torsocks
Transparently route traffic through Tor
TLDR
Run command using Tor
SYNOPSIS
torsocks [OPTIONS] [COMMAND [ARGS...]]
DESCRIPTION
torsocks routes network traffic from applications through the Tor network by intercepting network calls and redirecting them through Tor's SOCKS proxy. By default, it connects to the Tor daemon running at 127.0.0.1:9050.
The tool uses LD_PRELOAD to intercept network system calls, providing transparent Tor routing for applications that don't natively support SOCKS proxies.
PARAMETERS
--shell
Spawn a new Tor-enabled shell-i, --isolate
Isolate traffic through a different Tor circuit-a, --address IP
Connect to Tor proxy at specified address-P, --port PORT
Connect to Tor proxy on specified portshow
Check if current shell is Tor-enabledon|off
Toggle Tor routing in current shell
CAVEATS
Requires running Tor daemon. Some applications may leak DNS or use protocols incompatible with Tor. UDP traffic is not supported. Applications using raw sockets bypass torsocks.
HISTORY
torsocks was developed as an improved replacement for torify, providing better security and functionality for routing traffic through the Tor anonymity network.
