easiest way to contribute to the Tor Project, and you can do so yourself from any web browser. Visit snowflake.torproject.org for more information about this technology.
WebTunnel and obfs4
Triplebit runs over 40 WebTunnel and obfs4 bridges in multiple locations and across many domain names and IP addresses which are not shared publicly. These bridges are distributed via various distribution methods that are operated by the Tor Project, including https, in-browser settings, Telegram, lox, and email.
We currently operate the following Tor bridges (by hashed fingerprint):
AF12E95D9D0409ED8D96A23336D6B51E1E310648
2F1E367E0249054DCCD4FC337BDC2930AC38CF09
AE75E63FF743A38B12501D60647479188E522FC1
C4611E6CBF9C100FBA59888C8DE29E57CE78B58A
55EABDDB9424C49C4AA69FE7448BF94BCDEBCFF8
8111D3C8BE6E8935C3BDE14996598127B7CE4DA9
98AA3815AEA4FFCD1F14E114A7103B28AF4771F4
9241E733ECB06606DD89A09863F0E37875FEB73C
CD6428D5149090D4DD5D1EB8637520EB4FDB0E3B
24FA7F61A42E567DAE19A60C70CF9E1EBF40E332
D284B3CD12B6CFCEADC6372E66F23F32160C1D0E
790A4CD6D547AACED753ACF88CA24E312BA8AD77
2D896DF7C9D5296FE0A02C8EB065A54041F2AD24
6A778974D471BE64BEB4FBC78E8936A1E33C992A
9905781272EDBE5D1CB642503E380DE9E9076B7C
2DEE1C0E13D9AC7BEA1D9FC10896137B867BFC53
355D621F8B3AB6C27A1B43FC7B2B236946CBECD0
5E331068DE010ED8A56DA227FDE07824DA560535
8A1F4E5FACBC18032AE36B4E31848F509C0322B3
9A04A7F4B1FC201B2D2B10AB667B1A8B23E23353
E800432F7E2CC8AAA064E5EC55473C8938962B9F
4E4D74CC1A99A00A0EE2CEEE14166080A4D5A905
D36777F4B36397AAAE1D6BAA859C934CFE549FE5
BF32B9C30DFE5D142D909A5367E72AE715BAC628
9E479A57D247C1B22DF764F38ED032D9C2D7F117
DD0E39667F329D19CE971408230CAF170F2EABF9
D2C8E293EF9C4E71117B6ABC14922D1068DD8DE2
0C91E12721C326B39F935A3D3398943611A4140D
F8AF448B5038387EF3E9AF6057D9A4A264495D1F
11CEF3957D1003C3D31DE493575018B0C30D94E2
1A0628CD5F4BA4FCCF353206D408862E15C8495E
2E188D2C74A0C508EB3F6D8179BCEDAA2DF1F35A
04DEE38FC0071717DE91AADB22B4634361D1F400
979CFA3AE6C062B74EE62D6861FD838037C74DA4
B84E2C4BCB09EEBB554500733E4F335764207D60
FDE5E5442A24CCD4FA6F1ABC6771139ECD9543D5
65BCA1A819C07D85152978923CF508E5030DE2B0
93F2E5F6647E5C1DFB5639FBDD37698D7CE176D7
ABB38B7D85A0D9BA835C1107120D9A0CE72CD78E
133267D91CE7774A22FDE85F36AF156CC6F6D457
CFB737FDE14C8D8C9328B926C1B71228C122620A
49F73B2AB0A89CD112AC26065896CA94CEEEA0F1
3C97BFD09F5C2316D66FA63112F3EA1EDC1985DA
D9DA69D3EAD0DF7D1328C5473D3560B55DC0900F
4EF1E26841B69156F804CE616A086E6E40D996F2
00B2069390A9D67F9F23581E2B99F59FCA08D96B
However, it may be more useful for you to browse this interactive list of our bridges for more information. Note that this list is based on nickname and not validated, so other operators could impersonate us and be listed. You should cross-reference list entries with the hashed fingerprints listed above if you need to confirm the validity of a Triplebit Tor bridge.
Private Bridges
Triplebit operates private Tor bridges for non-profits/NGOs, activists, and researchers on a case-by-case, as-needed basis. To provide you with a private bridge line we will need to understand your specific requirements:
- How many users do you have?
- Where are your users located?
- What is your threat model?
- What platforms are your users using? Desktop? Android?
- Can you run your own bridges? Or do you need bridges from us?
If this service would be helpful to your organization, please feel free to contact us.