-
Speedtest with custom location:
https://fccx.speedtestcustom.com/ -
verify DNS resolution via Unbound/Tor:
dig google.com @127.0.0.1 -p xxxx
(where p means port, and 127.0.0.1 is implied local)
- Test Web Traffic:
curl https://check.torproject.org/api/ip
This should show that your public IP is that of a Tor exit node.
- Test IPv6 (if configured): If you have enabled IPv6 routing on the host and in your ip6tables, verify with:
curl -6 https://check.torproject.org/api/ip
- Another Great One:
curl --socks5 127.0.0.1:9050 https://check.torproject.org/api/ip
If the output shows "IsTor":true
, you’re fully anonymous!
curl https://check.torproject.org/
STATUS:
systemctl status tor
systemctl status unbound
pihole status
sudo journalctl -u unbound --no-pager | tail -20
sudo journalctl -u tor --no-pager | tail -20
sudo systemctl status pihole-FTL
sudo journalctl -u pihole-FTL --no-pager | tail -20
sudo systemctl restart pihole-FTL
you can also replace restart with stop start, or replace ‘pihole-FTL’ with tor, unbound
netstat -tulnp | grep 9053
Check if DNS requests go through Tor:
dig +short whoami.akamai.net @127.0.0.1
App armor:
aa-status
ss -tulnp | grep :5335
sudo systemctl status pihole-FTL