What is I2P?

I2P (the Invisible Internet Project) is a decentralized, peer-to-peer network that uses garlic routing and multiple layers of encryption to protect both the sender and receiver of every communication. Unlike traditional VPNs or Tor, I2P is designed from the ground up as a self-contained network — an overlay internet where privacy is the default.

Volunteers around the world operate the network, routing traffic through thousands of nodes to ensure no single point of failure or surveillance. I2P supports secure web browsing, private email, anonymous file sharing, and encrypted messaging — all without exposing your identity or location.

I2P runs on Windows, Linux, and Mac with multiple implementations available: I2P (the Java reference client), I2P+ (an enhanced fork with performance improvements), and I2PD (a lightweight C++ implementation).

How It Works

I2P uses garlic routing — bundling multiple encrypted messages together and passing them through a series of volunteer-operated routers. Each router only knows the previous and next hop, never the full path. This makes traffic analysis extremely difficult.

Your Device
I2P router encrypts your message in multiple layers
Encrypted
Tunnel Hops
Each router peels one encryption layer and forwards to the next
Re-encrypted
Destination
Only the final recipient can decrypt the message
Your Message
Three layers of encryption — like nesting envelopes inside envelopes
Garlic Routing

Multiple messages are bundled together into a single encrypted "clove" and sent through the network. This makes it impossible for any observer to know which message belongs to which conversation.

Unidirectional Tunnels

I2P uses separate tunnels for sending and receiving. Your outbound traffic takes a completely different path than your inbound traffic, making correlation attacks far more difficult.

Our I2P Services

Reseed Servers
Online

Reseed servers bootstrap new users onto the I2P network. When you first install I2P, your router needs to discover peers — our reseed servers provide that initial set of router contacts so you can join the network.

URL reseed.stormycloud.org/i2pseeds.su3
Telegram MTProto Proxy
Online

Access Telegram through I2P with our MTProto proxy. Route your Telegram traffic over the I2P network for an additional layer of privacy — no I2P installation required on your device.

Server 2qzhdgjztbldasmjo5ek522kdruyhdo3izek5bjbl6rfnzauhzqa.b32.i2p Secret ddc5d1717f50bdab002e1ba52d9ed8f2fe
View proxy details
I2P Router Fleet
Online

We operate over 100 I2P routers with floodfill enabled, actively participating in the network's distributed database. These routers help other nodes discover peers, resolve destinations, and maintain the health of the network.

Outproxy
Online

Our outproxy bridges the I2P network and the regular internet, letting I2P users access clearnet websites while maintaining anonymity. It processes thousands of requests per second, supports Tor .onion addresses, and routes all DNS through StormyCloud's own privacy-first servers.

Address exit.stormycloud.i2p

Resources & Guides