btw there's nooooo way in hell it's a hosted machine at a 3rd party host. Almost all web hosts have backdoors to view content on their own servers regardless of security not to mention examining inbound and outbound data to the server. The FBI probably has every host in the US and as many as they could get in the rest of the world examining their data for servers containing files relevant to silkroad or data indicating massive inbound TOR traffic.
The existence of shady hosts notwithstanding, it really could be anywhere. It could be on a hacked box in Russia. It could be secreted in a closet at a NOC. It could be somewhere completely different and using an ssh tunnel through a rogue access point in any organization. The traffic would look like normal SSL traffic, and because of the way hidden services work, if the server or its tunnel endpoint ever went down, a backup could be placed elsewhere and nobody would have to update their links to it. That's because the hidden service hostname is actually a hash of its private key.
1. go to google
2. type in "tor weaknesses"
3. shut the hell up
I appreciate your concern, but I'm not the one being willfully ignorant here.