Anonymity networks

I2P

I2P is the long-running peer to Tor for network-layer anonymity.

Website
geti2p.net
KYC
no KYC — Network-layer anonymity protocol; no accounts, no central authority. Identity is a self-generated destination address.
Status
active
Fiat on-ramp
no
Payment
donation
Jurisdiction
independent open source
Founded
2003
Open source
yes
Custodial
no
Last verified
Sources
2

Overview

What I2P is#

A network-layer anonymity protocol using garlic routing. The default use case is reaching in-network destinations (eepsites); accessing clearnet through I2P requires an outproxy.

Threat-model fit#

When in-network hidden services are the primary use case, or as a second anonymity network alongside Tor.

Strengths

Caveats

Verdict

I2P is the long-running peer to Tor for network-layer anonymity. Different design (garlic routing, in-network destinations as the primary use case) and different threat model. Best fit when in-network anonymous services are the use case, or as a Tor-complement for users who specifically want both networks in their threat model.

FAQ

Does I2P require KYC?
As of May 12, 2026, I2P does not require KYC for normal use. Network-layer anonymity protocol; no accounts, no central authority. Identity is a self-generated destination address.
What payment methods does I2P accept?
I2P accepts: donation.
Where is I2P based?
Operating jurisdiction listed as independent open source. This is best-known information; corporate structure can be opaque.

Sources

  1. I2P documentation · accessed
  2. i2pd source · accessed

Mentioned in

Alternatives to I2P

Entry last verified . Notice an error? Send it via the contact form.