Skip to content

Nexus market onion links
& verified mirrors 2026

Four working v3 .onion addresses, each cross-referenced against PGP-signed admin announcements on Dread. Copy any of them — they all reach the same platform. All four verified on 23 April 2026. If a mirror is unreachable, switch to another; session state is shared across all four.

All 4 mirrors online · Last checked 23 Apr 2026 · Next check in 24 hrs
Verified addresses

All 4 Nexus .onion addresses

Every address below is a 56-character v3 .onion. They are not shortcuts or aliases — each is a fully independent hidden service routing to the same Nexus backend. Choose whichever loads fastest over your current Tor circuit.

Primary Online
Loading...
Verified 23 Apr 2026 · PGP-signed

30-day uptime: 96.6% · Latency: avg 340ms over Tor

Mirror 02 Online
Loading...
Verified 23 Apr 2026 · PGP-signed

30-day uptime: 94.1% · Recommended backup

Mirror 03 Online
Loading...
Verified 23 Apr 2026 · PGP-signed

30-day uptime: 95.3% · Low latency

Mirror 04 Online
Loading...
Verified 23 Apr 2026 · PGP-signed

30-day uptime: 93.8% · DDoS resilient

Nexus has the most visually distinctive interface in the darknet ecosystem. Phishing operators copy it character for character. The only reliable way to tell the real Nexus from a clone is to verify the full 56-character .onion address against a PGP-signed announcement. Never rely on visual confirmation alone.

Performance overview

Mirror status · April 2026

Status data is updated daily. Uptime percentages cover the rolling 30-day window. Last-checked timestamps reflect our most recent automated verification run against Dread PGP-signed announcements.

Mirror address (truncated) Label Status 30d uptime Last verified PGP signed
nexusaldu7wwewcpcn4…wwyaqd.onion Primary Online
96.6%
23 Apr 2026 ✓ Yes
nexusbbqsh42lvde33…svtqd.onion Mirror 02 Online
94.1%
23 Apr 2026 ✓ Yes
nexuscr3cittluc2rcu…vqd.onion Mirror 03 Online
95.3%
23 Apr 2026 ✓ Yes
nexusd6kh4at2iof2tg…lcid.onion Mirror 04 Online
93.8%
23 Apr 2026 ✓ Yes

Uptime measurements are taken from Tor Browser sessions on three separate circuits and averaged. A mirror must respond with a valid HTML document — not a timeout or a non-200 status code — to count as available. These numbers represent user-experienced availability, not server-level ping tests.


Link verification

How to verify a Nexus .onion address with PGP

This is a 5-step process. It takes about four minutes the first time. After the first verification, re-checking takes under 60 seconds. The core principle: you are confirming that the .onion address was signed by the same private key the Nexus administrators have used consistently on Dread since November 2023.

Nexus login screen — what a real Nexus mirror login page looks like

The real Nexus login screen. Phishing copies replicate this layout exactly. Visual matching is not verification — address matching is.

Install GnuPG

Download GnuPG for your operating system. On Tails and Whonix it is pre-installed. On Linux: sudo apt install gnupg. On macOS: install via Homebrew with brew install gnupg.

Import the Nexus admin key from Dread

Navigate to the official Nexus subdread on Dread. Find the pinned "Official Nexus PGP Key" thread. Copy the full key block including the BEGIN PGP PUBLIC KEY BLOCK header. Import it with: gpg --import nexus-admin.asc

Locate the signed mirror announcement

Admin mirror update posts on Dread are always PGP-signed inline. Copy the full message including the BEGIN PGP SIGNED MESSAGE block. Save it as nexus-mirrors.txt locally.

Run the verification command

Execute: gpg --verify nexus-mirrors.txt. A valid result shows Good signature from "Nexus Admin" along with the key fingerprint. If you see BAD signature, stop — do not use any address from that message.

Compare addresses character by character

After confirming the signature is valid, compare each .onion address in the announcement against the ones on this page. All 56 characters must match exactly. A single character difference indicates a phishing variant. Use a monospace font and compare in segments of 8 characters.

Further reading on PGP and verification


Threat awareness

Distinguishing real Nexus from phishing copies

Nexus uses the most visually distinctive design in the darknet ecosystem — a cyberpunk palette with hot pink, cyan, and deep purple. Phishing operators copy this design in its entirety, down to the font choices. Visual trust is not reliable. Address verification is the only reliable method.

Signs of a phishing site

  • Address differs by 1-2 characters from the verified list
  • Site asks for credentials without PGP login option
  • Page loads unusually fast (no Tor latency)
  • SSL/clearnet redirect on connection
  • No PGP-signed announcement on Dread with matching address
  • Login page design matches Nexus but URL does not
  • Requests personal info during registration
  • No 2FA option shown on account creation

Signs of the real Nexus

  • Address matches all 56 characters of a PGP-verified announcement
  • PGP login available on login screen
  • Typical Tor latency (2-8 seconds to load)
  • TOTP 2FA offered during account setup
  • Multisig escrow selection available on order page
  • Vendor bond mentioned in the register flow
  • Forum and dispute log accessible in-platform
  • 15+ language options in settings
"I spent 20 minutes comparing two Nexus addresses once — they differed by one character in position 31. The phishing site was so convincing I would have logged in without a second look." — anonymous user report via Dread, March 2026

If you encounter a suspected phishing .onion, do not enter any credentials. Close Tor Browser, clear Tor circuits, and return to this page for fresh verified addresses. Report suspected phishing addresses on Amnesty Tech or darknet-focused security communities.

Privacy and browser tools


FAQ

Common questions about Nexus mirrors and link verification

Questions from users navigating Nexus for the first time. For the access walkthrough, see the opsec guide. For background on the platform, see the origin page.

Still have questions? The opsec guide covers Tor Browser setup, PGP key generation, and TOTP 2FA in detail. The platform overview covers Nexus features, payment methods, and escrow mechanics.

Ready to access

Copy a verified Nexus mirror link

All four addresses on this page are PGP-verified against the official Nexus admin key. Last confirmed 23 April 2026. Open in Tor Browser only, security level set to Safest.

Read opsec guide first →