[tor-relays] How do I get the *current* Tor exit node IP address over the control port?
Matt Traudt
pastly at torproject.org
Tue Jan 28 13:25:06 UTC 2020
On 1/27/20 13:28, Mike wrote:
>
> Perhaps if I should have clarified my global goal:
>
> I want to be able to receive a new **different** IP address for
> different connections which a bash script makes. Suppose (simplified):
>
Yeah that's a completely different question. No wonder you didn't get
the answer you were expecting.
A key phrase you're looking for is "stream isolation." Or keep asking
Tor for a new identity. Both can be rather wasteful. Perhaps the best
answer is to just build the circuits yourself, but if you're new to
programming/python, that isn't going to be obtainable.
As those docs you linked to say:
> Tor does not have a method for cycling your IP address. This is on
purpose, and done for a couple reasons. The first is that this
capability is usually requested for not-so-nice reasons such as ban
evasion or SEO. Second, repeated circuit creation puts a very high load
on the Tor network, so please don't!
At this time, this is all I think I should say. It sounds a lot like
you're trying to do some of those things that hurt Tor: either by
unfairly consuming its resources for your personal gain (e.g. yet
another hobby Tor-powered web crawler or SEO), or by harming its
reputation by "ethically" hacking or vulnerability scanning the web.
You can email me off-list with actual information about what you're
working on if you think it's a good use of Tor and I will help further.
Otherwise for further questions I suggest tor-talk at .
--
Matt
More information about the tor-relays
mailing list