Paste any magnet link and get an instant privacy report — trackers, DHT exposure, embedded IPs, and your real risk level. 100% client-side, nothing is sent to our servers.
A magnet link is just a text string — but the metadata inside it directly controls how exposed you are when you open it.
Every magnet link contains a unique SHA-1 or SHA-256 info hash (xt=urn:btih:…) that identifies the exact torrent. This hash is public and can be looked up in any torrent index — it reveals what you're downloading to anyone monitoring your connection or the tracker.
When you open a magnet in your torrent client, it announces to every tracker in the tr= parameter. Each tracker logs your real IP address alongside the info hash. Public trackers in particular are routinely monitored by copyright enforcement firms.
If a magnet has no trackers, your client falls back to DHT (Distributed Hash Table) — a decentralised peer network. DHT lookups are visible to any node in the network, and your IP is broadcast to thousands of peers who have the same content. No trackers doesn't mean private.
With a SOCKS5 proxy or VPN active in your torrent client, every tracker announce and DHT lookup goes through the proxy IP instead of yours. Trackers still log an IP — but it's a datacenter IP with no connection to your identity. Use our proxy checker to verify yours is working.
Not all trackers are equal. This is how we classify them.
| Risk Level | What it means | Examples |
|---|---|---|
| HIGH | Tracker is known to be operated by or sell data to copyright enforcement agencies. Your IP and hash are logged and may result in DMCA notices or legal action. | Some UDP trackers on known enforcement domains; trackers operated by MediaLink, Agora, etc. |
| MEDIUM | Public tracker with no privacy guarantees. Logs your IP against the info hash. Monitored by third-party crawlers. No known direct enforcement activity but data is accessible. | opentrackr.org, tracker.openbittorrent.com, most public UDP trackers |
| LOW | Private tracker or tracker with a known privacy policy. Requires authentication — IP logs are protected and not shared with third parties. | Private tracker announce URLs (passkey-authenticated), i2p/onion trackers |
| INFO | No trackers present. Client will use DHT and Peer Exchange to find peers. Less centralised but still exposes your IP to the peer network. | Pure DHT magnets (no tr= parameters) |
TorSentinel Armor routes all tracker announces and DHT traffic through a managed SOCKS5 proxy. Trackers see a datacenter IP. Your real IP never leaves your machine. Verify your proxy is working →
x.pe parameter in a magnet link is an "exact peer" — a hardcoded IP:port pair that tells your client to connect directly to a specific peer without going through a tracker or DHT first. This is rare in standard magnets but worth flagging: if an x.pe IP is present, your client will attempt a direct connection to that IP immediately when the magnet is opened, which could be used to deanonymise you or log your connection before your proxy is established.
&tr= parameters you want to remove. Each tracker is its own &tr=… segment. Delete the entire segment including the &tr= prefix. Save the edited magnet and paste it back here to verify. Alternatively, use a SOCKS5 proxy so you don't need to manually edit every magnet you receive.