OnionScan on Google Cloud Shell
NOTE! This repo is a patched version of https://github.com/s-rah/onionscan and is designed to be run from a Google Cloud Shell.
2. Open your Cloud shell you click here:

3. From your Cloud Shell:
wget https://raw.githubusercontent.com/burntonions/onionscan3/main/onionscan/cloudshell_install_onionscan.sh
chmod +x cloudshell_install_onionscan.sh
./cloudshell_install_onionscan.sh
4. You now need a way to connect into Tor, and we can use Docker (already setup in Google Cloud Shell) for this:
docker run -it -p 127.0.0.1:9050:9050 –-name torproxy -d dperson/torproxy
docker inspect torproxy
You will need to re-run the Tor Proxy / docker commands above each time you drop into a cloud shell.
5. Note the IP address listed in the IPAddress field and then run onionscan:
onionscan -torProxyAddress <IP ADDRESS OF DOCKER CONTAINER>:9050 -verbose <ONION ADDRESS>
6. Use the web preview in Google Cloud Shell to view the Onion Scan Correlation Lab:

Your browser should open the Onion Scan Correlation lab in a new tab:

7. Some common searches:
snapshot
- finds all types of all data extracted.
crawl
- finds all successful crawls.
ssh
- find all SSH banners retrieved.
email-address
- search for extracted email addresses.
mod_status
- this will find hidden services potentially leaking the "real" IP address.
Or you can search for the Title of a Hidden Service from the Hunchly Dark Web report.
What is OnionScan?
Head to the original repo: https://github.com/s-rah/onionscan