Our internet is a maze of activities. Preventing any sort of prohibited activities require tracing the user or group to the root level. This is possible when your ISP has a clear idea of the originator of the message. But when it is in a relay of nodes, this becomes a cumbersome job. It has been so since installation of dark web or the more famous TOR. TOR networks are famous for their relayed data transfer mode. During the past decade, an influx of cyber pirates made dark web a nightmare. Several regular users opted out of fear of being convicted.