Tor relay & exit hosting on offshore hardware
Tor relays, bridges and exits on a network that publishes its abuse posture and won't pull the plug after one boilerplate notice.
Why Tor relay & exit hosting runs better here
Specific technical alignment, not generic copy. Each point below is something the workload needs and we provide by default.
What you should know about Tor relay & exit hosting on Cryptoservers
Cryptoservers explicitly allows Tor relays, including exit nodes. We respond to legitimate abuse (CSAM, credible threats, phishing) within 48 hours; everything else stays up. Each location publishes its peering and the upstream carriers it announces under our ASN, so you can pick a relay home that won't disappear behind a forwarded DMCA email.
For relays you'll typically size to vps-growth or vps-business — relay traffic is bursty (10–50 TB/month) but CPU is light because relayed bytes pass through TLS/AES-NI. Exit nodes are a different load profile: more L4 connection churn, more ARP table pressure, more abuse mail. We've put the abuse handling on a documented track (see /abuse/) so you know exactly what triggers a takedown vs. a heads-up email.
Recommended locations for Tor relay & exit hosting
Each location below has a specific legal or technical alignment with this workload — the others stay supported, but we suggest these first.
Iceland
Reykjavík (IS-RKV)Free-press constitution, no MLAT, geothermal grid.
Tor relay & exit hosting in IcelandRomania
Bucharest (RO-BUH)Constitutional court rejected EU data retention twice.
Tor relay & exit hosting in RomaniaNetherlands
Amsterdam (NL-AMS)Tier-1 carriers, lowest median EU latency, AMS-IX peering.
Tor relay & exit hosting in NetherlandsPlans sized for Tor relay & exit hosting
Pre-filtered by CPU, memory and bandwidth profile. Pick the cheapest that fits your projected load — you can hot-resize later without downtime.
Growth
- 4 vCPU
- 8 GB DDR4 ECC
- 120 GB NVMe
- 2.5 Gbps unmetered
Business
- 6 vCPU
- 16 GB DDR5 ECC
- 240 GB NVMe
- 5 Gbps unmetered
Shield
- 16 cores · 32 threads
- 64 GB DDR4 ECC
- 2× 1 TB NVMe
- 1 Gbps unmetered
Tor relay & exit hosting — questions answered
Are exits really allowed in your chosen jurisdiction, or just unaccompanied silence?
How much bandwidth does a meaningful Tor relay need?
What happens when a downstream carrier complains about my exit?
Can I run a hidden service (.onion) on the same node?
Do you publish your ASN, peers, and downstream carriers?
Run something else on the same hardware
Same network, same posture, same prices. Pick what you actually need to deploy.
Self-hosted VPN server
VPN server
Self-hosted mail server
Mail server
Bitcoin full node
Bitcoin node
Monero full node
Monero node
Lightning Network node
Lightning node
Matrix homeserver hosting
Matrix homeserver
Game server hosting
Game server
Offshore seedbox
Seedbox
Dev sandbox / CI runners
Dev sandbox
Tor relay & exit hosting — deploy in 60 seconds
No email, no ID, no account. Pick a plan, pay in crypto, get root.