Using the Tor onion is frowned upon, because the frequent abuse of the anonymizing router service.
Users of such services will come under scrutiny and will find themselves often on gubberment blacklists or their meta-data analyzed.
Never have a tor exit-node yourself, if you wanna stay out of trouble.
Don’t do the crime, if you cannot do the time.
This exit-node was suspicious to say the least, again not blacklisted at BlutMagie: http://www.blutmagie.de/
Just what is seen blacklisted is a Kaspersky Lab node
inetnum: 37.221.171.232 - 37.221.171.239
netname: Kaspersky_Lab_Romania
descr: Kaspersky Lab Research TOR exit node
Kaspersky is not a promotor of the use of Tor, but outside that rather indifferent.
The exitnode IP to be blocked :
Czech Republic 94.23.173.249
The specific tor exit node in Roubaix seems indeed suspicious, like reported with force attacks via SSH: http://blackhat.directory/ip/94.23.173.249
French mail hackers active: http://botscout.com/ipcheck.htm?ip=94.23.173.249
Also other brute force attacks on Word Press and Magento CMS.
OVH SAS abuse taking place: hxtps://www.abuseipdb.com/check/94.23.173.249
IP should be blocked for MiM exit-node attacks (SSL-stripping), also Tor had problems with version 3.0 handling protection particular nodes. 8)
Whenever you have the need to use Tor or tails, follow the security instructions from experts, and be aware not to run javascript
and to use end-to-end encryption, still your anonymity and security cannot be fully guaranteed against for instance the snooping of certain state actors (three letter security services).
polonus (volunteer website security analyst and website error-hunter)