A US ICANN-accredited registrar publicly defended a 10-year, $20M Monero drainer — and is still actively trying to erase the evidence.
NameSilo, LLC really doesn't like this text. Not because it's false — because they wrote the original themselves. Their official tweet defending a $20M Monero drainer is Exhibit A below. Since they can't dispute the evidence, they dispute the existence of anyone who publishes it: mass complaints to X/Twitter (our account locked — X cleared us in writing, lock stayed), Bing and Google delisting requests against phishdestroy.io, and the operator's lifetime hobby — mass-reporting real victim reviews on Trustpilot (100+ removed reviews, partially verifiable via Web Archive and rating hash history — authorities can request Trustpilot's full deletion logs). Our Twitter threads tagging @NameSilo with abuse reports go back one and two years — they killed those accounts too. We have copies of everything. Their entire strategy right now is simple: don't answer for what they're part of and erase every trace that it happened. It's not working.
Master proof index → · Full article → · The Connection → · The Lies → · Pressure Campaign → · Technical breakdown → · Operator dossier → · Victims & timeline → · Evidence Index →
A note on what you're reading and why we were ready.
We knew the operator's playbook before NameSilo, LLC (IANA #1479) ever opened their mouth. We'd been watching since 2016. We'd seen him delete real victim reviews off Trustpilot. We'd seen the fake DMCAs on GitHub. We'd seen the puppet Twitter accounts mass-reporting researchers. We'd seen the 50+ paid SEO articles burying the complaints. We'd seen him scrub BitcoinTalk threads, nuke YouTube videos, wipe Reddit posts. Eight years of the same pattern: never answer the evidence, just make the person who published it disappear.
So when NameSilo, LLC (IANA #1479) posted their official defense of him — four sentences, four lies, on a public channel, from a verified corporate account — we didn't panic. We archived it. Instantly. GhostArchive, Wayback, local capture, SHA-256 hash. Before they could blink. Because we already knew this registrar was going to do exactly what the scammer always does: try to erase the receipts. They did. On schedule. With their paid Gold Checkmark support channel on X.
They think they're clever. They're not. They're predictable. Every move they've made, we anticipated. Every surface they've taken down, we'd already mirrored. Every complaint they've filed, we've logged. They operate like the evidence will eventually go away. It won't.
One more thing: the $10M-$20M number is a floor, not a ceiling. Eight years, thousands of wallets, operator-side key exfiltration on every single login — the real number is significantly higher. We use the conservative estimate because we only publish what we can prove. But we know. And the on-chain analysis, when it's complete, is going to make this README look like the opening statement.
And to NameSilo, LLC (IANA #1479): you publicly committed — in writing, from your official account — to helping a confirmed scammer get his VirusTotal detections removed. You said that. Out loud. On the internet. While the drainer was still live. You really thought nobody would keep the receipt?
Let's get one thing straight. This is not a cry for help. We don't need sympathy, petitions, or outrage. We are not victims here — the people who lost their Monero on
xmrwallet[.]comare. We are researchers. We document. We publish. We archive. That's what we do.What you are looking at is a flat evidence file. Screenshots. Emails. Timestamps. Hashes. Every claim sourced, every exhibit fingerprinted, every lie cross-referenced against the liar's own words.
NameSilo, LLC (IANA #1479) and the operator have spent eight years pressing the "report" button on every platform that hosts the truth about them. They deleted GitHub issues. They mass-reported victim reviews. They filed fake DMCAs. They got our Twitter locked. They're trying to delist us from Bing right now. They have never — not once, in eight years — produced a single technical rebuttal. Not one line of code. Not one network capture. Not one counter-argument. Just the report button, over and over, on every surface they can reach.
That is not the behavior of people who have been falsely accused. That is the behavior of people who know exactly what they did and have no answer except to make the evidence disappear.
It's not disappearing. This repo is mirrored, hashed, archived, pinned to IPFS, and spread across jurisdictions they'd need a dozen separate legal actions to touch. Every takedown attempt gets logged as another entry in
PRESSURE.md. Every deleted review gets noted inVICTIMS.md. Every fake DMCA gets documented inSECURITY.md.They're not erasing anything. They're building our case for us.
This is the immutable, court-usable case file for what NameSilo, LLC (IANA #1479) did when caught defending a Monero theft operation that has been live for roughly ten years and stolen an estimated $10M-$20M in user funds.
NameSilo, LLC (IANA #1479) did not ignore our reports — that would be ordinary registrar negligence. NameSilo, LLC (IANA #1479) went publicly on the record to call the operator "the victim," to deny ever receiving any of our 20+ delivery-receipted abuse reports, and to commit — in writing, on Twitter — to helping the operator scrub his security detections from VirusTotal.
When we proved every sentence of that statement was false, the takedown started.
Our research account was locked. Our domain has been targeted with Bing delisting attempts. They are still lying. They are still trying to erase this story.
So this repository exists. Mirrored. Hashed. Permanently archived. Not deletable.
This is NameSilo's official corporate tweet of March 13, 2026 — published under our investigation thread, defending a confirmed $20M crypto drainer. Four sentences. Four lies. Permanently archived: ghostarchive.org/archive/CXXZ0
NameSilo, LLC (IANA #1479) (@namesilo), replying to @Phish_Destroy — March 13, 2026. 11K views. They chose to put this in public. It stays in public.
We confronted them the day before this tweet: "9 reports is no joke anymore." Their response was not to act on the reports — it was to publicly defend the scammer. Two days later, we called it what it was:
@Phish_Destroy, March 16, 2026 — "NameSilo, LLC (IANA #1479) is acting as press secretary for a $2M+ Monero theft operation." These tweets are now invisible because the account was locked.
The operator wrote to us first — February 16, 2026, from royn5094@protonmail.com. He defended the site as his own work. He never claimed a hack. This email alone destroys NameSilo's "domain was compromised" narrative.
The operator, in his own words: "There is no phishing going on with xmrwallet.com." He never claimed a hack. NameSilo, LLC (IANA #1479) invented the "compromise" story 25 days later.
We replied the same day with a complete technical breakdown — 8 PHP endpoints, session_key exfiltration, raw_tx_and_hash.raw = 0 — and an explicit warning:
"What happens next depends entirely on how you choose to proceed." — PhishDestroy, Feb 16. He chose to keep lying. His registrar chose to help.
After we posted the receipts publicly and escalated to ICANN, our account was permanently locked. X's own automation reviewed the appeal and wrote back in writing:
X Support, April 15, 2026: "No violation. Restored to full functionality." The account is still locked. The Gold subscription is still being billed. A human agent at X — accessible via NameSilo's paid Gold Checkmark support channel — overrode the machine.
Concierge censorship that you can buy. Full breakdown: PRESSURE.md
"Who is this operator to you?" — @Phish_Destroy, March 16. 72 likes, 7.9K views. Never answered. Then our account was locked.
These are from the GhostArchive snapshot taken before they started deleting. The full tweet thread, archived March 16, 2026. NameSilo's official reply is visible. Our responses are visible. The timestamps are visible. Everything they tried to make disappear is right here.
GhostArchive — our original tweet confronting NameSilo, March 12. "9 reports is no joke anymore. Stop letting this old man scam people." Below it: NameSilo's official reply with the four lies. Archived before they could touch it.
The full NameSilo, LLC (IANA #1479) tweet — every word. "The registrant is also working to get the website delisted from VT reports." A registrar helping a scammer erase security warnings. They said this. Out loud. 11.3K people saw it.
These tweets were published on @Phish_Destroy on March 14, 2026 — two days before the account was locked. They confronted NameSilo directly, called out the lies, and documented everything. NameSilo's response was not to answer — it was to get the account locked.
@Phish_Destroy, March 14: "The 'hack' story is a lie, and the claim that there were no earlier reports is also a lie. Reports from PhishDestroy existed, and this can be verified even through public tweets. So good luck to you and your Russian scammer."
@Phish_Destroy, March 14: "Your abuse department is a disgrace. For 10 years you have been protecting a scammer, and even now you have done absolutely nothing. What is happening here is illegal." Plus: the GitHub PR screenshot — "We believe that truth is better than your profit."
@Phish_Destroy, March 14: "New service from NameSilo: helping scammers get VirusTotal bans removed." The infographic shows the cycle: Abuse Report filed → Complaint Filed → Abuse Report Ignored → NameSilo: "the domain was compromised" → "working to get delisted from VT." All while archived snapshots from 2021-2022 prove the malicious activity was always there.
A scammer running a ten-year crypto drainer, on $550-a-month bulletproof hosting in Belize, behind Russian DDoS-Guard, wrote to us on February 17, 2026: "Feel free to subpoena the domain registrar for my information." Twenty-four days later, on March 13, 2026, that same registrar — NameSilo, LLC (IANA #1479) — published an official tweet calling him "the victim" of a hypothetical hack, denying our 20+ abuse reports ever arrived, and announcing a public commitment to clean up his VirusTotal detections. Three other registrars (PDR, WebNic, NICENIC) holding the same domain looked at the same evidence and suspended in days. NameSilo, LLC (IANA #1479) wrote a press release for him. They put the connection in public themselves. This repository is the receipts.
Full evidence chain:
CONNECTION.md
| NameSilo's claim | Reality | Verdict |
|---|---|---|
| "Domain was compromised a few months ago." | The theft code is the website. 8 PHP endpoints, server-side session_key exfiltration, raw_tx_and_hash.raw = 0. Built to steal from day one, ~10 years. The operator never claimed a hack in his own emails. |
FALSE |
| "Prior to that, we had received no abuse reports." | 20+ delivery-receipted abuse reports through their own portal, 2023-2026. Our tweet from one day before their statement says "9 reports is no joke anymore." | FALSE |
| "After an extensive review... not involving the registrant." | The operator wrote to us defending his code as his own. NameSilo, LLC (IANA #1479) adopted a "compromise" framing the operator himself never advanced. | FALSE |
| "Working with the registrant to remove the website from VT reports." | A registrar helping a confirmed scammer erase his security warnings from 6+ authoritative vendors. Not abuse handling. Active obstruction of consumer-protection telemetry. | DAMNING |
Full line-by-line breakdown:
THE-LIES.md
The moment we replied with the operator's own emails, the silencing started. They have not stopped.
| Date | What happened | Status |
|---|---|---|
| 2026-03-13 | NameSilo, LLC (IANA #1479) publishes the four-lie defense | Archived forever |
| 2026-03-16 | We post the receipts — "@NameSilo is lying" | Tweets now invisible (account locked) |
| 2026-03-18 | We escalate to ICANN + law enforcement | On record |
| 2026-03-?? | @Phish_Destroy permanently locked via Gold Checkmark live-support | Still locked |
| 2026-04-15 | X automation: "no violation, restored" | Lock not lifted. Gold still billed. |
| Ongoing | Bing search delisting of phishdestroy.io |
Tracking |
| Ongoing | DDoS from "njan la" reseller infrastructure | Mitigated |
| 8 years | Operator: fake DMCA, mass-report reviews, delete GitHub issues, 50+ paid SEO articles to bury victims | Documented |
Full timeline:
PRESSURE.md· Operator's 8-year suppression history:OPERATOR_PROFILE.md
.
├── README.md <- you are here (landing page with key evidence)
├── PROOFS.md <- MASTER INDEX: every piece of evidence, every mirror
├── ARTICLE_FULL.md <- full long-form article (mirror of Medium / phishdestroy.io)
├── CONNECTION.md <- evidence chain: NameSilo, LLC (IANA #1479) <-> xmrwallet operator
├── THE-LIES.md <- line-by-line debunking of NameSilo's March 13 statement
├── PRESSURE.md <- silencing attempts, dated, still-ongoing
├── SCAM_TECHNICAL.md <- full technical investigation (viewkey x40/session, 8 endpoints, IOCs)
├── XMRWALLET_TECHNICAL.md <- server-side key drainer summary (case-file format)
├── OPERATOR_PROFILE.md <- complete operator dossier (identity, domains, IPs, victims, IOCs)
├── VICTIMS.md <- documented victims, full 2016-2026 timeline, scoreboard
├── EVIDENCE_INDEX.md <- every screenshot, indexed, with section + date + sha256
├── MEDIUM_MIRROR.md <- all Medium articles + pre-formed Wayback save URLs
├── TWITTER_ARCHIVE.md <- @Phish_Destroy archive methodology & tooling
├── SOURCES.md <- permanent archive URLs for every external claim
├── EVIDENCE_HASHES.txt <- SHA-256 of every screenshot (verify with sha256sum -c)
├── LICENSE <- CC-BY-4.0 + explicit grant for legal/regulatory use
├── SECURITY.md <- how victims and researchers can report
├── CITATION.cff <- machine-readable citation for academic / legal use
├── DEPLOY.md <- push + IPFS/Arweave pinning + mass archive submission
├── .github/ISSUE_TEMPLATE/ <- templates for victim reports and additional evidence
├── evidence/ <- 10 screenshots, descriptive filenames, SHA-256 verified
├── tools/ <- reproducible Twitter archive tooling (Wayback / archive.ph / DDG)
└── docs/ <- GitHub Pages mirror — fully SEO-optimized static site
Where do I start? Open
PROOFS.md— every piece of evidence and every mirror in one place. That is the file to share if you only have one URL.
Every screenshot in evidence/ has a SHA-256 fingerprint in EVIDENCE_HASHES.txt. To check that nothing has been tampered with:
git clone https://github.com/phishdestroy/namesilo-evidence.git
cd namesilo-evidence/evidence
sha256sum -c ../EVIDENCE_HASHES.txtAll 10 files should report OK. If any fails, do not trust the modified copy — open an Issue and we will investigate.
If you have lost funds to xmrwallet[.]com, this repository is a ready-made evidence package you can attach to:
- A police report (in any jurisdiction)
- An IC3 (FBI) cybercrime complaint — https://www.ic3.gov
- A FTC complaint — https://reportfraud.ftc.gov
- An ICANN Contractual Compliance complaint against NameSilo, LLC (IANA #1479) — https://www.icann.org/compliance
- A civil claim against NameSilo, LLC (IANA #1479) and/or the operator
- A chargeback / insurance filing
The license file in this repo (LICENSE) is explicit, written consent to use this evidence as-is in any of the above. No further authorization required from PhishDestroy.
Direct contact for victims: report@phishdestroy.io
Open an Issue using the Victim Report template if you want your case added to the public ledger.
Documented victims and the full 2016-2026 timeline:
VICTIMS.md
The full case file was forwarded to ICANN Contractual Compliance on March 18, 2026. This repository is the public mirror of that filing, with the same screenshots, the same hashes, and the same explicit consent for republication.
If you need additional materials (raw email headers, server-side capture of the eight xmrwallet[.]com PHP endpoints, the 20+ historical abuse-report delivery receipts to NameSilo, LLC (IANA #1479) dating back to 2023), contact abuse@phishdestroy.io with a subject line that identifies your role.
NameSilo, LLC (IANA #1479) is tied — in our records — to hundreds of active crypto-scam domains targeting US users. Across two years of work we have submitted thousands of abuse reports through their portal. The pattern, consistently, is silence.
xmrwallet[.]com is the case where they broke their silence. They went on the record. They put a defense of a confirmed scammer in their own corporate voice, on a public channel, with an offer to help him erase his security record.
This is not a single registrar making a single review error. This is a registrar publishing a corporate policy of protecting a specific operator — and using paid platform-level access (X Gold Checkmark live support) to silence the people who proved them wrong.
If a registrar can do this once, in public, and walk it off — every other registrar learns the lesson.
So this case is not going to walk off.
This story is being kept alive in multiple places, intentionally:
- Canonical: phishdestroy.io/namesilo-killed-our-twitter
- Medium: phishdestroy.medium.com/namesilo-lied-to-defend-a-20m-crypto-scam
- GitHub Pages mirror:
docs/index.html(deploy via Settings -> Pages -> /docs) - GhostArchive (NameSilo's tweet): ghostarchive.org/archive/CXXZ0
- GitHub evidence repo (this one): the file you are reading right now
- IPFS / Arweave: CID and TX ID published after pinning (see
DEPLOY.md)
Cut down one link. Five more grow back. We run on the Hydra principle.
Scammers delete evidence. NameSilo, LLC (IANA #1479) defended one. X locked our account. Bing is delisting us. The archive remains. The truth remains. We remain.
PhishDestroy Research · phishdestroy.io · abuse@phishdestroy.io











