Configuring Tor to use a specific country as an exit node

When downloading the browser, I have such a daddy on my desktop

You need to go into it and select the folder Browser => TorBrowser => Data => Tor.





In this Tor daddy, we are only interested in the torrc file, you need to open it with a blank note and enter the command in it so that the output always contains one or several countries that you need.


Since I do not need the whole world to work, but only our one homeland, I changed the settings of my browser by entering the command in this way. I only added the last line. ExitNodes (ru), it looks like this for me.


But this is in the event that you need one country, and if you need several, then you need to write them separated by commas and always in such curly brackets. Then start saving. In my case, ru is the designation for Russia. The designations and letter codes of the countries of the world can be found on the Internet, I look at them on the site [link] in a column of 2 letters. Well, in order to select a specific city, you just need to click on the onion and then the cities will only change from the list of those countries that you need. In order to check the city that you are currently configured, you need to enter the command into the search bar of the browser [link] and configure the browser to the desired city manually.


After entering the command and saving, the browser works as it should.

And now not a lot about the cons that I see in it for myself:

  • not all forums and sites allow entry from such a browser (for example, Flamp cannot be fooled in this way)
  • Works slowly, but this is due to the constant change of nodes in the chain
  • Sometimes the IP address changes too quickly and at the wrong time.
  • After updating the browser, you need to re-enter the logins and passwords of the pages on which you were at the moment, enter the mailbox for example

And yet I like this browser and use it. It opens up a lot of possibilities. And if I find out something new about him, I will definitely inform you.

We make it so that the IP addresses in Tor are only for certain countries. For everyone who uses the Tor browser, it is no longer a secret that the ip addresses there are constantly changing. And let's say, if you are defined as a user from the United States, then in a couple of minutes everything can change. And you will use some other address. For example: Germany, Greece, France, etc. It is impossible to change a permanent shift, but you can make it so that each next address that will be assigned to you is one specific country.

In order to do all this, you need to edit the file torrc located in the directory Tor Browser-> Data-> Tor-> torrc... Open this file with notepad and add the line to it ExitNodes ()... In brackets { } you must specify the letter code of a specific country, the ip addresses of which you will use. For example, for Russia there will be ExitNodes (RU), for the USA - ExitNodes (RU), Germany - ExitNodes (DE).

A complete list of countries and their letter codes can be found on Google. Save your changes in notepad and start Tor.

How to set up Tor correctly

Who Uses Tor?

Family & Friends

People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.

Businesses

Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.

Activists

Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.

Media

Journalists and the media use Tor to protect their research and sources online.

Military & Law Enforcement

Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.

Here you can find answers to questions about the network: advantages, disadvantages and Tor problems networks. All this will help you to easily achieve anonymity on the network and avoid cases of revealing your identity.

Tor - what is it?

Tor is a global Internet network that ensures user anonymity. It is known to many as onion routing. You can connect to it using the Tor browser.

Why do you need Tor?

Tor's main advantage is its anonymity. What kind of requests you make, what IP address you use, what files you download - no one will know. In addition, you will be able to view sites that your provider usually blocks.

Browser Tor, how to select the IP of a specific country, how to ban the IP of a specific country

Moreover, you will be able to view onion sites and view a site from a different geographic region. Just remember, using any browser other than Tor on the Tor network will not ensure your anonymity.

How to use Thor?

The Tor network alone is not capable of protecting all of your internet traffic. It is able to protect only those applications that are configured to transmit data through it. For your convenience, you can use the Tor browser. It is already optimally configured to protect your anonymity on the Internet. Using any other browser with the Tor network is unsafe.

Is torrenting over the Tor network real?

Unfortunately, you cannot download torrents when you are on the Tor network. Otherwise, your real IP address will be visible to others. This means that anonymity is leveled. In addition, Tor will be slowed down - and not only for you, but also for other users.

Can I install additional plugins for the Tor browser?

Thor browser blocks any plugins like Flash, RealPlayer, Quicktime and others by default. The point is, they can reveal your real IP address. And that is why we do not recommend installing additional plugins for the Tor browser. Otherwise, the benefit from using the Tor browser will be minimal or completely nullified.

How to stay safe while using the Tor network?

Use only secure https connection to connect to sites. The Tor browser has an extension that always establishes just such a connection. Still, it's better to make sure for yourself that the address is specified as https: // in the address bar, and you see the name of the site that you requested.

How to avoid detection on the Tor network?

While you are online, do not open documents uploaded through Tor. If the browser warns you of a danger when opening a document (DOC and PDF), do not ignore it. After all, a document may contain links to certain Internet resources, by opening it, you will disclose your IP address to others. So it is better to disconnect from the network or the Internet before opening such documents.

How to hide the use of the Tor network?

Thor hides the sites you connect to from attackers. But, by default, it does not hide the use of the Tor network. Therefore, if it is important for you to hide the use itself, then you can reduce the risk of detection using the Tor forwarding bridge. But the best way to protect yourself is social: the more Tor users are near you and the more diverse their interests, the more difficult it is to find you among them. Invite other people to use Thor too!

Should Tor be used for illegal purposes or should such use be encouraged?

No, Thor was created for freedom of expression, privacy and human rights protection. Tor is not a law-breaking application, either by Tor users or by the owner of the forwarding servers.

Can you promise that I won't get in trouble getting the Tor forwarding server up and running?

No, any new technology creates some legal uncertainty and Tor is no exception. And we cannot guarantee that you will never be held liable in any way for your Tor forwarding server. However, we truly believe that the people providing forwarders should not and cannot be held responsible for the traffic that passes through them. As a confirmation, we ourselves provide a server for forwarding traffic for the needs of the network.

Tailored specifically for you

The Tor network consists of a huge number of intermediate (middle relay) and end servers (exit relays), through which user data passes through thousands of threads. To get an idea of ​​the scale of the Tor network, take a look at the world map of servers in the Tor. It is through one of them that your data will run the next time you launch the tor browser. The dynamic map can be viewed at the link.

As in any computer network, among the servers there are defective, infected, and sometimes cybercriminals' servers. Most often, these servers hunt for passwords from social. networks, email or credit card details.

To promptly exclude such nodes from the network, the Tor Project team develops and maintains two free programs. They allow you to identify and block "bad" sites and make Internet surfing as safe as possible.

Exitmap checks exit servers - the place where traffic leaves the encrypted tor network and goes to the clean internet. For this, an algorithm for comparing operations on all target servers is used.

For example, a user can log into Facebook (by entering a username and password) directly, without using Tor. Then write a digital signature that the site uses to confirm that this is indeed the real Facebook. You can then compare the signature with the signatures obtained through Exitmap. The program uses thousands of output relays to connect to Zuckerberg's site, recording each digital signature. Relays with signatures that differ in any way from the original can be considered potentially dangerous.

Another Sybilhunter program is able to detect entire sets of relays, which are probably controlled by one person. There is a good chance that such a person will use the servers for hacker attacks. Among other things, Sybilhunter can create graphical images to illustrate the server availability graph in Tor. This, in turn, allows the definition of relays that are controlled by one "center".

The figure shows a visualization of the uptime of some servers inTor, as of part of January 2014. The red shows the exit areas, which are very likely controlled by the same person.

Tor Project research has identified a wide range of potentially dangerous servers.

9. Tuning Tor

Some of them try to steal registration information from popular sites and services. Others block certain sites within certain countries, forming a censoring system. There are also nodes that attack Bitcoin wallets in order to take possession of the victim's virtual currency!

It is fair to say that hazardous or likely hazardous output relays are an absolute minority in the entire TOR network. The chances of hitting them by accident are minimal. In addition, the "HTTPS-Everywhere" utility is built into the Tor browser, which will not allow an attacker to achieve their goals, or minimize harm.

What is Tor Browser

Full name: Tor Browser Bundle. Built on the Mozilla Firefox platform, it is one of the most anonymous browsers in the world. Changes your IP address to a random IP address when using the Internet.

Tor Browser: specify which region to use

Uses IP of different countries: Romania, Luxembourg, Switzerland, Germany. Does not store cookies and a log of visited sites, does not remember logins and passwords. Uses a special secure network of anonymous proxy servers.

Installing Tor

You can download this browser from the official website: https://www.torproject.org/download/download-easy.html.en

Select your language and click Download Tor Browser Bundle:

Run the downloaded file:

Click on OK:

Install:

Ready:

Using the Tor Browser

Run the program. If you haven't unchecked Launch Tor Browser Bundle after finishing the installation, it will start automatically.

When you first start, you will see a window Tor network settings... Here you need to select the type of connection. Nowadays, in most cases, the first option is suitable - the button Connect:

After that, the browser connects to the Tor network, which will hide your real IP address, ensuring your anonymity. Wait for the network connection:

For more privacy, you can request English versions of the pages. But this is not a key indicator of anonymity. You can click No:

The Tor browser is not installed in the system in the traditional way, because is a portable application. The program can be carried with you on a USB flash drive. By default, when unpacking, it is placed in the folder Tor browser on the desktop:

You can move the browser folder to any location. When you want to run the TOP for anonymous visiting of any site, enter the program folder and run the file Start Tor Browser.exe:

After pressing the button New personality and before using the new IP, go to 2ip.ru and see what has changed.


To imitate a different personality, it is desirable to change not only the IP, but also the country. Press the button if necessary. Tor, select item New personality (New Identity) until the country changes:

Attention! Due to the fact that, while working through Tor, the browser traffic goes through many proxy servers, the page loading speed is much lower than through a regular browser.

Also read our article on how to use the secure Tor network on Andoid devices.

It might be interesting:

Configuring the Tor browser

If you do not know what a Tor browser is, then read the article What is the Tor network.

Download Tor Browser only from the official website torproject.org.

Be careful! There are sites that mimic the Tor project site. For example, torprojectS.org (added an S at the end) is trying to install a Trojan on your computer. DO NOT download Tor Browser from third party sites.

By the way, Tor Browser is made on the basis of the Mozilla Firefox browser, since it is the only browser that can independently work with a Socks connection without the participation of the operating system.

Download Tor Browser from torproject.org

After installing Tor Browser is completely ready to work.

Below is a screenshot from the official website.

  • do not install additional plugins, as there is a possibility of installing a plugin that will give out your real location. All the necessary plugins for anonymity are already installed.
  • do not open documents (such as PDF and DOC) downloaded from the Tor Browser while you are online. Macros can be embedded in such files that will request access to the Internet directly through the program, bypassing the Tor network. This will compromise your real IP address.
  • do not download torrents on the Tor network, as this will increase the load on the network. Torrent programs are designed in such a way that they always access the Internet directly and do not take into account proxy settings. This could compromise your real IP address.
  • use https connection always. Such a connection will ensure the security of data transmission.

The main Tor Browser window.

For security settings, click Security Settings.

Configure the security level:

  • Low (default) - standard security level.
  • Suitable for most users. Websites open correctly and nothing is blocked.

  • Medium - Javascript is blocked on sites where https is not supported. HTML5 video and audio triggered with a click through the NoScript plugin
  • High - Javascript is blocked on all websites. HTML5 video and audio is launched with a click through the NoScript plugin. Some types of pictures, fonts and icons are forbidden to download
  • Since most websites use Javascript, it is problematic to view websites in High mode, as some of the content is hidden. We recommend this mode when you need to read an article on a website, and you do not need to log in to the site.

Tor Browser is ready to go and you can start surfing anonymously right away.

Remember that with this setup, only the Tor Browser uses the Tor network. All other programs use a direct Internet connection and pass your real IP address.

What to do with programs that cannot directly work with the Socks protocol? For example, email clients, other browsers, instant messaging programs, etc. We recommend using Proxifier to redirect the traffic of such programs to the Tor network.

Configuring Proxifier over the Tor network

Proxifier can:

  • redirect traffic from all operating system programs through a proxy (including email clients, all browsers, instant messaging programs)
  • create proxy chains
  • use a proxy DNS server, hiding the real DNS of the ISP
  • supports http and socks proxies

Download Proxifier for Windows Download Proxifier for macOS

The main page of the Proxifier official website.

Install the Proxifier program.

This program is able to collect all the traffic of the operating system and pass it through a specific proxy server.

To configure Proxifier, you need to know the Tor network port used. Go to the Preferences section of the Tor Browser.

Select the Network Settings section.

Look at the local IP address used and the Tor network connection port. This data must be inserted into the Proxifier program so that all operating system traffic goes to the Tor network. In our example, 127.0.0.1 and port 9150.

Run the Proxifier program.

ATTENTION!

Browser Tor how to choose a country

It is important to first launch Tor Browser and wait until the main window appears. And only after that start the Proxifier program.

Click on the Proxies button.

Click the Add button.

Enter the IP address and port. In our example: 127.0.0.1 and port 9150.

Select Yes - you agree to use this default proxy.

Open any browser or email program. In Proxifier, you will see a list of connections through the Tor network. In any browser, you can check your IP address and make sure that the IP address from the Tor network will be shown, and not your real IP address.

If something doesn't work, then close Tor Browser and Proxifier. And then launch Tor Browser and wait for the main window to appear. Then start Proxifier. You don't need to make any additional settings. All traffic will automatically go through the Tor network. Close Proxifier to get your real IP address back.

Many internet services provide access to their services only when you visit websites or applications from certain countries. IP addresses, and sometimes more variables such as system time, are checked when the user wants to access country restricted services. If the IP is in the country, access is allowed, otherwise it is denied.

There are many workarounds to help users to access these services even if they currently reside in another country. One of the possibilities that I want to talk about in this article is how to configure Tor in such a way that the node exit is in the country to which you want to access the services. Tor offers many so-called nodes which are servers in a particular country and the Tor software runs on them.
For this I am using the Vidalia package which contains all the necessary programs to explain how a particular country can be selected when using Tor. You can download Vidalia and install the software from the link at the bottom of the page. The main interface of the program will boot after installing Vidalia.

The dashboard displays the current state of Tor... The additional information shows exactly what we are going to use to find servers located in the country we want, the IP address of which we need. Click on the View network link - it displays a visual representation of all Tor servers, but only if Tor is running.
Servers can be sorted by country (next to flag), there is also a performance indicator next to them. Take note of some of the best performing server names and exit the menu. We need to add these servers as a node exit in the Tor configuration. Click the "Options" button and there, on the front, the menu tab is displayed, in which you will find the Tor configuration menu entry.
Click the "Browse" button to open a file browser dialog... Left-click on the "torrc" file and select "Edit" from the menu. Now add the following two lines in the config, just insert them at the beginning, for example:

Server1 ExitNodes, server2, server 3
StrictExitNodes 1
Replace server1, server 2, and so on with the names of the servers that you recorded in the network display window. Stop and restart Tor for the changes to take effect.
Now we have to add an HTTP proxy for our browser Firefox. Click on Tools> Options> Advanced Networks and there click on the "Settings" button. Select Manual Proxy Configuration and enter the local port 8118.

You can check the performance using the scriptvisiting IP lookup, which should display the IP of the country you selected from the servers. Download and install the software Vidalia is available online.

Tor browser via country specific IP addresses.

A friend of mine recently knocked on my door with a request to help her in a delicate matter. She wanted to wind up voices in some girly photo contest. I don’t understand who cares about it, people have nothing to do. If I were to receive any prizes (which is also not entirely fair), as I understand it, but does the naive user of the Russian Internet still do not understand that participation in some contests or reposts in VKontakte with promising and flashy names such as “Make a repost”, "Hit the button I like", "Spit over my right shoulder", "And get a super-super graphics card" or "Razer Mamba gaming mouse" will give him the opportunity to get something for free?

Okay, something I got carried away. So, one of the conditions of the competition was that the voting people should be on the territory of Russia. Those. The IP addresses of the users who vote must be from Russia. And she lives in Ukraine. I thought so far to throw her a list of checked ones, and then use the Proxy Switcher program to solve this issue.

But then after thinking a little, I decided to go a simpler way, nooo ... and not because she is blonde, I really love women and blondes in particular :)! Just like, I'm a little lazy person, looking for something easier. I decided, after finishing a little, to throw her beloved, slightly modified Tor Browser to her.

We wrote about Tor in detail in this article "". If you are not yet familiar with this secure anonymous web browser, I advise you to read.

Tor work through IP addresses of a specific country

The Tor network works randomly, i.e. goes online through a constantly changing chain of nodes, and each time your computer is assigned a different IP address for different countries. And we only need Russian!

So, how to configure Tor so that it always gets the IP of a certain weird. For this we need, if you do not have it yet. In the drop-down menu, you can select the interface language. There is also Russian!

Turn on Thor. If you see a green onion and the inscription "Connected to the Tor network" go ahead.

In the same window, click on the Settings button

In the window that appears, go to the Additional tab. Click on the button Edit current torrc... In the torrc editing window, at the very bottom, at the end, add the line ExitNodes (ru). Check the box Apply Selected and click OK

Now let's reload the browser. After launching Tor Browser from all kinds of IPs, it will select only Russian IP-addresses, and change only to Russian ones by pressing the button Change identity.

Thus, you can customize the browser to your liking. For example:

  • Work across any country
    ExitNodes (country code)
  • Work only through specified countries (multiple countries).
    ExitNodes (ua), (ug), (kp), (ru)
  • Block work across a specific country.
    ExcludeExitNodes (de)

Free download

Well, now you know how to make Tor work through the IP addresses of a specific country. Like the article, click on the social network button! And do not forget to subscribe to us on VKontakte, classmates, Twitter and Facebook, so as not to miss the news and be always in the know.

class = "eliadunit">

Tor browser- a program for anonymous Internet browsing. While on the Internet, this browser replaces the real IP address with another address inherent in another country and region. According to experienced observations, the choice of the country occurs at a new start of Tor in a random way, as well as after a while, being in it. In most cases, the choice of a specific country is not necessary, but there are times when you simply cannot do without it. For example, you need to go to a resource from a Russian-speaking country, or to a domain, access to which is open to a certain state.

In such cases, there is a solution. After downloading and installing Tor (if it has not already been done), go to the addressTorBrowser\ Browser\ TorBrowser\ Data\ Tor and find the file torrc.

To access the Internet from a specific country or to prohibit specifying the IP address of one or more countries, the following text should be inserted with the replacement in this document.

class = "eliadunit">

# If non-zero, try to write to disk less frequently than we would otherwise.
AvoidDiskWrites 1
# Store working data, state, keys, and caches here.
DataDirectory. \ Data \ Tor
GeoIPFile. \ Data \ Tor \ geoip
# Where to send logging messages. Format is minSeverity [-maxSeverity]
# (stderr | stdout | syslog | file FILENAME).
Log notice stdout
# Bind to this address to listen to connections from SOCKS-speaking
# applications.
SocksListenAddress 127.0.0.1
SocksPort 9150
ControlPort 9151
ExitNodes
StrictExitNodes 1
ExitNodes (ua), (md), (az), (am), (ge), (kz), (kg), (ly), (lt), (tm), (uz), (ee).
StrictExitNodes (), ().

Lines that will have to be edited individually: ExitNodes and StrictExitNodes.

ExitNodes("Entry nodes") - indicates from which countries the entry is allowed.

StrictExitNodes("Exact entry nodes") - a parameter that prohibits entry from the specified country.

In the above example, countries with a Russian-speaking population are printed, with the exception of Belarus and Russia. Countries must be indicated in brackets, separated by commas. Country designations are indicated in the standard ISO 3166-1 alpha-2 (https://ru.wikipedia.org/wiki/ISO_3166-1), country domains are also written in the same standard. Now let's look at some examples. To prohibit the connection of Tor with Russian parameters, you need to stock StrictExitNodes add { ru}. With these parameters, Tor will connect with the parameters of any country except Russia. If you need to enter only from Russia, then you should specify { ru} after ExitNodes.

Remember! After renewal, reinstallation, Tor browser, the torrc file will be changed to standard. Therefore, we copy it to a separate place before updating, or we go to this site again. site and copy the new code for this file.