The Onion Router (Tor) uses a concept called onion routing, which ensures the entry node to a network is not the same as the exit node. This process creates anonymity for the client when interacting with the destination system. By hopping among internal nodes, it could theoretically be impossible to detect the origin of the request. However, while it provides a blanket of anonymity for Internet users, it also provides a safe haven for malicious actors who want to exploit anonymity in order to perform illegitimate actions against web applications.”]
Source: https://www.bankinfosecurity.com/whitepapers/internet-anonymity-pros-cons-tor-network-w-2120

