Sats4AI Now Available Over Tor
Every tool, every API endpoint, every discovery manifest — now accessible as a Tor hidden service. No clearnet required. Your IP never touches our server.
April 17, 2026
Tor hidden service address:
j5tfaz7s7osapdbry4d2wb5usyhtcvrm7kutonliqq7sjv2c47lsgoid.onionOpen this in Tor Browser or route your agent's HTTP client through a SOCKS5 proxy at 127.0.0.1:9050.
Why This Matters
Sats4AI already requires no signup, no API keys, and no KYC. Lightning payments are pseudonymous by default. But your IP address still hit our Nginx logs on every request. The .onion endpoint closes that gap.
For users in restrictive regions
If your country blocks AI tools, VPNs, or Bitcoin services, the .onion endpoint bypasses network-level censorship entirely. No DNS to block, no IP to filter. Tor's end-to-end encryption means your ISP sees Tor traffic, not “AI API calls paid with Bitcoin.”
For privacy-conscious developers
Route your agent's requests through Tor and the only thing we see is a circuit from a Tor relay. We can't correlate your requests across sessions, can't geolocate you, can't log your IP. Combined with Lightning's pseudonymous payments, you get genuine operational privacy.
For AI agents that need autonomy
An autonomous agent running over Tor with a Lightning wallet is genuinely uncensorable. No platform can revoke its API key (there isn't one), no intermediary can block its payments (Lightning is peer-to-peer), and no network observer can see what it's doing.
How to Use It
Tor Browser (humans)
Just open the .onion URL in Tor Browser. If you visit sats4ai.com in Tor Browser, you'll see an automatic “.onion available” banner — click it to switch.
curl (developers)
# Discover available tools over Tor
curl --socks5-hostname 127.0.0.1:9050 \
http://j5tfaz7s7osapdbry4d2wb5usyhtcvrm7kutonliqq7sjv2c47lsgoid.onion/api/discover
# L402 flow over Tor (same as clearnet, just different base URL)
curl --socks5-hostname 127.0.0.1:9050 \
-X POST http://j5tfaz7s7osapdbry4d2wb5usyhtcvrm7kutonliqq7sjv2c47lsgoid.onion/api/l402/generate-image \
-H "Content-Type: application/json" \
-d '{"prompt": "a cat in space", "model": "auto"}'Requires Tor running locally. Install: brew install tor / apt install tor / choco install tor
Node.js / Python (agents)
# Node.js — use socks-proxy-agent
import { SocksProxyAgent } from "socks-proxy-agent";
const agent = new SocksProxyAgent("socks5h://127.0.0.1:9050");
const res = await fetch(
"http://j5tfaz7s7osapdbry4d2wb5usyhtcvrm7kutonliqq7sjv2c47lsgoid.onion/api/discover",
{ agent }
);# Python — use requests with socks
import requests
proxies = {"http": "socks5h://127.0.0.1:9050"}
res = requests.get(
"http://j5tfaz7s7osapdbry4d2wb5usyhtcvrm7kutonliqq7sjv2c47lsgoid.onion/api/discover",
proxies=proxies
)Everything works
The .onion endpoint is not a subset. It serves the exact same Next.js application as sats4ai.com:
- All 30+ L402 and MCP tool endpoints
- Discovery:
/api/discover,/.well-known/mcp,/.well-known/l402,/.well-known/agent.json - Full web dashboard (browse tools, pay with WebLN)
- Docs, blog, all static pages
- Async job polling and webhook callbacks
No HTTPS required — Tor provides end-to-end encryption natively. The http:// prefix is correct and secure over .onion.
The Full Privacy Stack
Tor access completes the privacy picture. Here's what an agent or user gets when combining all layers:
| Layer | What it hides |
|---|---|
| Tor (.onion) | IP address, geographic location, network identity |
| Lightning (L402) | Payment identity — no accounts, no credit cards, pseudonymous by default |
| No signup / No API keys | Email, name, phone — we never ask, so we never store |
| Per-request payment | Usage patterns — no persistent session to correlate across requests |
Who Is This For?
A developer in a country where AI tools are blocked. They run Tor, hit the .onion, pay a few sats over Lightning, and get the same image generation, transcription, or translation that a user in San Francisco gets. No VPN subscription, no account that can be traced back to them.
A journalist using AI to transcribe sensitive interviews. The audio never leaves their machine unencrypted, the payment can't be linked to their identity, and their IP never appears in any server log.
An autonomous agent that needs to survive infrastructure changes. If a DNS provider goes down, if Cloudflare blocks a region, if an ISP starts filtering — the .onion address keeps working. It's a cryptographic identity, not a domain registration.
Try it now
Open the .onion in Tor Browser, or point your agent at it with --socks5-hostname.