Darknet market
What is a darknet market?
A darknet market (DNM) is a commercial website operating on a privacy-enhancing network (e.g. I2P, Freenet, and the Tor network) that facilitates peer-to-peer transactions involving goods and services. These markets run on public internet infrastructure, but are deliberately hidden from the public internet and designed to obscure the identities of both buyers and sellers. Unlike the clear web, these markets are not indexed by search engines and require specialized software to access.
One hallmark of darknet markets is their use of anonymizing technologies in combination with cryptocurrencies like Bitcoin or Monero, which enable pseudonymous payments. Darknet markets often mimic the look and feel of traditional e-commerce platforms, complete with product listings, reviews, ratings, and dispute resolution features. However, unlike legitimate marketplaces, darknet markets typically traffic in prohibited or restricted items.
While darknet markets can carry a wealth of prohibited or restricted items, they overwhelmingly specialize in and offer illicit drugs / narcotics (e.g. fentanyl), with the vast majority of listings on a darknet marketplaces advertising illicit drugs.
{{horizontal-line}}
What are some examples of anonymizing techniques used by darknet markets?
- Tor (the Onion Router): An encrypted network that routes internet traffic through a series of volunteer-run relays. Tor conceals IP addresses and locations, making it extremely difficult to trace users’ digital footprints.
- Tails: A portable operating system that can be run on most computers using a DVD, USB drive, or SD card. It is designed to route internet traffic through anonymizing networks and leave no trace on the host device, helping users preserve privacy and anonymity.
- Pretty Good Privacy (PGP): A widely used encryption program that enables secure communication through end-to-end encryption and digital signatures. In the context of darknet markets, PGP is a verifiable mechanism for signatures and verification, and helps link vendors reputations across multiple markets.
- Use of pseudonymous identities: Usernames, vendor handles, and forum aliases that don’t reveal real-world identity. Vendors build reputations through pseudonymous accounts with buyer ratings, while remaining unlinked to their legal identity — making it easy for them to create new profiles if a market is shut down or compromised.
- Cryptocurrency obfuscation: Techniques that make it more difficult to link crypto payments to specific users or market listings. Examples of obfuscation techniques include:
- Mixers / tumblers: Services that shuffle crypto from multiple sources to break transaction trails.
- Peeling chains or smurfing: Moving funds through a long series of small transfers across wallets.
- Privacy coins: Privacy-focused cryptocurrencies like Monero (XMR) or Zcash (ZEC) that mask transaction details by default.
- Decentralized hosting / mirror sites: Markets often replicate their infrastructure across multiple domains or use decentralized hosting (e.g. I2P or IPFS). If one domain is seized, users are redirected to mirror sites through trusted community channels.
- Two-factor or multisig authentication: Security measures that require multiple steps or cryptographic signatures to authorize actions. Two-factor or multisig authentication protects vendor and user accounts from takeover, even if some credentials are leaked.
- Obfuscated URLs and invite-only access: Use of non-indexed URLs, invitation codes, or referral-only memberships. For example, some niche markets require users to provide “vouches” or reputation from existing platforms to join.
{{horizontal-line}}
What is the role of darknet markets in the illicit crypto economy?
Darknet markets have become central to the global illicit economy, enabling transactions involving narcotics and other illicit drugs (the vast majority of listings), stolen data, hacking tools, and fraudulent documents. Although some darknet market activity may involve gray-market or legal goods, the overwhelming majority is tied to criminal enterprises, posing significant challenges for financial integrity, cybercrime prevention, and public safety.
Enforcement of darknet markets is generally inconsistent, and new markets regularly emerge following high-profile takedowns — making this ecosystem highly dynamic and persistent.
{{horizontal-line}}
Is crypto the preferred currency on darknet markets?
Yes — cryptocurrency is the default and preferred payment method on darknet markets. These platforms are purpose-built around digital assets due to their ability to support pseudonymous transactions across jurisdictions without relying on regulated financial institutions.
While some users may attempt in-person trades or use peer-to-peer fiat services off-platform, crypto is the only practical currency for darknet markets at scale. These platforms are designed around the attributes of blockchain-based payments — without which they could not exist or operate.
Why cryptocurrency is preferred
- Pseudonymity: Cryptocurrencies like Monero and bitcoin enable transactions without requiring names, bank accounts, or government-issued IDs.
- Resistance to censorship: Unlike fiat-based payments, crypto can’t be easily frozen or blocked by governments or payment processors — although initiatives like Beacon Network and the T3 Financial Crime Unit are changing that.
- Decentralization and global accessibility: Cryptocurrencies operate without central control and are accessible across jurisdictions. This makes them ideal for marketplaces that cater to international user bases and vendors, and means there’s no single, centralized authority to shut down payments or enforce compliance in real time.
Preferred cryptocurrencies on darknet markets
- Bitcoin (BTC) remains the most accepted cryptocurrency due to its market dominance and wide support. However, its public ledger makes it traceable, especially when users don’t follow privacy best practices.
- Privacy coins like Monero (XMR) are increasingly favored on darknet markets because they obscure sender, receiver, and transaction amounts by default.
- Litecoin (LTC) is accepted on some darknet markets due to its faster transaction times and lower fees compared to Bitcoin. However, like Bitcoin, its public ledger makes it traceable, and its adoption remains niche relative to BTC and Monero.
- Stablecoins are beginning to emerge in some marketplaces, though adoption remains limited compared to BTC and XMR.
- Zcash (ZEC) and other privacy-enhancing tokens have seen limited adoption due to usability barriers and lower liquidity.
{{horizontal-line}}
What are some examples of prominent darknet markets and enforcement actions taken against them?
1. Silk Road
- Launched: 2011
- Takedown: October 2013 (by the FBI)
- Details: The first and most well-known darknet market. It pioneered the use of Bitcoin for illicit online commerce, primarily for drugs.
- Outcome: Founder Ross Ulbricht was arrested and sentenced to life in prison without parole. He was later pardoned by US President Donald Trump in January 2025.
2. AlphaBay
- Launched: 2014
- Takedown: July 2017 (by FBI, DEA, Dutch National Police, and Europol)
- Details: At its peak, AlphaBay hosted over 400,000 listings and facilitated more transactions than all previous markets combined.
- Outcome: Administrator Alexandre Cazes was arrested in Thailand; he died in custody. Infrastructure and cryptocurrency were seized.
3. Wall Street Market
- Launched: 2016
- Takedown: May 2019 (by German police, FBI, and Europol)
- Details: This market facilitated sales of drugs, malware, and fake documents.
- Outcome: German authorities arrested three operators and seized cryptocurrency, servers, and user data.
4. Hydra Market
- Launched: ~2015
- Takedown: April 2022 (by German Federal Criminal Police and US DOJ)
- Details: Hydra was the world’s largest darknet market, responsible for 80%+ of darknet crypto transactions in 2021.
- Outcome: German police seized USD 25 million in bitcoin and shut down servers. OFAC sanctioned Hydra and linked entities.
5. Incognito Market
- Launched: 2020
- Takedown: June 2024 (as part of Operation RapTor)
- Details: Incognito Market was a prominent darknet platform specializing in narcotics — including fentanyl, methamphetamine, and counterfeit pills. It supported PGP encryption, multisig wallets, and privacy coins like Monero.
- Outcome: The market was dismantled following an investigation by the US Department of Justice and global law enforcement partners. Authorities seized Incognito’s backend infrastructure, froze associated cryptocurrency wallets, and arrested key administrators and high-volume vendors. Notably, prior to the takedown, Incognito Market’s admin threatened vendors with the release of information to law enforcement if the vendors did not make a payment to the admin (an extortion attempt). This was a first in the history of DNMs: Incognito Market’s admin didn’t just choose to abscond with the funds, but actually attempted to extort the market’s vendors.
{{horizontal-line}}
What are core challenges posed by darknet markets for law enforcement, compliance, and regulatory teams?
Law enforcement
Core challenge: Identifying real-world actors behind anonymized darknet activity
Darknet markets are designed to frustrate traditional investigative methods. Operators and vendors use encryption, anonymizing browsers, and pseudonyms to hide their identities, while payments in privacy-preserving cryptocurrencies like Monero make financial tracing more difficult.
For law enforcement, the primary challenge is attribution — connecting illicit online behavior to real-world identities and building evidence that can stand up in court. Investigators also face the time-sensitive nature of darknet market activity: vendors frequently rotate wallets, change market handles, or migrate to new platforms quickly following takedowns.
TRM supports law enforcement by:
- Mapping transaction flows to and from darknet market wallets
- Identifying clusters of related addresses across chains
- Uncovering links between market activity and known threat actors
- Providing graph visualizations and attribution to support case-building
Compliance teams (FIs, crypto businesses, VASPs)
Core challenge: Detecting and managing exposure to darknet-linked funds within transactional flows
For compliance teams, the key concern is inadvertently processing or facilitating funds tied to darknet market activity. Crypto businesses — including custodians, exchanges, and virtual asset services providers (VASPs) — face regulatory obligations to prevent their platforms from being used to cash out proceeds of crime or facilitate anonymized purchases of illicit goods.
The difficulty lies in the pseudonymous and layered nature of these transactions. Darknet proceeds are often laundered through mixers, privacy coins, and high-velocity transfers across multiple wallets and chains before reaching a regulated entity.
TRM helps compliance teams by:
- Alerting on transactions linked to known darknet market addresses
- Scoring wallets and counterparties based on risk exposure
- Monitoring for behavioral patterns consistent with darknet cash-out typologies
- Integrating risk insights directly into transaction monitoring systems
Regulatory and policy stakeholders
Core challenge: Developing proportionate frameworks that address darknet risks without undermining financial innovation or privacy rights
Darknet markets raise urgent policy questions about the intersection of encryption, financial privacy, and illicit finance. Regulators and policymakers are tasked with crafting rules that curb the abuse of crypto for illegal commerce while preserving legitimate use cases and innovation.
Global bodies like the Financial Action Task Force (FATF) have emphasized the need for strong anti-money laundering / countering the financing of terrorism (AML/CFT) controls in crypto — particularly around customer due diligence and the Travel Rule. However, many darknet transactions occur outside regulated entities altogether, making it difficult to enforce these frameworks in practice.
TRM supports policy stakeholders by:
- Providing data-driven insights into darknet market trends, flows, and threat actor behaviors
- Highlighting enforcement gaps and typologies to inform supervision strategies
- Offering technical context to support proportionate, risk-based policy design
- Equipping regulators with a clearer understanding of what blockchain intelligence can (and cannot) reveal
{{horizontal-line}}
How does TRM Labs help law enforcement, compliance, and regulatory teams take action against illicit darknet marketplaces?
Law enforcement
TRM helps investigators trace funds through anonymizing tools like mixers and peel chains, identify wallets tied to darknet vendors, and build graph-based visualizations that connect marketplace activity to known threat actors.
Compliance teams
TRM enables crypto businesses and financial institutions to detect exposure to darknet-linked funds, automatically flag suspicious activity, and adjust risk scoring in real time based on emerging threats.
Regulators and policymakers
TRM works with global regulators to quantify darknet risks, surface typologies, and improve cross-border understanding of how crypto is abused by darknet markets — and how it can be traced.
{{darknet-market-glossary-operation-raptor-callout}}
{{horizontal-line}}
Frequently asked questions (FAQs)
1. How do darknet markets work?
Darknet markets operate like underground e-commerce platforms. Hosted on anonymizing networks like Tor, they allow users to buy and sell goods using pseudonymous accounts and cryptocurrencies. Darknet markets often offer escrow services, vendor ratings, and encrypted messaging — all designed to build trust while preserving anonymity.
2. Why is cryptocurrency used on darknet markets?
Cryptocurrency enables pseudonymous, borderless transactions that are hard to censor or reverse. Bitcoin and Monero are commonly used because they bypass traditional financial systems and support the anonymity darknet markets rely on.
3. What are the risks for crypto businesses when it comes to darknet markets?
Crypto platforms may unknowingly process funds linked to darknet activity, exposing them to regulatory scrutiny, reputational harm, and financial crime risk. Funds from darknet markets are often laundered through mixers, privacy coins, and peer-to-peer transfers before reaching regulated platforms.
4. Can law enforcement trace crypto used on darknet markets?
Yes — while darknet markets use anonymizing tools, blockchain intelligence platforms like TRM Labs trace transactions, cluster addresses, and connect illicit flows to real-world identities. Law enforcement has successfully used these methods in major takedowns like Hydra and Operation RapTor.
5. Are all darknet market transactions untraceable?
No. While privacy tools like mixers and Monero obscure transaction details, many users make operational mistakes or interact with traceable services. Investigators can analyze these vulnerabilities using blockchain intelligence platforms to map illicit flows and identify threat actors.
6. What’s the difference between a darknets, the dark web, and the deep web?
- Darknets are part of the internet that require special tools like Tor in order to access.
- The dark web represents the suite of services and websites running on the darknet.
- The deep web represents portions of the internet not accessible to ordinary browsers or indexed by search engines.
7. How does TRM Labs help identify and disrupt darknet markets?
TRM Labs provides blockchain intelligence that enables law enforcement to trace darknet crypto flows, compliance teams to detect high-risk exposure, and regulators to understand typologies. TRM’s Graph Visualizer, wallet screening, and threat intelligence tools are used globally to combat darknet crime.
8. Are darknet markets still active today?
Yes. Despite enforcement actions, new darknet markets frequently emerge, often with stronger anonymization techniques. The ecosystem remains persistent and dynamic, requiring constant monitoring and updated intelligence to disrupt.
Access our coverage of TRON, Solana and 23 other blockchains
Fill out the form to speak with our team about investigative professional services.



















