If you didn't know this about Tor yet, while nobody might know where it's coming from, they can still read the data from the exit nodes, meaning all the data you send via the Tor network. There was a hacker named Dan Egerstad who took advantage of this flaw, and was able to intercept government and embassy e-mails, which were sent over the Tor network, but unfortunately did not use SSL or some sort of encryption to make their e-mails unreadable to others. Tor is useless for you if you're sending sensitive data without protecting the content, but if you want to send data and don't care who reads it and you just don't want someone to know exactly where it came from, then yes, it's fine.
I don't know if it's a fact Tor keeps logs or not, but if you're truly concerned about someone tracing you, you can use a combination of different public proxy servers that many people use and chain them together so it's much harder to match the times in the logs and track you.
Hellbound Hackers is the collective work of the staff and the community and is therefore licensed under the CC BY-NC-SA license.