Nexus official mirror directory
Four active Nexus .onion addresses, all verified against PGP-signed admin announcements. Nexus runs four mirrors because DDoS attacks are standard against large markets. Four circuits mean four independent fallback options. Copy the addresses — do not type them. A single wrong character routes you to a phishing clone.
Loading...
Loading...
Loading...
Loading...
All four addresses reach the same Nexus backend. Accounts, balances, and orders are identical across mirrors. Open in Tor Browser only. Full setup: Step-by-Step guide.
Why Nexus runs four mirrors
Nexus operates at a scale — 20,388 active listings, 79,411 registered users — that makes it a consistent DDoS target. Four independent onion service circuits mean an attacker would need to sustain four simultaneous floods to take down all access points. Practically: one mirror going down doesn't affect the other three.
Each mirror runs on a separate Tor hidden service key. The addresses are cryptographically independent. The backend is shared — one database, one escrow system, one vendor layer. Switching mirrors mid-session preserves your account state completely.
Verification method
We use a three-step process before publishing any address. First, official announcement on the Nexus Dread sub from an account with verifiable history. Second, PGP signature verification against the Nexus admin public key. Third, direct Tor Browser connection confirming the address resolves to the expected Nexus interface without redirect. All four addresses passed all three checks as of April 22, 2026.
Phishing and URL substitution attacks
Nexus's size attracts sophisticated phishing. The standard attack is a single character changed in the 62-character .onion address — usually in the middle where visual scanning is unreliable. The fake site looks identical. Login harvests credentials; checkout shows the attacker's wallet instead of Nexus escrow.
Protection: after pasting a Nexus address from this page, verify the first 8 and last 8 characters in Tor Browser against what you copied. Takes 20 seconds. Eliminates URL-substitution phishing. Privacy Guides and the EFF document why this habit matters beyond Nexus specifically.
Recommended access stack
Minimum: Tor Browser at Safest level, Monero self-custody wallet. Better: Tails OS from USB. Strongest: Whonix inside Qubes OS. For VPN before Tor: Mullvad (cash payment, no registration). PGP key management: KeePassXC or VeraCrypt.
Nexus platform numbers — April 2026
| Mirror | Status | Avg. circuit time | Last verified |
|---|---|---|---|
| Mirror 1 | ● Online | 14 sec | April 22, 2026 |
| Mirror 2 | ● Online | 19 sec | April 22, 2026 |
| Mirror 3 | ● Online | 22 sec | April 22, 2026 |
| Mirror 4 | ● Online | 18 sec | April 22, 2026 |
Why four mirrors instead of one or two?
Nexus runs at a scale that makes it a consistent DDoS target. Four independent circuits distribute the attack surface. One mirror going down doesn't affect the other three — an attacker would need to sustain four simultaneous floods to block all access.
Are all four addresses from the official Nexus team?
Yes. All four are published via PGP-signed announcements from the same Nexus admin key on the Dread forum. The signatures are verifiable against the Nexus public key distributed on the forum. Unsigned mirror announcements from any source should be treated as suspect.
If all mirrors are down, where should I wait for updates?
Return to this page. We update within 24 hours of a verified announcement. The Nexus Dread sub (accessible through Tor Browser) is the official channel for signed announcements. Do not look for new mirror links on Telegram during downtime events — that's when phishing links circulate most heavily.
Can I use multiple mirrors simultaneously with multiple tabs?
Yes, but there's no benefit. The backend is shared. Opening mirror 2 in a second tab logs you into the same account as mirror 1. Use whichever mirror loads fastest in a given session and ignore the others that day.