View Relay "TORPi"

Family: 1 relay | [email protected] | AS7922 | United States of America | Linux

Consensus
In Consensus (9/9 Directory Auths)
Flags
Running, V2Dir, Valid (3)
BW Verified
4/6 BW Auths Measured 8 bit/s Median
Stability
Not Overloaded | UP 1mo 1w 6d ago | UP 1% (1M)
Reachability
IPv4: 9/9 (Directory Auths)
First Seen
1y 11mo 3w ago
BW Weight
0.00% of Network | 8 Kbit/s Observed By Relay
Version
0.4.8.17 Not Recommended
Issues Detected:
  • Guard: bandwidth below threshold : Observed bandwidth 0.0 MB/s is below 2 MB/s minimum (AuthDirGuardBWGuarantee)
    Suggestion: Guard requires ≥2 MB/s bandwidth OR being in top 25% of network. To increase bandwidth: 1) Ensure adequate upstream capacity, 2) Check RelayBandwidthRate/RelayBandwidthBurst in torrc, 3) Monitor with Nyx or ARM.
  • Guard: Time Known below threshold : Time Known 0.4 days is below 8 days requirement (7.6 more days needed)
    Suggestion: Time Known tracks how long authorities have observed your relay. This resets if: 1) Identity key changes, 2) Long downtime makes authorities forget you. Just keep running stably.
  • Guard: requires Stable flag : Guard flag requires having the Stable flag first
    Suggestion: Get Stable flag by maintaining consistent uptime. Stable requires uptime and MTBF at or above network median (typically 2-3 weeks of stable running).
  • Guard: requires Fast flag : Guard flag requires having the Fast flag first
    Suggestion: Get Fast flag by having bandwidth ≥100 KB/s OR in top 7/8ths of network. Most relays get this easily.
  • Not eligible for Stable flag : Uptime or MTBF below network median for most authorities
    Suggestion: Stable flag requires uptime/MTBF at or above network median. Keep your relay running continuously for 2-3 weeks. Avoid restarts. Use reliable hardware and network connection.
  • HSDir: Time Known below threshold : Time Known 9.7 hours below 25 hours (dir-spec default)
    Suggestion: Most authorities use 25 hours for HSDir TK. moria1 uses ~10 days. Keep running stably.
  • Tor version not recommended : Running Tor version 0.4.8.17 which is not on the recommended list.
    Suggestion: Update to the latest stable Tor version. Outdated versions may have security vulnerabilities and could eventually be rejected by the network. See torproject.org/download for latest releases.

Addresses
OR Address
c-76-141-211-65.hsd1.il.comcast.net
76.141.211.65:36002
Reachability (Directory Authorities)
IPv4
9/9
Location
Country
United States of America United States of America
Interactive Map
View on Interactive Map
Autonomous System
AS Number
AS7922
AS Name
Comcast Cable Communications, LLC (BGP.tools)

Current Flags (3): Running, V2Dir, Valid
Eligible Flags (3): Guard: 0/9 | Stable: 0/9 | Fast: 0/9 | HSDir: 0/9 | Running: 9/9 | V2Dir: 9/9 | Valid: 9/9 (need ≥5/9 for flag)
Eligibility Flag Vote Details
Flag Metric Status Relay Value Threshold Required
Guard WFU Meets 100.0% (DA) ≥98% (all authorities)
Time Known Below (need 7.6 more days) 0.4 days (DA) ≥8 days (all authorities)
Bandwidth Below 8.8 Kbit/s (R) ≥16.0 Mbit/s OR ≥80.0 Mbit/s-296.0 Mbit/s
Stable MTBF Below 0 days (DA) ≥26.6d - 45.4d (varies)
Uptime Meets 43.2d (R) ≥19.1d - 19.7d (varies)
Fast Speed Below 8.8 Kbit/s (R) ≥800.0 Kbit/s (guarantee) OR top 7/8
HSDir WFU Meets 100.0% (DA) ≥98.0%
Time Known Below 0.4 days (DA) ≥1.0d (most) / 9.9d (max)

(DA) = Dir. Auth. Measured | (R) = Relay Reported
Data from Tor CollecTor (authority votes, fetched 2026-01-10 04:46:16).

Last fetch was at Sat, 10 Jan 2026 04:47:26 GMT.

TORPi
FFDC0E2EA1D56C555978920C6D26EBA6AFF248FE
none
[email protected]
reject: 
  1-65535
none
reject *:*
FFDC0E2EA1D56C555978920C6D26EBA6AFF248FE
none
none
8.78 Kbit/s | 8.78 Kbit/s| 8.59 Gbit/s| 8.59 Gbit/s  Measured
0.00% | N/A | 0.00% | N/A
c-76-141-211-65.hsd1.il.comcast.net | 76.141.211.65:36002
none
none
United States of America United States of America
View on Interactive Map
AS7922 | Comcast Cable Communications, LLC (BGP.tools)
Running Running V2Dir V2Dir Valid Valid
Match Overall Uptime (1.2%/1.6%/0.0%/33.2%)
1.2%/1.6%/0.0%/33.2%
UP 1mo 1w 6d ago
1y 11mo 3w ago (2024-01-22 12:00:00) | 1h 55m 4s ago (2026-01-10 03:00:00)
1mo 1w 6d ago (2025-11-28 00:09:09)
2024-06-15 03:00:00
No
Linux | Tor 0.4.8.17 on Linux
0.4.8.17 | No | obsolete

Data from Tor CollecTor (authority votes, fetched 2026-01-10 04:46:16).

  • Consensus Status (need ≥5/9): In Consensus — 9/9 authorities voted.
  • Flag Eligibility (need ≥5/9 for flag): Guard: 0/9 | Stable: 0/9 | Fast: 0/9 | HSDir: 0/9 | Running: 9/9 | Valid: 9/9 | V2Dir: 9/9
  • Reachability: IPv4: 9/9
  • Consensus Weight (Dir. Auth.): Median: 8 bit/s | Min: 8 bit/s | Max: 8 bit/s
  • Identified Issues:
    • Guard: bandwidth below threshold: Observed bandwidth 0.0 MB/s is below 2 MB/s minimum (AuthDirGuardBWGuarantee)
      • Suggestion: Guard requires ≥2 MB/s bandwidth OR being in top 25% of network. To increase bandwidth: 1) Ensure adequate upstream capacity, 2) Check RelayBandwidthRate/RelayBandwidthBurst in torrc, 3) Monitor with Nyx or ARM.
    • Guard: Time Known below threshold: Time Known 0.4 days is below 8 days requirement (7.6 more days needed)
      • Suggestion: Time Known tracks how long authorities have observed your relay. This resets if: 1) Identity key changes, 2) Long downtime makes authorities forget you. Just keep running stably.
    • Guard: requires Stable flag: Guard flag requires having the Stable flag first
      • Suggestion: Get Stable flag by maintaining consistent uptime. Stable requires uptime and MTBF at or above network median (typically 2-3 weeks of stable running).
    • Guard: requires Fast flag: Guard flag requires having the Fast flag first
      • Suggestion: Get Fast flag by having bandwidth ≥100 KB/s OR in top 7/8ths of network. Most relays get this easily.
    • Not eligible for Stable flag: Uptime or MTBF below network median for most authorities
      • Suggestion: Stable flag requires uptime/MTBF at or above network median. Keep your relay running continuously for 2-3 weeks. Avoid restarts. Use reliable hardware and network connection.
    • HSDir: Time Known below threshold: Time Known 9.7 hours below 25 hours (dir-spec default)
      • Suggestion: Most authorities use 25 hours for HSDir TK. moria1 uses ~10 days. Keep running stably.
    • Tor version not recommended: Running Tor version 0.4.8.17 which is not on the recommended list.
      • Suggestion: Update to the latest stable Tor version. Outdated versions may have security vulnerabilities and could eventually be rejected by the network. See torproject.org/download for latest releases.

Green = meets threshold, Red = below threshold, Yellow = partial.

Metric Dir Auth Measured Dir Auth Threshold Status
In Consensus (Dir. Auth.) 9/9 authorities ≥5/9 (majority) IN CONSENSUS
Running (IPv4 Reachable) 9/9 authorities reached this relay ≥5/9 (majority) RUNNING
Valid 9/9 (Running + Valid Descriptor) ≥5/9 (majority) VALID
Consensus Weight (Dir. Auth.) 8 bit/s (median) N/A (no threshold, used for path selection)
Guard WFU (Dir. Auth., guard-wfu) 100.0% ≥98% (all authorities) MEETS
Guard TK (Dir. Auth., tk) 0.4 days ≥8 days (all authorities) BELOW - need 7.6 more days
Guard BW (Relay Reported) 8.8 Kbit/s ≥16.0 Mbit/s OR ≥80.0 Mbit/s-296.0 Mbit/s BELOW - need ≥2 MB/s
Stable Uptime (Relay Reported) 43.2d ≥19.1d - 19.7d (typical) MEETS - all authorities
Stable MTBF (Dir. Auth., mtbf) 0 days ≥26.6d - 45.4d (typical)
[Stricter] moria1: ≥376.2d
BELOW - 0/9
Fast Speed (Relay Reported) 8.8 Kbit/s ≥800.0 Kbit/s (guarantee) OR ≥816.0 Kbit/s (typical)
[Stricter] moria1: ≥8.4 Mbit/s
BELOW - need ≥100 KB/s
HSDir WFU (Dir. Auth., wfu) 100.0% ≥98.0% (from all auths) BELOW - 0/9
HSDir TK (Dir. Auth., tk) 0.4 days ≥1.0d (8/9 auths)
[Stricter] moria1: ≥9.9d
BELOW - 0/9

Each cell shows: your measured value | authority threshold. Green = meets, red = below. Flags: green = all authorities agree, yellow = partial.

Authority Running Valid BW Scan (Authority) v4 Flags Fast (Relay|T) Guard BW (Relay|Threshold) Guard WFU (M|T) Guard TK (M|T) Stable MTBF (M|T) Stable Uptime (Relay|T) HSDir WFU (M|T) HSDir TK (M|T) Desc Published Cons Wt (Authority)
bastet (US) Yes Yes Y Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 224.0 Mbit/s OR 16.0 Mbit/s 100.0% | 98% 0.4d | 8d 0.4d | 47.0d 43.2d | 19.7d 100.0% | 98.0% 0.4d | 1.0d 2026-01-09 18:09:26 8 bit/s
dannenberg (DE) Yes Yes N Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 80.0 Mbit/s OR 16.0 Mbit/s 100.0% | 98% 0.4d | 8d 0.4d | 35.7d 43.2d | 20.2d 100.0% | 98.0% 0.4d | 1.0d 2026-01-09 18:09:26 8 bit/s
dizum (NL) Yes Yes N Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 80.0 Mbit/s OR 16.0 Mbit/s 100.0% | 98% 0.4d | 8d 0.4d | 26.6d 43.2d | 20.4d 100.0% | 98.0% 0.4d | 1.0d 2026-01-09 18:09:26 8 bit/s
faravahar (US) Yes Yes N Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 80.0 Mbit/s OR 16.0 Mbit/s 2.7% | 98% 18.0d | 8d 0.4d | 41.9d 43.2d | 19.1d 2.7% | 98.0% 18.0d | 1.0d 2026-01-09 18:09:26 8 bit/s
gabelmoo (DE) Yes Yes Y Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 288.0 Mbit/s OR 16.0 Mbit/s 100.0% | 98% 0.4d | 8d 0.4d | 45.4d 43.2d | 19.6d 100.0% | 98.0% 0.4d | 1.0d 2026-01-09 18:09:26 8 bit/s
longclaw (US) Yes Yes Y Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 80.0 Mbit/s OR 16.0 Mbit/s 1.1% | 98% 36.0d | 8d 0.4d | 48.7d 43.2d | 19.5d 1.1% | 98.0% 36.0d | 1.0d 2026-01-09 18:09:26 8 bit/s
maatuska (SE) Yes Yes Y Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 296.0 Mbit/s OR 16.0 Mbit/s 100.0% | 98% 0.4d | 8d 0.4d | 42.3d 43.2d | 19.4d 100.0% | 98.0% 0.4d | 1.0d 2026-01-09 18:09:26 8 bit/s
moria1 (US) Yes Yes Y Yes Running, V2Dir, Valid 8.8 Kbit/s | 8.4 Mbit/s 8.8 Kbit/s | 232.0 Mbit/s OR 16.0 Mbit/s 100.0% | 98% 0.4d | 8d 0.4d | 376.2d 43.2d | 20.4d 100.0% | 98.0% 0.4d | 9.9d 2026-01-09 18:09:26 8 bit/s
tor26 (AT) Yes Yes Y Yes Running, V2Dir, Valid 8.8 Kbit/s | 816.0 Kbit/s 8.8 Kbit/s | 272.0 Mbit/s OR 16.0 Mbit/s 4.0% | 98% 19.2d | 8d 0.6d | 51.8d 43.2d | 19.7d 4.0% | 98.0% 19.2d | 1.0d 2026-01-09 18:09:26 8 bit/s

— = not tested/available • Format: relay value | authority threshold • WFU = Weighted Fractional Uptime • TK = Time Known

Bandwidth Values Explained:
Relay Reported = Your relay's self-reported bandwidth from its descriptor (observed_bandwidth). Used for flag eligibility (Guard, Fast).
Authority Measured = Bandwidth measured by authority's sbws scanner. Used for consensus weight (path selection probability).
Why different? Authorities verify your reported bandwidth independently. 6 of 9 authorities run bandwidth scanners; 3 use relay-reported values directly.
Stable Uptime (Two Data Sources):
Relay Uptime = From Onionoo API (last_restarted field). This is your relay's self-reported uptime from its descriptor. Same value for all authorities.
Authority Threshold = From CollecTor vote files (flag-thresholds stable-uptime). Each authority may have different thresholds.
Why two sources? Vote files contain authority thresholds but not per-relay uptime values. Onionoo aggregates relay descriptors which include uptime.