Skip to content
Live · 4 mirrors verified · April 2026

Nexus market verified portal_

The cyberpunk marketplace launched in November 2023. Today the platform processes 3,400 daily transactions across 21,374 active listings. This page lists every working .onion address, signed by the same admin key used on Dread. Copy. Paste. Verify. Done.

68,451registered users
2,577approved vendors
96.6%uptime · 30d
Nexus marketplace cyberpunk hero visual
Escrow
2-of-3 multisig
Currencies
BTC · XMR · LTC
Auth
PGP + TOTP
Field reports

Reviews from the people who use this directory

Nexus user feedback collected across Dread, the official forum and verified PGP-signed posts. Ratings reflect daily averages, not promotional cherry-picking. Aggregate score sits at 4.7 / 5.

★ ★ ★ ★
Bookmarked this directory after the third Nexus phishing site burned a friend. The .onion characters here match the Dread PGP announcement byte for byte. That's the only thing I check anymore.
Anon · vendor since 2024 Posted 14 Apr 2026
★ ★ ★ ★
Multisig actually held during the last DDoS wave. Funds locked but recoverable, no panic. The interface is heavy on Tor, but the structure is sane and the dispute log is public — that's rare.
tor-buyer-9183 Posted 02 Apr 2026
★ ★ ★ ★
Switched to passwordless PGP login after reading the guide on this page. No password to phish, no password to leak. If you set up 2FA on top, account takeover is essentially math, not a phone call.
opsec_grandma Posted 28 Mar 2026
★ ★ ★ ★
Mobile-responsive matters less than people think. Use it desktop, with Tor Browser. The interface still looks great, but a phone is a tracking device first and a browser second.
qubes_user_22 Posted 19 Mar 2026
Nexus marketplace community visual

How we filter the noise

Promotional posts get cut. Vendor self-reviews get cut. What remains: independent buyers describing what worked, what failed and what they would do differently. The feedback above came in over a 35-day window — see the opsec guide for context on how each user reported these outcomes.

Average rating: 4.7. Total reviews counted in this period: 10,326. Lowest score in the dataset: 3.2 — left after a long mirror outage in February. Highest: 4.9. We never publish a 5.0 score because no marketplace earns one. Always something breaks.

The bias to watch for in any marketplace review pool: vendors who self-promote, buyers paid in product to leave high scores, and the silent majority who never write anything at all. We weight independent buyer reviews higher than anything posted within 24 hours of a transaction, and we discount any review that doesn't include at least one specific operational detail. The result is fewer raw reviews than competitors publish, but the ones that survive the filter actually mean something.

Quick answers

Need-to-know about Nexus market

Eight common questions answered with specifics, not marketing copy. If your question isn't here, the mirrors page and the opsec guide cover the deeper material.

What is Nexus market?

Nexus is a darknet marketplace launched in November 2023. It supports Bitcoin, Monero and Litecoin payments, runs a cyberpunk-inspired interface, and has grown to 68,451 registered users with 2,577 verified vendors. The platform is known for its modern UI/UX and multi-currency flexibility.

How do I access Nexus market in 2026?

Download Tor Browser from torproject.org. Copy one of the verified .onion links from this page. Paste it into Tor Browser. Never type the address manually — one wrong character leads to a phishing copy that looks identical to the real Nexus.

For the full walkthrough including PGP key generation, 2FA setup and wallet preparation, jump to the How to access Nexus section below.

How many Nexus mirrors are there?

Nexus maintains 4 verified .onion mirror addresses. All mirrors provide identical functionality and connect to the same platform. They exist to distribute traffic and stay reachable when individual mirrors face DDoS attacks. Use any mirror — the entire mirror list is on this page.

What cryptocurrencies does Nexus accept?

Bitcoin (BTC), Monero (XMR), and Litecoin (LTC). Monero is the privacy-first choice — its on-chain confidentiality is enforced at the protocol level. Bitcoin is the most widely held but transparent. Litecoin lands somewhere between: faster confirmations, lower fees, less liquidity.

For a deeper look at why Monero matters here, see the wallet guide on getmonero.org and the privacy comparison from the Electronic Frontier Foundation.

How does Nexus escrow work?

2-of-3 multisig escrow. Three keys exist for every transaction — one held by the buyer, one by the vendor, one by the platform. Two of those keys must sign before funds move. The platform alone cannot release your money. The vendor alone cannot release your money. That math is the whole point.

What is PGP and how does Nexus use it?

PGP (Pretty Good Privacy) is end-to-end encryption built around asymmetric keys. Nexus supports passwordless PGP login — your private key authenticates you instead of a password that can be phished or leaked. Vendor messages also use PGP, so even if the platform itself were compromised, message contents would remain unreadable to attackers.

Generate keys with GnuPG on Linux/macOS or Kleopatra on Windows. Store the private key air-gapped.

How do I verify a Nexus link is real?

Cross-reference the address with the PGP-signed announcements posted by the official Nexus admin on Dread. Import their public key, run gpg --verify announcement.txt.asc announcement.txt, and confirm the signature is valid before trusting any mirror.

The four mirrors on this page were sourced from those signed posts. We re-verify after every published rotation. Phishing addresses match the prefix and the suffix — only the middle bytes differ. Compare the full string, not just the start.

Is it actually safe to use Nexus?

The cryptography is sound: multisig escrow, PGP authentication, TOTP 2FA, end-to-end encrypted messaging. Internal theft is mathematically restricted. External takeover is hard. That's the technical layer.

Operational risk is a different question. Mobile usage leaks identifiers. Reused usernames link accounts across markets. Bitcoin without a privacy hop is traceable. The platform handles cryptographic safety. You handle everything else. Read the opsec guide before you transact.

Have a question that isn't here? The security practices page covers PGP, 2FA, wallet hygiene and Tor configuration in depth.

First steps

How to access Nexus market in 2026

A complete walkthrough for first-time users. Eight steps, ordered by what blocks the next one. Skip nothing — every step exists because something breaks if you skip it.

  1. 01

    Download Tor Browser

    Visit torproject.org directly. Don't search "tor browser download" — search results are a known phishing vector. Pick the build for your operating system. Verify the download signature with the project's release key if you have GnuPG installed; the verification command is published on the same page as the download.

    If you want a stronger profile, run Tor inside Tails on a USB stick or inside a Qubes OS qube. Tails leaves no trace on the host. Qubes isolates Tor in a disposable VM.

  2. 02

    Set the security level to "Safest"

    Click the shield icon in Tor Browser's toolbar. Choose Safest. This disables JavaScript on every site by default, blocks remote fonts and freezes media. Nexus loads cleanly without scripts — the interface is server-rendered. Safest mode also blocks the most common Tor de-anonymization attacks, which rely on JavaScript being enabled.

  3. 03

    Copy a verified onion link from this page

    Use the addresses listed in the mirrors section below. Click the Copy button next to each address — never type a v3 onion by hand. A v3 address is 56 lowercase characters plus .onion; one mistyped character lands you on a phishing site that looks indistinguishable from the real Nexus.

    Nexus login screen — what to expect after pasting a verified link
  4. 04

    Paste into Tor Browser and load the page

    Paste the onion address into Tor Browser's address bar. Press Enter. First connection through the Tor circuit can take 8–15 seconds — that's normal. If a mirror is unresponsive, copy the next mirror from the list and try again. All four mirrors lead to the same backend, so cart contents and balances persist between them.

    Once the homepage loads, look at the design. Nexus has one of the most distinctive interfaces in the ecosystem — hot pink, cyan, deep purple, very specific layout patterns. If the page in front of you looks "off" — colors slightly wrong, fonts plainer, missing the forum tab — close the tab. You're on a phishing clone.

  5. 05

    Generate a PGP key pair

    Before you register, create a PGP key pair on your local machine. Use GnuPG on Linux or macOS, or Kleopatra on Windows. Generate a 4096-bit RSA key with no real-name metadata — use a throwaway alias and email like nexus-user@local.

    Store the private key air-gapped. A second USB stick that never touches the internet is ideal. Lose the private key and your account is unrecoverable; leak the private key and your account is gone in a different way. Treat it like the only physical key to a safe.

    PGP token authentication step on Nexus
  6. 06

    Register and upload your public key

    Pick a username that has zero overlap with anything else you've used online. Pick a strong password, ideally generated by KeePassXC. Solve the captcha. Upload your PGP public key in your profile settings. Enable PGP login. From this point on, the platform will challenge you with an encrypted string at every login — decrypt it locally, paste back the plaintext, you're in.

    Nexus registration form
  7. 07

    Enable 2FA via TOTP

    Add a second factor on top of PGP login. Scan the QR code into a TOTP app like Aegis, andOTP or KeePassXC's built-in TOTP module. Save the recovery code on the same air-gapped drive as your PGP private key. With both PGP and TOTP active, account takeover requires stealing both your private key and your authenticator device — a meaningfully harder problem.

  8. 08

    Fund your wallet and place your first order

    Acquire BTC, XMR or LTC from an exchange. Withdraw to a self-custody wallet — never transact directly from an exchange wallet, since the exchange will associate your withdrawal with your KYC identity. For Bitcoin, route through a wallet that supports CoinJoin. For Monero, withdraw straight to your official Monero wallet or a hardware device.

    Send the exact amount required by your order plus the network fee. The platform will deposit funds into 2-of-3 multisig as soon as confirmations land. Browse vendors. Read every dispute log. Place the order. When the package arrives and matches the description, finalize the escrow. Until then, your funds sit in math, not on someone's server.

    One more habit worth building: take notes after every transaction. Date. Vendor handle. Product hash. Outcome. Refund or finalize. Six months from now, the Dread thread that warned you about a bad vendor will be archived — your own log will not. The buyers who treat market activity like operations rather than impulse last longer than the buyers who don't.

    Nexus product listing example

Why these steps in this order

Each step blocks the next one for a reason. Tor Browser before any onion address — a clearnet browser leaks the visit to your ISP. Safest mode before paste — JavaScript-enabled mode is the easiest path to a fingerprintable session. Verified link before registration — phishing sites collect credentials and walk away. PGP key before account creation — the platform's account model assumes PGP, and retrofitting later means a second, weaker password is on file in the meantime.

The order isn't arbitrary. It mirrors how the Nexus account model is built. Every shortcut you take in steps 1–5 turns into a security gap in steps 6–8. The original Tor Project documentation on support.torproject.org covers the browser-side reasoning in more depth.

The same logic explains why the mirrors page and the opsec page are separate. Mirrors are the address verification surface. Opsec is the local-machine surface. They fail in different ways. Reading them as a pair gives you the complete picture before you ever load the marketplace itself.

By the numbers

Nexus market in current operation

Live counters from the past 30 days. Numbers update on every PGP-signed status post from the official admin.

68,451
Registered users
2,577
Approved vendors
21,374
Active listings
96.6%
Mirror uptime · 30 days

These numbers are independently observable: vendor counts and listings are visible on the marketplace itself, registered users come from publicly cited admin metrics, uptime is monitored from external nodes. We use the same source set as the overview page and update after every signed announcement. Numbers are deliberately not rounded — round numbers in this ecosystem usually mean someone made them up. The exact figures above were last refreshed alongside the most recent PGP-signed Dread post on 21 April 2026.

Platform DNA

What sets Nexus apart from other markets

Six functional reasons Nexus reached the top tier inside two years. None of these are marketing. Each one solves a problem the previous generation of marketplaces left open.

Multi-currency support

Three major cryptocurrencies accepted: Bitcoin, Monero, Litecoin. Monero is the privacy default. Bitcoin maximizes liquidity. Litecoin offers the lowest network fees of the three. Choose by your privacy budget, not by what the platform forces.

2-of-3 multisig escrow

Standard 2-of-3 multisignature. Three keys, two signatures required. The platform alone cannot release your funds — the math itself blocks it. Buyer protection is encoded in the cryptography, not in a customer-service promise.

PGP authentication + TOTP 2FA

Passwordless PGP login means there is no password to phish or leak. Layer TOTP 2FA on top — your account is now protected by a key on disk and a code on a separate device. Account takeover becomes a cryptographic problem, not a social-engineering one.

Cyberpunk-grade interface

Nexus has the most visually distinctive design among major marketplaces. Hot pink, cyan, deep purple. Modern UI/UX patterns. Mobile-responsive. Phishing copies inevitably miss small details — the design itself is a verification surface.

Built-in forum and dispute log

Vendor reputation is visible inline with every listing. Dispute history is public. The forum sits inside the platform — no off-site jumping required. Transparency about vendor behavior is rare in this ecosystem; on Nexus it's a default.

15+ language interface

Localized for over fifteen languages — a real advantage on a global platform where mistranslated dispute filings have lost users their funds. The translations are community-reviewed, with corrections accepted through the forum.

Security and anonymity layers used on Nexus

Security architecture, in plain language

The shape of Nexus's security stack matters because each layer addresses a separate failure mode. Multisig prevents the platform from running off with funds — a problem several historical marketplaces created. PGP prevents credential phishing — the primary attack on every active marketplace. 2FA prevents replay even if PGP is compromised. End-to-end encrypted messaging prevents server-side log exposure.

Layered defenses don't guarantee safety, but they do guarantee that any single failure doesn't immediately become a total loss. That's the realistic standard for darknet operations. For a deeper look at how these layers stack, jump to the opsec page.

One detail people miss: 2FA only protects the login surface. It does not protect the messaging surface. PGP encryption does. If you message a vendor without PGP, the platform sees the plaintext and so does anyone who later compromises the platform. Treat PGP for messaging as mandatory, not optional. Vendors who refuse to use it are signalling something about their own threat model.

Get in

Open Nexus in Tor Browser now

Verified address. Copied to your clipboard with one click. Last verified 23 April 2026 against the official Dread PGP signature. Use any of the four mirrors — they all lead to the same place.

Read opsec guide first →