Current attack-event status. No active inbound DDoS as of the latest probe; standing L7 mitigation engaged on backup mirrors.
No active inbound DDoS event has been observed by the probe in the past 24 hours. The standing layer-7 challenge on backup A and backup B mirrors is engaged as part of normal operation, not as an active mitigation response. The headline mirror is running without the L7 challenge.
If a DDoS event is in progress as you read this, the homepage incident panel will carry an “investigating” tag at the top with a real timestamp. Recovery from L7 floods historically completes within 30 minutes; the longest in the editorial archive was the March event at 26 minutes from advisory to recovery.
0x7F2A0A9D unchanged. No interruption to active sessions; legacy addresses 410 Gone after 96 hours per policy.
/login. Anti-DDoS challenge ("Checking your browser") elevated for 26 minutes. Browsers passing the challenge experienced a single-page extra hop, no credential or session issues.
Three independent v3 hidden services, each on its own guard pool. The probe rotates Tor circuits per request to measure user-realistic latency.
Authentication endpoint backed by per-session ephemeral keys. Health = the same probe completing a full handshake against a synthetic account.
2-of-3 escrow contract orchestration: order lock, dispute branch, payout. Health = signer round-trip well under 200 ms.
Shop management, listings, order queue. Status reflects success rate of synthetic vendor read/write cycles, not raw latency.
Three-way dispute panel rota. Health = mean ticket pickup time below the published 6-hour SLA.
End-to-end encrypted vendor ↔ buyer thread. Health = synthetic message round-trip under 1 s.
Status changes are mirrored to public RSS at /status.rss, Atom at /status.atom, and a JSON snapshot at /status.json. PGP-signed advisories accompany every state change. The feed endpoints are anonymous — no clearnet email or identifier is collected.
No. As of 2026-05-05 03:13 UTC all main services are operational. Mirror C is reporting degraded latency, which is normal during Tor guard rotation. Use Mirror A or Mirror B.
The probe runs every 60 seconds against fresh Tor circuits. Numbers above represent the most recent completed cycle.
Mirror C lives on slower guard nodes intended as fallback. Latency above 250 ms reflects circuit congestion, not a problem with the market itself.
From this page. The mirror addresses above are the live, signed v3 onions in 2026. Each is verified against PGP fingerprint 0x7F2A0A9D on every probe cycle.