Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 503

I2P

What is I2P?

I2PThe Invisible Internet Project: a peer-to-peer anonymity network where every node also acts as a router, using unidirectional tunnels and garlic routing.


I2P (Invisible Internet Project) is an anonymous overlay network optimised for hidden services inside the network (eepsites at .i2p addresses) rather than as a proxy to the public web. Unlike Tor, every participant relays traffic, and connections use separate inbound and outbound unidirectional tunnels per session. Messages are bundled together via garlic routing, a variant of onion routing that wraps multiple cloves into a single encrypted message to hinder traffic analysis. I2P is used for anonymous browsing, messaging, file-sharing, and as a fallback C2 channel for malware crews when Tor is blocked. Defences mirror Tor: monitoring unauthorized I2P installations on endpoints with EDR, blocking known I2P bootstrap reseeds at sensitive perimeters, and using DLP on outbound traffic.

Examples

  1. 01

    Anonymous chat over I2P-only IRC and email services.

  2. 02

    Some ransomware families rotating to I2P for C2 when Tor exit nodes are blocked.

Frequently asked questions

What is I2P?

The Invisible Internet Project: a peer-to-peer anonymity network where every node also acts as a router, using unidirectional tunnels and garlic routing. It belongs to the Attacks & Threats category of cybersecurity.

What does I2P mean?

The Invisible Internet Project: a peer-to-peer anonymity network where every node also acts as a router, using unidirectional tunnels and garlic routing.

How does I2P work?

I2P (Invisible Internet Project) is an anonymous overlay network optimised for hidden services inside the network (eepsites at .i2p addresses) rather than as a proxy to the public web. Unlike Tor, every participant relays traffic, and connections use separate inbound and outbound unidirectional tunnels per session. Messages are bundled together via garlic routing, a variant of onion routing that wraps multiple cloves into a single encrypted message to hinder traffic analysis. I2P is used for anonymous browsing, messaging, file-sharing, and as a fallback C2 channel for malware crews when Tor is blocked. Defences mirror Tor: monitoring unauthorized I2P installations on endpoints with EDR, blocking known I2P bootstrap reseeds at sensitive perimeters, and using DLP on outbound traffic.

How do you defend against I2P?

Defences for I2P typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for I2P?

Common alternative names include: Invisible Internet Project.

Related terms