Snuff Cinema: Mirror Network and Wallet Infrastructure Analysis
![]() |
The term “snuff film” historically refers to content that claims to depict real acts of extreme violence or death for entertainment or commercial gain. While the concept gained public attention decades ago through urban legends and exploitation media, the dark web has repurposed the term as branding for platforms that advertise extreme, violent, and illicit material to paying users.
On Tor, websites using names such as “Snuff Cinema” typically position themselves as exclusive libraries of prohibited content. These platforms often rely on shock-driven marketing language, claims of authenticity, and Bitcoin-based access models. Payment is usually framed as an “entrance fee,” granting temporary download access through a controlled gateway. Whether all advertised material is genuine or exaggerated for marketing purposes varies from case to case but the infrastructure supporting these sites is often deliberate and financially structured.
Snuff Cinema follows this pattern. It presents itself as a subscription-style platform hosted on onion domains, requiring Bitcoin payment before access is granted. Its messaging emphasizes exclusivity, authenticity, and short-term access windows tied to specific wallets.
This report does not assess the authenticity of the content being advertised. Instead, it examines the technical and financial footprint behind the operation: mapping its Tor mirrors, identifying associated Bitcoin wallets, analyzing payment structures, and tracing how the platform appears to maintain continuity across multiple domains and channels.
Incident Trigger and Initial Investigation
The investigation did not begin as a targeted operation. The domain surfaced during routine dark web monitoring within StealthMole’s Darkweb Tracker module. At the time, it appeared as another onion service using provocative branding, “SNUFF CINEMA”, accompanied by messaging designed to attract users seeking extreme and illicit content.
- ekvo****************************************2ijad.onion
![]() |
The payment page displayed a single Bitcoin wallet and a specific amount required for entry. That detail prompted a closer look. Using StealthMole, additional wallet identifiers began to surface in association with the same domain.
At this stage, there was no clear indication that the platform extended beyond this onion address. However, the presence of multiple wallets tied to a single access gateway suggested that further investigation was necessary. What began as a routine domain review transitioned into a structured infrastructure mapping exercise.
Initial Wallet Enumeration and Financial Indicators
A closer review of the payment gateway revealed that the wallet displayed for access was:
- bc1q********************************2tmt
![]() |
The amount requested at the time was 0.00013491 BTC, with the page stating that the address would remain valid for 24 hours and that payment would unlock downloads for the same period.
Using StealthMole’s artifact extraction and wallet correlation capabilities, four additional Bitcoin addresses were identified in connection with the same onion domain:
- bc1qg**********************************8hx
- bc1qu**********************************8gy
- bc1qq**********************************0ht
- bc1qe**********************************ucx
![]() |
At first glance, the presence of five separate Bitcoin wallets tied to a single domain raised questions. Were these rotated per session? Were they placeholders? Or were they distributed across different access paths?
Blockchain review at this stage showed no recorded transaction activity across these addresses. The absence of movement did not immediately clarify their role, but it did suggest that the financial component of the site required deeper scrutiny. Either the infrastructure was newly deployed, or the active payment flow was occurring elsewhere.
That uncertainty prompted a broader pivot. If the wallets attached to this domain were inactive, it was necessary to determine whether other instances of “Snuff Cinema” were operating in parallel, possibly handling active payments under a different onion address.
This marked the point where the investigation moved beyond a single domain assessment and into structured expansion mapping.
Secondary Domain Discovery and Active Wallet Identification
To determine whether the inactive wallets on the initial domain reflected a newly deployed setup or only one segment of a larger operation, further pivoting was conducted using StealthMole’s domain correlation tools. This led to the discovery of another onion address carrying identical branding:
- snuffnu56nh7tpvi.onion
![]() |
The structure of the site mirrored the previously observed domain. It followed the same subscription-style access model and directed users to a Bitcoin payment page before granting entry. However, this instance displayed a different wallet:
- 1QGs************************9mK
![]() |
Unlike the wallets associated with the first domain, this address showed recorded blockchain activity. It had received funds in a single transaction dated 2018-11-16 and had not moved those funds afterward. The wallet remained dormant but historically active.
This discovery introduced an important shift in perspective. The existence of two domains under the same branding, each tied to separate wallets and exhibiting different transaction patterns, suggested segmentation rather than duplication. The first domain appeared operational but financially inactive, while the second reflected historical payment activity.
At this stage, the platform could no longer be viewed as a single-entry Tor service. Instead, it began to resemble a distributed structure where different domains may have served different operational phases or user entry points.
Expansion of the Mirror Network
The discovery of a second domain carrying identical branding suggested that Snuff Cinema was not confined to a single onion address. To determine the scale of deployment, further domain mapping was conducted using StealthMole’s darkweb tracker.
During this process, a series of onion domains surfaced in connection with snuffnu56nh7tpvi.onion, presented as alternate access points. These included:
- snufflzsdd47y3lgkw664copfvofqujxjbr47vc267hork7u3pd4yiad.onion
- epmr53iqsfgmnvhy4p5u3ot3kyrzzdh7dilkhjrylzvl6xu52pxvxhqd.onion
- 5od5c***********************************************2sqd.onion
- ekvot***********************************************ihyd.onion
- fkthke7sggwq2zi7ap6iminrr7p4nvequs6qog4ab3xgibwishn5spad.onion
- oqr7dat3rbkhmrl2yemd6k4vqp64di4dxpdongmcocffltzfuh5vkcid.onion
- 5od5cgx6butoeasjpgyk753uwy6av3jlmfofrehemkdmhqnegtnqzbid.onion
- t33birhamm44ltrqtniq2v5wjjynpt4kv64s5qgkk5dxbuq6jaa5vcqd.onion
- tnzicmv55dmqhfzemnfef6nzg6dmqyyo3j56bxlo554ybmg3ls4jh4qd.onion
- vxgilcmvjhsgehrh.onion
![]() |
The consistency of branding across these domains indicated intentional replication rather than unrelated usage of similar terminology. The presence of multiple mirrors is a common resilience strategy on Tor, allowing operators to maintain accessibility even if individual domains become unstable or blocked.
What stood out during this mapping process was that the domains were not randomly generated in isolation. Some exhibited structural similarities in naming, while others appeared entirely distinct. This mix of patterns suggested deliberate domain management rather than automated cloning.
At this stage of the investigation, the scope had clearly expanded beyond two isolated onion sites. Snuff Cinema appeared to operate through a distributed mirror network, with multiple entry points potentially serving the same underlying platform.
The next step was to examine whether these mirrors shared financial infrastructure, specifically, whether they reused Bitcoin wallets or introduced new ones per domain.
Wallet Diversification Across Mirror Domains
With the mirror structure established, attention shifted to the financial layer behind these additional domains. If the mirrors were simply redundant access points, one might expect them to reuse the same payment infrastructure. Instead, StealthMole analysis revealed that several mirrors introduced entirely new Bitcoin wallets.
For example, the domain:
- 5od5c******************************************2sqd.onion
was associated with five separate Bitcoin addresses:
- bc1q2*********************************fz4
- bc1q0*********************************jan
- bc1qq********************************lpdh
- bc1qx*********************************88n
- bc1q2*********************************5lk
![]() |
Similarly, the mirror:
- oqr7dat3rbkhmrl2yemd6k4vqp64di4dxpdongmcocffltzfuh5vkcid.onion
displayed a different wallet:
- bc1qj******************************tz3
![]() |
Another mirror:
- 5od5cgx6butoeasjpgyk753uwy6av3jlmfofrehemkdmhqnegtnqzbid.onion
was tied to:
- bc1qdx***************************3z8
![]() |
At this stage, most of these addresses showed no transaction history. However, one mirror stood apart.
The domain:
- snufflzsdd47y3lgkw664copfvofqujxjbr47vc267hork7u3pd4yiad.onion
was associated with the wallet:
- 3Myb********************************dux
![]() |
This wallet had recorded blockchain activity, with funds received and later transferred out, leaving a zero balance. The payment amount requested on that mirror was 0.00042321 BTC, a noticeable variation from the amount observed on the initial domain.
Another domain within the mirror network:
- ekvot****************************************ihyd.onion
introduced fifteen additional Bitcoin addresses, one of which showed a pattern of receiving funds and transferring them out shortly afterward.
- bc1q***************************uu
![]() |
Taken together, these findings indicated that Snuff Cinema did not rely on a single static wallet across its infrastructure. Instead, individual mirrors appeared capable of operating with distinct Bitcoin addresses, some dormant and others briefly active. The variation in requested payment amounts further suggested that each mirror functioned as an independent financial entry point rather than merely redirecting traffic to a central wallet.
Historical Wallet Activity and External Exposure
While most wallets identified across the mirror network showed limited or no transaction history, two addresses stood out due to their activity patterns and broader exposure.
The first was linked to the mirror domain:
- vxgilcmvjhsgehrh.onion
This domain was associated with the Bitcoin wallet:
- 1FVx**********************DX
![]() |
Blockchain review revealed a substantially different profile compared to previously identified addresses. This wallet recorded 175 incoming transactions and 175 outgoing transactions, with a total of 0.441 BTC received and 0.441 BTC sent. Activity began on 2018-11-08 and continued intermittently through 2025-01-14. At the time of analysis, the wallet held no remaining balance.
Unlike the single-transaction wallet identified earlier, this address reflected sustained operational use across multiple years. Funds were consistently transferred out after being received, indicating active circulation rather than accumulation.
In parallel, the wallet:
- bc1********************************3z8
originally identified on the mirror,5od5cgx6butoeasjpgyk753uwy6av3jlmfofrehemkdmhqnegtnqzbid.onion,was later found listed on another onion service:
- sfrlc*************************************azid.onion
This site presented itself as an “Onion BTC Wallet Database” and advertised the address for sale at 0.00804 BTC, displaying an alleged balance of 0.08044 BTC. However, blockchain inspection showed no transaction history for this wallet, creating a discrepancy between the advertised balance and observable activity.
![]() |
This crossover introduced a different dimension to the investigation. Beyond operating through mirrors and rotating wallets, at least one Snuff Cinema–associated address appeared within a separate onion-based wallet marketplace, suggesting either data reuse, misrepresentation, or overlap between dark web services.
Additionally, the domain vxgilcmvjhsgehrh.onion was identified in four separate leaked documents indexed within StealthMole’s database. While the documents varied in context, the repeated appearance of the same onion address indicated that the platform had circulated beyond its own infrastructure, entering archived or leaked material ecosystems.
At this stage, Snuff Cinema’s footprint extended across three layers:
- Active and dormant Bitcoin wallets
- Mirror-based Tor deployment
- Cross-appearance within unrelated onion services and leaked documents
What began as a single-domain review had evolved into a multi-layer infrastructure profile with both financial and ecosystem exposure.
Cross-Platform Promotion and Domain Patterning
As the mirror network expanded, the investigation shifted toward determining whether Snuff Cinema operated exclusively within Tor or relied on external channels for visibility. A keyword search for “Snuff Cinema” within StealthMole’s indexed sources surfaced a Telegram reference dated 2024-03-04.
The post, titled “SNUFF CINEMA,” promoted an onion link:
- 5od5cgx25asuqylwbhempmjfmtggdzvpkcdw2qu25cmyps325v77nsyd.onion
![]() |
The message included promotional language describing violent “snuff” content and directed readers toward the Tor domain. While the Telegram post itself did not provide operational details, it demonstrated that the platform’s onion addresses were being circulated beyond Tor.
What made this finding more significant was the structural similarity between the promoted domain and an already identified mirror:
- 5od5cgx25pfwv4fgqb6yjpxw6n6l3g7cxvh3metkbozoc3y3rjju2sqd.onion
Both addresses share the identical prefix:
- 5od5cgx25
![]() |
This consistency suggests intentional naming continuity. While prefix similarity alone does not confirm cryptographic linkage, it indicates deliberate domain generation rather than coincidence. In practice, such structured prefixes are often associated with coordinated mirror management or vanity-generated onion addresses.
At this stage, Snuff Cinema appeared not only as a distributed onion service but as a platform leveraging multiple domains and external channels to sustain visibility and access.
Conclusion
The investigation into Snuff Cinema evolved from a routine domain review into a structured infrastructure analysis. What initially appeared to be a single Tor-hosted platform revealed a broader deployment strategy built on multiple mirror domains, segmented payment gateways, and diversified Bitcoin wallet usage.
Across the identified onion addresses, the platform did not rely on a centralized wallet or a single static domain. Instead, individual mirrors operated with distinct Bitcoin addresses, varying payment amounts, and differing levels of transaction activity. Some wallets remained dormant, others processed limited short-term payments, and at least one reflected sustained multi-year transactional movement. This layered financial structure suggests operational compartmentalization rather than a simplistic setup.
The appearance of one wallet within a separate onion-based wallet marketplace, along with domain references found in leaked documents, further expanded the platform’s digital footprint beyond its own mirror network. Additionally, the Telegram post promoting a structurally similar onion address demonstrated that access points were being circulated outside Tor, reinforcing visibility through external channels.
Taken together, these findings depict Snuff Cinema not as an isolated dark web page, but as a distributed service maintaining continuity through mirror proliferation, wallet diversification, and cross-platform exposure. The platform’s resilience appears to stem from fragmentation: domains, wallets, and access points functioning independently yet aligned under consistent branding.
Editorial Note
Dark web investigations rarely produce absolute attribution or linear operational clarity. Onion services shift, wallets rotate, and infrastructure evolves over time. What appears inactive today may resurface under a new domain tomorrow. This case illustrates how fragmented indicators can be systematically connected through StealthMole.
To access the unmasked report or full details, please reach out to us separately.
Contact us: support@stealthmole.com










































