Security Transforms
Track SSH fingerprints to identify shared server infrastructure across dark web sites. These transforms reveal hosting relationships and infrastructure reuse.
Overview
SSH (Secure Shell) fingerprints are unique cryptographic identifiers for SSH servers. When multiple onion sites share the same SSH fingerprint, they are:
- Hosted on the same physical or virtual server
- Using the same SSH keys (indicating same administrator)
- Part of shared infrastructure
This is one of the strongest indicators of infrastructure relationships.
FetchSSHFingerprints
Transform Name: FetchSSHFingerprints
Description
Extracts all SSH fingerprints found on or associated with a specified onion site.
Input Entity
hades.v2.onion- An onion site address
Output Entities
hades.v2.sshfingerprint- SSH server fingerprints
Properties Returned
- Appearances - Number of times this SSH fingerprint appears in the database
- Hades Link - Direct link to view the onion site in Project Hades web interface
How SSH Fingerprints Are Collected
SSH fingerprints can be discovered through:
- Direct SSH connection attempts to the server
- Banner grabbing and service enumeration
- SSL/TLS certificate analysis
- Server response headers
- Embedded fingerprints in page source
Use Cases
- Identify the underlying server infrastructure for an onion site
- Prepare for finding co-hosted sites
- Document server fingerprints for infrastructure attribution
- Track server migrations or infrastructure changes
Investigation Tips
- Appearance count >1 means multiple sites share this SSH server
- SSH fingerprints are difficult to fake or spoof
- Sites on the same server may not be operated by the same people (shared hosting exists)
- Cross-reference with other intelligence before concluding relationship
SearchBySSHFingerprint
Transform Name: SearchBySSHFingerprint
Description
Finds all onion sites that share a specific SSH fingerprint, indicating they are hosted on the same server or use the same SSH keys.
Input Entity
hades.v2.sshfingerprint- An SSH server fingerprint
Output Entities
hades.v2.onion- Onion site addresses
Properties Returned
- Hades Link - Direct link to view each onion site in Project Hades web interface
What Shared SSH Fingerprints Mean
Strong Indicators (High Confidence):
- Identical SSH keys - Sites definitely share server infrastructure
- 2-3 sites - Likely operated by same person/team
- Small marketplaces - Often share hosting to reduce costs
Moderate Indicators (Medium Confidence):
- Many sites (10+) - Could be shared hosting provider serving multiple customers
- Mix of unrelated content - Likely shared hosting, not same operator
Requires Investigation:
- Always cross-reference SSH fingerprint matches with other intelligence
- Check for shared payment addresses, contacts, or content
- Consider timing - did sites appear on the server at the same time?
Use Cases
- Find all sites hosted on the same server
- Identify server infrastructure shared by multiple marketplaces
- Discover related operations through hosting relationships
- Map dark web hosting providers and their customers
- Track server migrations when SSH fingerprints change
Investigation Workflow Examples
Co-Hosting Discovery
-
Extract SSH fingerprint from target site
- Input:
targetmarket123abc.onion - Run:
FetchSSHFingerprints - Result: SSH fingerprint(s) for the server
- Input:
-
Find co-hosted sites
- Input: SSH fingerprint from step 1
- Run:
SearchBySSHFingerprint - Result: All onion sites on the same server
-
Analyze co-hosting patterns
- 2-3 related sites - Likely same operator’s portfolio
- Many unrelated sites - Probably commercial hosting provider
- Mix of marketplaces - Could be marketplace-specific hosting service
-
Build infrastructure attribution
- For small groups of co-hosted sites:
- Run
FetchBitcoinAddresseson each site - Run
FetchEmailAddressesandFetchTelegramLinks - Look for shared contacts or payment addresses
- Run
- If shared contacts/wallets + shared SSH = very strong attribution
- For small groups of co-hosted sites:
Hosting Provider Mapping
-
Identify a dark web hosting provider
- Find known bulletproof hosting or dark web infrastructure services
- Run:
FetchSSHFingerprints - Result: SSH fingerprints for their servers
-
Map the provider’s customers
- Input: Each SSH fingerprint
- Run:
SearchBySSHFingerprint - Result: All sites hosted by this provider
-
Analyze the customer base
- What types of sites use this provider?
- Are high-risk sites concentrated with certain providers?
- Track provider reliability and longevity
-
Monitor provider changes
- Regularly re-run transforms on known hosted sites
- Detect when sites migrate to different servers/providers
- Identify provider takedowns or shutdowns
Infrastructure Migration Tracking
-
Baseline current SSH fingerprints
- Input: Sites under monitoring
- Run:
FetchSSHFingerprints - Document: Current SSH fingerprint and timestamp
-
Periodic re-fingerprinting
- Regularly run
FetchSSHFingerprintson monitored sites - Compare new fingerprints to baseline
- Regularly run
-
Detect migrations
- Different SSH fingerprint = Server change
- Site moved to new hosting provider
- Server upgrade or infrastructure change
- Response to compromise or law enforcement action
- Same SSH fingerprint = Still on same server
- Stable hosting arrangement
- No infrastructure changes
- Different SSH fingerprint = Server change
-
Investigate migration patterns
- When sites migrate:
- Run
SearchBySSHFingerprinton the NEW fingerprint - See if site moved to a server with other known sites
- Track migration pathways between hosting providers
- Identify preferred backup hosting providers
- Run
- When sites migrate:
Combining SSH with Other Infrastructure Intelligence
SSH fingerprints are most powerful when combined with other transforms:
-
SSH + SHV Analysis
- Run:
FetchSSHFingerprintsandFetchSHVon target site - Sites with matching SSH + matching SHV = very strong relationship
- Sites with matching SSH but different SHV = likely unrelated (shared hosting)
- Run:
-
SSH + JavaScript Analysis
- Run:
FetchSSHFingerprintsandFetchJavascriptFiles - Co-hosted sites with identical JavaScript = definitely related
- Co-hosted sites with different JavaScript = possibly unrelated
- Run:
-
SSH + Payment/Contact Analysis
- Run:
FetchSSHFingerprints,FetchBitcoinAddresses,FetchEmailAddresses - Sites with shared SSH + shared wallets/contacts = confirmed same operator
- Sites with shared SSH but different contacts = probably just shared hosting
- Run:
Attribution Confidence Levels
Very High Confidence (3+ matches):
- Shared SSH fingerprint
- Shared cryptocurrency wallets
- Shared email/Telegram contacts
- → Definitely same operator
High Confidence (2 matches):
- Shared SSH fingerprint
- Shared SHV (JavaScript infrastructure)
- → Very likely same operator or closely related
Medium Confidence (1-2 matches):
- Shared SSH fingerprint
- Similar content or category
- → Possibly related, requires more investigation
Low Confidence (1 match only):
- Shared SSH fingerprint alone
- → Could be coincidental shared hosting
- → Requires additional evidence
Server Infrastructure Ecosystem Analysis
-
Collect SSH fingerprints from many sites
- Run
FetchSSHFingerprintson a large sample of onion sites - Build a database of server fingerprints
- Run
-
Cluster analysis
- Group sites by shared SSH fingerprints
- Identify major hosting clusters
- Map the dark web hosting ecosystem
-
Track ecosystem evolution
- Monitor which servers grow (gaining new sites)
- Identify servers that disappear (hosting provider shutdowns)
- Track migration patterns when servers go offline
-
Risk assessment
- Identify high-risk servers hosting many illegal marketplaces
- Prioritize investigation of sites on high-risk infrastructure
- Predict which sites may go offline together if server is seized