Independent anti-scam research. A volunteer movement against phishing and online fraud. This archive exists because they tried to erase us — deleted from Bing, locked on Twitter, DMCA'd on GitHub, reported on every platform. So we moved to IPFS via Ethereum Name Service. No server to shut down. No host to pressure. No "report" button to abuse.
Every step documented before it happened. We knew the playbook. We were ready.
Every claim is backed by source material. Every screenshot is SHA-256 fingerprinted. Every external link has at least one immutable archive copy.
Direct correspondence from the xmrwallet operator "N.R." — defending the site, demanding report removal, changing his story from "it's legit" to threats. Proves NameSilo's "compromise" story was invented — the operator never claimed it.
View →8 PHP endpoints for key exfiltration. Server-side transaction construction. session_key carrying wallet address + private view key, base64-encoded. Google Analytics tracking victims. Production code vs. GitHub code comparison.
View →16 screenshots in the evidence directory. NameSilo's tweet, operator emails, X Support contradictions, third-party research threads. Each file fingerprinted in EVIDENCE_HASHES.txt. Court-usable format.
View →SHA-256 hashes of the xmrwallet.com source code captured before and during the alleged "compromise" period. The code never changed. The IP never changed. NameSilo's "compromise" claim is provably false.
View →Line-by-line analysis of NameSilo's March 13 tweet. Each of the 4 sentences is independently proven false using documents NameSilo does not control: operator emails, delivery receipts, code hashes.
View →Every external reference has Wayback Machine, GhostArchive, or archive.today copies. The Twitter archive methodology is documented. Even if every platform goes dark, the evidence survives.
View →The operator's entire strategy depends on victims giving up after being silenced. This section is for those who refuse.
We know it feels hopeless. Monero is private. Your money seems gone. They deleted your reviews, your posts, your warnings. They want you to believe there's nothing you can do. That's not true.
The operator's power was making victims disappear. This archive makes that impossible.
Every repository, every page, every screenshot. GitHub goes down, domains get seized, accounts get locked — it's all still here.
Real-time phishing & scam domain blocklist. 130,000+ curated threats. Plain text, hosts, AdBlock Plus, dnsmasq. Threat intelligence API. All raw data included.
The registrar's tweet, operator emails, X Support contradictions, SHA-256 verified screenshots, full technical breakdown. Filed with ICANN and law enforcement.
Private key theft, server-side TX hijacking, 8 PHP endpoints, Google Analytics tracking. Deleted GitHub Issues #35 & #36 — cached copies included.
Scam operator infrastructure analysis. Phishing kits, panel configs, affiliate networks, crypto drainer source code. Raw intelligence.
Full directory of this IPFS archive. Every page, every document, every piece of evidence — linked and described.
The operator kept victims silent for a decade. Then he tried it on us. We documented it all before it happened.
Gold Checkmark corporate support used to lock @Phish_Destroy. X reviewed: "no violation." Still locked.
All phishdestroy.io results removed from Bing. Complete erasure from Microsoft search.
False DMCA takedowns against repos. Operator deleted Issues #35 & #36 with victim reports.
100+ victim reviews removed through automated moderation abuse.
DMCA requests against Google search results, domains, hosting. Anything reportable gets reported.
50+ paid articles via Kwork, Freelancehunt, intermediaries. Orders indexed on Google Drive.
Technical analysis videos reported and removed. Researchers demonstrating the theft silenced.
Coordinated reporting against warning threads. Community discussion suppressed.
Government email addresses used to file fraudulent abuse reports on platforms.
"Open source" wallet on bulletproof hosting. GitHub code ≠ production code. Anti-analysis infrastructure.
Every platform with a "report" button has been weaponized. Every search engine accepting DMCA requests has been abused. Every freelance marketplace used to buy burial. This is a decade-long strategy — not an accident. The operator and NameSilo are on the same side. The case file is with ICANN Contractual Compliance and federal law enforcement.
phishdestroy.io
github.com/phishdestroy
codeberg.org/phishdestroy
phishdestroy.eth
phishdestroy.medium.com
@PhishDestroy
infosec.exchange/@phishdestroy
abuse@phishdestroy.io
report@phishdestroy.io