TON Sites
Decentralised websites hosted on the TON network. Resolved via .ton domains and ADNL endpoints; accessed through TON Proxy or browsers with native TON support.
Aliases: ton site, tonsite, dot ton site
TON Sites are websites that live on the TON network rather than on the conventional DNS + IP web. Instead of an A record pointing to a server, a TON Site is reached through an ADNL address recorded in a .ton domain. The TON Proxy (a piece of software running on a user’s machine, in a wallet, or as a public gateway) resolves the name and tunnels traffic to the right node.
How resolution works
- User types
example.tonin their browser (or wallet’s built-in browser). - The client looks up the
.tondomain in the TON DNS resolver tree. - The domain returns a
dns_adnl_addressrecord — a 256-bit ADNL identifier. - The TON Proxy connects to that ADNL endpoint over the TON peer-to-peer network.
- The endpoint serves HTML, like any other web server.
There is no DNS, no Cloudflare, no certificate authority in this path — encryption and addressing come from ADNL’s public-key model.
How users access them
- Tonkeeper, MyTonWallet, Wallet. Their built-in browser resolves
.tonnatively. - TON Proxy CLI. A small utility that runs locally and forwards
*.tontraffic from a normal browser through the TON network. - Public gateways like
foundation.ton.sitemap TON Sites to the conventional web — convenient but defeats the decentralisation angle.
Use cases
- Censorship-resistant publishing. A
.tonsite is not blocked by traditional DNS or IP filtering; only blocking the TON network itself can take it down, which is much harder. - Project landing pages. Some TON-native projects host a
.tonmirror of their main site as a statement. - Decentralised storage front-ends. Combined with TON Storage, a TON Site can serve files by storage bag ID.
- Mini App alternatives. A TON Site can ship a web UI without depending on Telegram or conventional hosting.
Differences from the regular web
- Discovery. No Google indexing. You find TON Sites through directories, channels, and the
.tonregistry. - Performance. TON Proxy adds latency — typical page loads are noticeably slower than HTTPS on a CDN.
- Reach. Most users do not have a TON Proxy installed. Public gateways improve reach but reintroduce a single point of trust.
Practical caveats
- HTTPS-style certificates do not apply. Trust comes from the ADNL public key matching the DNS record. If you trust the resolution chain, you trust the content.
- Mobile support is uneven. Wallet apps integrate the proxy for in-app TON Sites, but a system-wide proxy on iOS/Android is not yet a smooth experience for non-technical users.
- Hosting. Anyone can run a TON Site by exposing an ADNL endpoint and pointing a
.tondomain at it. There is no hosting business in the conventional sense; lots of small site operators run their own nodes.
Where they fit
TON Sites occupy a niche similar to ENS-resolved IPFS gateways on Ethereum — clearly decentralised, not yet mass-market. For an SEO-driven content site, conventional HTTPS hosting still wins; for a censorship-sensitive announcement page or a brand statement, a .ton mirror adds a credible decentralisation layer.