From Yab Yum to Daulatdia: Tracing the Infrastructure of a Dark Web Prostitution Platform
![]() |
The investigation began with the discovery of an onion service presenting itself as Daulatdia Brothel, discovered incidentally during analysis of unrelated dark web activity. The site claimed to offer on-demand sexual services and positioned itself as an established operation rather than a newly created platform. At the time of discovery, there was no clear indication of who operated the service, how long it had been active, or whether it existed beyond a single domain.
Initial investigation raised subtle but important questions. The platform appeared more structured than many transient dark web listings, yet its presentation and claims did not fully align with its visible footprint. Certain elements suggested the service might not be confined to a single domain, prompting a broader examination of its digital presence rather than its advertised offerings.
As the investigation expanded, attention shifted away from the content of the site itself and toward the traces surrounding it, where the service appeared, how it was referenced elsewhere, and what technical artifacts persisted beyond the main page. These early indicators suggested that the Daulatdia-branded site might represent only one stage in a longer operational history.
This report follows that trail. By examining the infrastructure, external references, and financial touchpoints associated with the platform, the investigation seeks to reconstruct how the service emerged, evolved, and maintained continuity within the dark web environment, based solely on verifiable evidence.
Incident Trigger and Initial Investigation
The investigation was triggered when an onion URL surfaced during a separate dark web inquiry. The link appeared under the label “SlaveBay,” a third-party reference rather than a name used by the service itself.
- b33y***************************************************eid.onion
![]() |
When analyzed using StealthMole’s dark web tracker, the onion service was found to identify itself directly as “Welcome to Daulatdia Brothel.” The site claimed association with Daulatdia, Bangladesh, and advertised sexual services through a structured interface rather than a single static page. At this stage, the platform’s legitimacy, scope, and longevity were unknown.
Further contextual checks revealed that the same onion URL was mentioned in a Telegram channel, where it was described as a probable scam. This conflicting external characterization introduced early ambiguity, reinforcing the need to rely on infrastructure-level evidence rather than surface claims.
![]() |
Given the discrepancy between the site’s apparent structure and its disputed reputation, the investigation shifted toward determining whether the platform existed elsewhere, had historical continuity, or shared infrastructure with other services.
Platform Structure and Internal Functionality
With the initial Daulatdia-branded onion service identified, the next step was to understand whether the platform functioned as a simple advertisement or as an operational service. So, we decided to run the first identified domain through StealthMole’s darkweb tracker. Consequently, another related domain appeared with the same interface.
- yabyum***********************************************gpqd.onion
![]() |
Beyond the landing page, the platform also exposed a login interface, a publicly accessible forum, and individual user profile pages, including a visible account under the username Nameless1. These elements suggested that the service was designed to support user accounts and repeat engagement rather than one-off contact. An FAQ section and a page discussing short-term accommodation, including Airbnb rentals, further reinforced the impression of a platform attempting to present itself as organized and service-oriented.
![]() |
![]() |
The forum was explicitly described as unmoderated. Threads visible at the time of investigation showed users openly requesting sexual services by geography and preference. Whether these requests resulted in real-world interactions could not be verified, but the design choice itself was telling. By hosting requests internally rather than pushing users immediately to external messaging platforms, the service positioned itself as a central coordination point rather than a passive directory.
Marketplace Presentation and Media Artifacts
As the investigation moved deeper, StealthMole’s media indexing capabilities revealed additional details about how the platform presented its offerings. Multiple image assets were discovered under user-associated directories, consistent with listing or profile imagery rather than generic decoration.
![]() |
Several of these images carried embedded labels such as MACDADDYPIMP, Lonely_cuties, Lupin, and SupplyForKids. The repetition and formatting of these labels suggested deliberate categorization, likely intended to segment listings or personas within the marketplace. While the indexed images themselves did not contain explicit sexual content, their structured presentation aligned with how illicit service marketplaces commonly organize offerings for browsing and selection.
![]() |
At this stage, the focus remained on what could be observed directly: the platform behaved like a marketplace, with persistent listings, categorized personas, and infrastructure built to support discovery and comparison, regardless of how effective or legitimate those offerings ultimately were.
Historical Footprint and Rebranding Indicators
Questions about the platform’s longevity were addressed through historical indexing. This process revealed that the Daulatdia-branded service had not emerged in isolation. The same infrastructure had previously operated under the name Yab Yum, using identical layouts, content structure, and service descriptions.
![]() |
Several onion domains were associated with this earlier phase, including:
- B33yiqlhpysykamkyzeerxz4yishmelo5fruityj543jlnn6silna2ad.onion
- 4ogv76w42wjhv5zloluegzcpte7trrzxkbugqy7vvtismws4zm5zzmid.onion
- 4ogv76w4nm5egekasxxudinby3uhowv6mt2pjtp2zcbrdsrdb65fp4id.onion
![]() |
All three were offline at the time of investigation, but historical snapshots showed them hosting the same platform that later appeared under the Daulatdia identity. Rather than indicating unrelated copycat sites, the consistency across these domains pointed to deliberate mirror deployment and domain rotation.
![]() |
During its Yab Yum phase, the platform also promoted a USD 2,000 weekend trip to Daulatdia, Bangladesh. The offer was framed as a bundled experience rather than casual travel advice, implying a level of coordination beyond simple online introductions. While there was no evidence that such trips were ever executed, their promotion provided insight into how the platform sought to position itself: as an organized service with international reach.
Operator Signals and Infrastructure Continuity
As the investigation expanded beyond domains, attention turned to identifying stable operator-linked artifacts. Two email addresses were recovered from the platform’s content across different iterations:
- h******@notmail.com
- hp****@mail2tor.com
One of these, h*****@notmail.com, was associated with the PGP fingerprint:
- 3DC*************************************FE
![]() |
This cryptographic identifier became a key pivot point. Unlike onion domains, which are frequently discarded, PGP keys often persist across infrastructure changes. Pivoting on this fingerprint led to the identification of another related onion domain, which was also offline at the time of analysis.
- b33******************************************rad.onion
The reuse of the same PGP key across multiple domains and branding phases provided a strong continuity signal. It suggested that the Daulatdia and Yab Yum platforms were not separate efforts but successive iterations managed under the same operational control.
Financial Infrastructure and Payment Readiness
Financial artifacts added another layer to this continuity. Analysis ofb33yiqlkdqa3scyxzvn6vbz5qsw7e7dzp3mizrknqeuv35bauuj6wrad.onionsurfaced a large number of Bitcoin wallet addresses linked to the platform. Among these were addresses such as
- Bc1q8x*******************************px43
- bc1qax*******************************3lnl
- bc1q2g*******************************qvfy
- bc1qut******************************va5ju
- bc1qry******************************s4py6
- bc1qzk******************************pnhhs
- bc1q4*********************************rnv7
- bc1qm*********************************md7h
- bc1qj*********************************rvrg
- bc1qa*********************************tu78
![]() |
Most of the identified wallets showed no observable transaction history, suggesting either low usage or preparatory provisioning rather than active throughput. One address, however, displayed confirmed activity, distinguishing it from the broader set.
- bc1q4*******************************rnv7
![]() |
A separate, Yab Yum–linked domain,4ogv76wvasufotajocqxlobk3bwsqi2loqd7znu4bkxqovov6pgr6oyd.onion,exposed an additional wallet:
- bc1q8****************************g8w
![]() |
Taken together, the wallet infrastructure suggested deliberate readiness to accept cryptocurrency payments, even if actual usage appeared uneven.
External References and Promotion
The platform’s presence was not limited to its own onion infrastructure. One of the Yab Yum–associated domains was identified in a Telegram channel named Silent Cyber Force. In that context, the link was promoted explicitly as an online prostitution platform.
- 4ogv76w4nm5egekasxxudinby3uhowv6mt2pjtp2zcbrdsrdb65fp4id.onion
![]() |
This reference was external and third-party in nature, but it demonstrated that the service circulated beyond passive dark web discovery. Whether promoted intentionally by the operator or shared organically, the appearance of the link in Telegram indicated that the platform was perceived as operational and worth advertising within adjacent communities.
Conclusion
Following the Daulatdia Brothel onion service back through its infrastructure revealed a platform that evolved rather than appeared suddenly. Through rebranding, mirror rotation, and reuse of core technical elements, the service transitioned from its earlier Yab Yum identity while maintaining operational continuity.
Stable artifacts, particularly a reused PGP fingerprint, recurring contact details, and shared backend structure, tied these iterations together more convincingly than any single domain could. Financial infrastructure and external promotion further suggested a platform built with persistence and scalability in mind, even if its real-world impact remains difficult to measure.
By focusing on infrastructure, identifiers, and contextual traces rather than the platform’s own claims, this investigation reconstructs how the service emerged, adapted, and sustained itself within the dark web environment.
Editorial Note
Dark web investigations rarely provide complete certainty. Services fragment their infrastructure, rotate identities, and allow components to lapse and resurface over time. This case demonstrates how methodical correlation of domains, cryptographic identifiers, financial artifacts, and external references can reveal continuity where none is immediately apparent, and how StealthMole enables such analysis without relying on speculation or assumption.
To access the unmasked report or full details, please reach out to us separately.
Contact us: support@stealthmole.com
Labels: CSAM, Featured, Prostitution



















































