I just extracted nodes from connected peers.
getpeerinfo in console. I have 27 connections there.
OLD SIGNATUM NODES:
addnode=novaexchange.com:33333
addnode=coinsmarkets.com:33333
addnode=node.611.to:33333
addnode=136.243.50.159:33333
addnode=147.135.220.159:33333
addnode=188.32.101.201:33333
addnode=78.98.54.82:33333
addnode=78.61.177.138:33333
addnode=80.6.164.72:33333
addnode=37.112.218.225:33333
addnode=61.227.202.17:33333
addnode=129.242.71.138:33333
addnode=98.225.41.11:33333
addnode=31.193.131.89:33333
addnode=210.195.13.207:33333
addnode=169.0.207.241:33333
addnode=176.14.150.167:33333
addnode=93.126.126.51:33333
addnode=188.187.144.250:33333
addnode=45.77.51.253:33333
addnode=188.141.60.56:33333
addnode=47.184.192.237:33333
addnode=107.138.25.42:33333
addnode=2.60.209.13:33333
addnode=211.59.35.13:33333
addnode=153.232.91.191:33333
addnode=83.143.150.250:33333
addnode=136.243.50.159:33333
addnode=129.242.71.138:33333
addnode=147.135.220.159:33333
addnode=93.183.243.171:55389
addnode=81.233.198.60:33333
addnode=176.14.150.167:33333
addnode=46.182.28.20:33333
addnode=169.0.207.241:33333
addnode=5.9.51.209:33333
addnode=89.35.33.114:33333
addnode=93.126.126.51:33333
Anyone know how to do onion TOR node in Windows
and how to check port for .onion domain using telnet, for example?
I know about tor2web.org and domains .onion.to
but can I using this for my signatum onion-node?
Also I see signatum-tor here,
https://github.com/barefootmouse/signatum-tor but this is for linux...
I did signatum-onion-node by using
HiddenServiceDir /Library/Tor/var/lib/tor/signatum_node/
HiddenServicePort 33333 127.0.0.1:33333
but I cann't connect to this...
This is it: addnode=42k5tcpg7bhjjaze.onion:33333
Also I have HFS server there: 42k5tcpg7bhjjaze.onion and this working in Tor Browser.
Anyone can check this and syncronize? Is there need any parameters, like this:
-listenonion Automatically create Tor hidden service (default: 1)
-onion=
Use separate SOCKS5 proxy to reach peers via Tor hidden services (default: -proxy)
-proxyrandomize Randomize credentials for every proxy connection. This enables Tor stream isolation (default: 1)
-torcontrol=: Tor control port to use if onion listening enabled (default: 127.0.0.1:9051)
-torpassword= Tor control port password (default: empty)
https://en.bitcoin.it/wiki/Running_Bitcoin
or this:
bitcoin-qt -proxy=127.0.0.1:9050 -onlynet=tor
bitcoin-qt -proxy=127.0.0.1:9050 -connect=42k5tcpg7bhjjaze.onion
??