Repo: https://github.com/isPique/Tor-IP-Changer
๐ง Step 1: Start Tor Service
First, ensure Tor is installed and running as a background service:
sudo apt install tor # Install Tor
sudo systemctl start tor # Start Tor service
sudo systemctl status tor # Verify it's running
Tor runs on SOCKS port 9050
by default.
Use sudo systemctl restart tor
if you encounter connectivity issues.
โก๏ธ Step 2: Configure Tor IP Changer
The Python script automates IP rotation by signaling Tor's control port.
- Clone the repository:
git clone https://github.com/isPique/Tor-IP-Changer.git
- Navigate to the project directory:
cd Tor-IP-Changer
- Install required libraries:
pip install -r requirements.txt
- Run the script:
sudo python3 IP-Changer.py
The script uses the Tor control port and sends the SIGNAL NEWNYM
command to obtain a new circuit (new exit IP). Ensure the control port is enabled/configured in your Tor config if needed.
๐ Step 3: Route Traffic with ProxyChains
ProxyChains redirects any application's traffic through Tor.
Edit /etc/proxychains4.conf
and ensure these lines are set:
dynamic_chain
proxy_dns
socks5 127.0.0.1 9050
โก Usage Examples:
proxychains nmap -sT target.com
proxychains firefox example.com
ProxyChains works with most CLI and GUI applications and prevents DNS leaks by routing DNS queries through Tor.
๐ก Pro Tips
- Check your IP:
proxychains curl
https://icanhazip.com
- Avoid rapid rotation: Tor may throttle
NEWNYM
requests faster than every ~10 seconds. - Combine with VPNs or additional proxies for advanced chaining (see
proxychains.conf
). - If ControlPort is disabled, enable and secure it in
/etc/tor/torrc
before using automation scripts.
โ ๏ธ Important Notes
- Use only for authorized testing and legal privacy purposes.
- Tor exit nodes may be blocked by some services.
- No tool guarantees perfect anonymity.
Like/Follow if this helped! ๐ Follow @cybersecplayground for more tool guides.
#Tor #Privacy #PenTesting #ProxyChains #CyberSecurity