An API providing up-to-date lists of decentralized VPN (dVPN) node IP addresses.
Decentralized VPNs operate through distributed networks of nodes run by independent operators worldwide. Unlike traditional VPNs with known server ranges, dVPN exit nodes are constantly changing and difficult to track.
This API aggregates and maintains current lists of dVPN node addresses from multiple networks, making it easy for organizations to identify and manage traffic from these sources.
We actively participate in these networks by operating our own nodes, giving us instant access and accurate, first-hand information about the topology of each network.
Providing a service that lists IPs running decentralized VPN software is generally legal in most jurisdictions, including in Europe. dVPN node operators willingly participate, and their node IPs are publicly discoverable through the network's protocol or directory — similar to how public VPN endpoints, Tor nodes, and dVPN apps themselves publish node lists.
The key legal risk is how the list is obtained. We rely on publicly advertised nodes and network directories; we do not scan the internet for open ports or services.
In the EU, IP addresses can be personal data under GDPR, especially for residential IPs. We avoid linking IPs to other personal information, provide transparency about sources, and focus on legitimate-use cases like security, compliance, and fraud prevention.
Lists are updated every hour.
| Name | Website | List |
|---|---|---|
| NymVPN | nym.com | /nym_vpn (preview) |
| Sentinel | sentinel.co | /sentinel (preview) |
| GnosisVPN | gnosisvpn.com | /gnosis_vpn (preview) |
| Mysterium Network | mysteriumvpn.com | /mysterium (preview) |
| All | - | /all |
This service is built and maintained by a privacy infrastructure specialist with deep, hands-on experience in decentralized anonymity networks.
Engineered core protocol components for one of the first incentivized mixnets delivering metadata-level privacy. Implemented payment channels, sphinx packet routing mechanisms, and staking incentives that power node operator economics.
Developed advanced obfuscation techniques for TOR network traffic, enabling users to bypass deep packet inspection and censorship systems while maintaining anonymity and connection reliability.
Extensive background in the privacy space, collaborating with top VPN providers on infrastructure optimization, protocol development, and building scalable privacy-preserving network solutions.