TorSentinel TorSentinel
Guide Armor Gluetun + qBittorrent (Docker)

TorSentinel Armor — Gluetun + qBittorrent (Docker) Setup & Test

Run qBittorrent behind a Gluetun VPN container and configure qBittorrent’s SOCKS5 to use the TorSentinel Armor proxy for tracker announces. Add the proxy to Safelist, run the Test Torrent, and enable alerts.

Updated: 2025-10-26 Difficulty: Intermediate Read time: 7–9 min

1) About Armor vs Monitor

Armor (this guide)

  • Includes Monitor.
  • Adds TorSentinel SOCKS5 for announces.
  • Gluetun handles VPN egress; qBittorrent still sets SOCKS5 for Trackers.

Monitor

  • Watches announce IPs and alerts.
  • Safelist your VPN/seedbox egress or third-party proxy.

2) Docker Compose (Gluetun + qBittorrent)

qBittorrent shares the Gluetun network namespace. Expose Web UI and ports on Gluetun only.

services:
  gluetun:
    image: qmcgaw/gluetun
    container_name: gluetun
    cap_add: [NET_ADMIN]
    environment:
      - TZ=UTC
      # Choose ONE stack (WireGuard shown):
      - VPN_SERVICE_PROVIDER=custom
      - VPN_TYPE=wireguard
      - WIREGUARD_PRIVATE_KEY=<your_private_key>
	  - FIREWALL_VPN_INPUT_PORTS=<51413,8080>
      - WIREGUARD_ADDRESSES=<10.x.x.x/32>
      - SERVER_HOSTNAMES=<provider_servername>
      # Or OpenVPN: set OPENVPN_USER/OPENVPN_PASSWORD/OPENVPN_CONFIG
    volumes:
      - ./gluetun:/gluetun
    ports:
      - "8080:8080"          # qBittorrent Web UI (via gluetun)
      - "51413:51413"        # BitTorrent TCP
      - "51413:51413/udp"    # BitTorrent UDP
    restart: unless-stopped

  qbittorrent:
    image: lscr.io/linuxserver/qbittorrent:latest
    container_name: qbittorrent
    network_mode: "service:gluetun"
    depends_on: [gluetun]
    environment:
      - PUID=1000
      - PGID=1000
      - TZ=UTC
      - WEBUI_PORT=8080
    volumes:
      - ./qbittorrent/config:/config
      - ./qbittorrent/downloads:/downloads
    restart: unless-stopped

Tip: First boot might take a minute while Gluetun establishes the tunnel. Access Web UI at http://<host>:8080.

Gluetun + qBittorrent network layout
qBittorrent traffic exits via Gluetun VPN. Trackers can be proxied via Armor SOCKS5.

3) Find your SOCKS5 endpoint

Armor SOCKS5 domain and ports
Services → SOCKS5 Proxies.
Protocol: SOCKS5
Host:     proxy.torsentinel.com
Port:     1080 (or 1085, 1090, 1095)
Auth:     Your TorSentinel username & password

4) Configure qBittorrent SOCKS5

1
Open Web UI → Tools → Options → Connection.
2
Under Proxy Server, set Type to SOCKS5, Host to proxy.torsentinel.com, and a supported Port.
3
Enable Use proxy for peer connections (optional) and Use proxy for trackers (required). Check Use proxy for hostname lookups.
4
Enable Authentication and enter your TorSentinel credentials. Apply and restart the app if prompted.
qBittorrent proxy settings in Web UI
qBittorrent → Options → Connection → Proxy Server.

Using Gluetun + Armor together? Yes. The SOCKS5 session runs over your VPN tunnel; announces still originate from TorSentinel’s proxy. Safelist both if you sometimes disable SOCKS.

5) Add Armor proxy to Safelist

Safelist add domain
Safelist → Add Domain.
Type:  Domain
Value: proxy.torsentinel.com
Label: Armor proxy

If using a specific IP endpoint from your SOCKS5 page, you may safelist that IP or its /24 as well.

6) Start the Test Torrent

Open Services → Torrents → Test Torrent, add the magnet in qBittorrent, then wait ~1–3 minutes for an announce.

Test torrent monitoring
  1. Copy the magnet, add to qBittorrent.
  2. Confirm Monitoring state and recent Last Seen.

No content is downloaded. It only validates announce routing.

7) Alerts

Notifications settings
  • Email: add & confirm.
  • Telegram: connect bot → Start.

FAQ & Troubleshooting

Peers via SOCKS5 or only Trackers?

Trackers should be proxied. Peer proxying is optional; if connectivity drops, proxy trackers only.

Can I rely on VPN only?

Yes, but then announces will originate from the VPN egress. That’s the Monitor setup.

Rotating proxy/VPN IPs?

Safelist the proxy domain and/or a /24 covering your VPN egress ranges.