The Wayback Machine - https://github.com/phishdestroy/namesilo-evidence
Skip to content

phishdestroy/namesilo-evidence

Folders and files

NameName
Last commit message
Last commit date

Latest commit

44518ed · May 8, 2026

History

13 Commits
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026
May 8, 2026

Repository files navigation

NameSilo, LLC (IANA #1479) Is Protecting xmrwallet[.]com

A US ICANN-accredited registrar publicly defended a 10-year, $20M Monero drainer — and is still actively trying to erase the evidence.

NameSilo, LLC really doesn't like this text. Not because it's false — because they wrote the original themselves. Their official tweet defending a $20M Monero drainer is Exhibit A below. Since they can't dispute the evidence, they dispute the existence of anyone who publishes it: mass complaints to X/Twitter (our account locked — X cleared us in writing, lock stayed), Bing and Google delisting requests against phishdestroy.io, and the operator's lifetime hobby — mass-reporting real victim reviews on Trustpilot (100+ removed reviews, partially verifiable via Web Archive and rating hash history — authorities can request Trustpilot's full deletion logs). Our Twitter threads tagging @NameSilo with abuse reports go back one and two years — they killed those accounts too. We have copies of everything. Their entire strategy right now is simple: don't answer for what they're part of and erase every trace that it happened. It's not working.

Master proof index →  ·  Full article →  ·  The Connection →  ·  The Lies →  ·  Pressure Campaign →  ·  Technical breakdown →  ·  Operator dossier →  ·  Victims & timeline →  ·  Evidence Index →

License: CC BY 4.0 Evidence: SHA-256 verified Mirror: GitHub Pages Canonical: phishdestroy.io


A note on what you're reading and why we were ready.

We knew the operator's playbook before NameSilo, LLC (IANA #1479) ever opened their mouth. We'd been watching since 2016. We'd seen him delete real victim reviews off Trustpilot. We'd seen the fake DMCAs on GitHub. We'd seen the puppet Twitter accounts mass-reporting researchers. We'd seen the 50+ paid SEO articles burying the complaints. We'd seen him scrub BitcoinTalk threads, nuke YouTube videos, wipe Reddit posts. Eight years of the same pattern: never answer the evidence, just make the person who published it disappear.

So when NameSilo, LLC (IANA #1479) posted their official defense of him — four sentences, four lies, on a public channel, from a verified corporate account — we didn't panic. We archived it. Instantly. GhostArchive, Wayback, local capture, SHA-256 hash. Before they could blink. Because we already knew this registrar was going to do exactly what the scammer always does: try to erase the receipts. They did. On schedule. With their paid Gold Checkmark support channel on X.

They think they're clever. They're not. They're predictable. Every move they've made, we anticipated. Every surface they've taken down, we'd already mirrored. Every complaint they've filed, we've logged. They operate like the evidence will eventually go away. It won't.

One more thing: the $10M-$20M number is a floor, not a ceiling. Eight years, thousands of wallets, operator-side key exfiltration on every single login — the real number is significantly higher. We use the conservative estimate because we only publish what we can prove. But we know. And the on-chain analysis, when it's complete, is going to make this README look like the opening statement.

And to NameSilo, LLC (IANA #1479): you publicly committed — in writing, from your official account — to helping a confirmed scammer get his VirusTotal detections removed. You said that. Out loud. On the internet. While the drainer was still live. You really thought nobody would keep the receipt?

Let's get one thing straight. This is not a cry for help. We don't need sympathy, petitions, or outrage. We are not victims here — the people who lost their Monero on xmrwallet[.]com are. We are researchers. We document. We publish. We archive. That's what we do.

What you are looking at is a flat evidence file. Screenshots. Emails. Timestamps. Hashes. Every claim sourced, every exhibit fingerprinted, every lie cross-referenced against the liar's own words.

NameSilo, LLC (IANA #1479) and the operator have spent eight years pressing the "report" button on every platform that hosts the truth about them. They deleted GitHub issues. They mass-reported victim reviews. They filed fake DMCAs. They got our Twitter locked. They're trying to delist us from Bing right now. They have never — not once, in eight years — produced a single technical rebuttal. Not one line of code. Not one network capture. Not one counter-argument. Just the report button, over and over, on every surface they can reach.

That is not the behavior of people who have been falsely accused. That is the behavior of people who know exactly what they did and have no answer except to make the evidence disappear.

It's not disappearing. This repo is mirrored, hashed, archived, pinned to IPFS, and spread across jurisdictions they'd need a dozen separate legal actions to touch. Every takedown attempt gets logged as another entry in PRESSURE.md. Every deleted review gets noted in VICTIMS.md. Every fake DMCA gets documented in SECURITY.md.

They're not erasing anything. They're building our case for us.


What this repository is

This is the immutable, court-usable case file for what NameSilo, LLC (IANA #1479) did when caught defending a Monero theft operation that has been live for roughly ten years and stolen an estimated $10M-$20M in user funds.

NameSilo, LLC (IANA #1479) did not ignore our reports — that would be ordinary registrar negligence. NameSilo, LLC (IANA #1479) went publicly on the record to call the operator "the victim," to deny ever receiving any of our 20+ delivery-receipted abuse reports, and to commit — in writing, on Twitter — to helping the operator scrub his security detections from VirusTotal.

When we proved every sentence of that statement was false, the takedown started.

Our research account was locked. Our domain has been targeted with Bing delisting attempts. They are still lying. They are still trying to erase this story.

So this repository exists. Mirrored. Hashed. Permanently archived. Not deletable.


Exhibit A — NameSilo's lie, in their own words

This is NameSilo's official corporate tweet of March 13, 2026 — published under our investigation thread, defending a confirmed $20M crypto drainer. Four sentences. Four lies. Permanently archived: ghostarchive.org/archive/CXXZ0

NameSilo's official corporate tweet of March 13 2026 — calling the xmrwallet operator the victim, denying 20+ abuse reports, and committing to help scrub VirusTotal detections

NameSilo, LLC (IANA #1479) (@namesilo), replying to @Phish_Destroy — March 13, 2026. 11K views. They chose to put this in public. It stays in public.

We confronted them the day before this tweet: "9 reports is no joke anymore." Their response was not to act on the reports — it was to publicly defend the scammer. Two days later, we called it what it was:

PhishDestroy rebuttal thread — NameSilo, LLC (IANA #1479) is acting as press secretary for a 2M+ Monero theft operation. 6 security vendors flag it. 3 registrars suspended it.

@Phish_Destroy, March 16, 2026 — "NameSilo, LLC (IANA #1479) is acting as press secretary for a $2M+ Monero theft operation." These tweets are now invisible because the account was locked.


Exhibit B — The operator's own email, proving NameSilo, LLC (IANA #1479) lied

The operator wrote to us first — February 16, 2026, from royn5094@protonmail.com. He defended the site as his own work. He never claimed a hack. This email alone destroys NameSilo's "domain was compromised" narrative.

Email from the xmrwallet operator nathroy, February 16 2026 — defending the site, claiming no phishing, asking PhishDestroy to remove the report. He never claims a hack.

The operator, in his own words: "There is no phishing going on with xmrwallet.com." He never claimed a hack. NameSilo, LLC (IANA #1479) invented the "compromise" story 25 days later.

We replied the same day with a complete technical breakdown — 8 PHP endpoints, session_key exfiltration, raw_tx_and_hash.raw = 0 — and an explicit warning:

PhishDestroy technical reply to the operator, February 16 2026 — documenting session_key viewkey exfiltration, production-only parameters, and the warning: What happens next depends entirely on how you choose to proceed.

"What happens next depends entirely on how you choose to proceed." — PhishDestroy, Feb 16. He chose to keep lying. His registrar chose to help.


Exhibit C — They silenced us. X cleared us. The lock stayed.

After we posted the receipts publicly and escalated to ICANN, our account was permanently locked. X's own automation reviewed the appeal and wrote back in writing:

X Support email, April 15 2026: Our automated systems have determined there was no violation and have restored your account to full functionality.

X Support email subject line: Your account has been restored, April 15 2026

X Support, April 15, 2026: "No violation. Restored to full functionality." The account is still locked. The Gold subscription is still being billed. A human agent at X — accessible via NameSilo's paid Gold Checkmark support channel — overrode the machine.

Concierge censorship that you can buy. Full breakdown: PRESSURE.md


Exhibit D — The question they never answered

PhishDestroy tweet: Honest question for NameSilo, LLC (IANA #1479) — Who is this operator to you? Employee? Contractor? Friend of support staff? Relative? Because he told us subpoena the registrar like a man who already had your answer.

"Who is this operator to you?" — @Phish_Destroy, March 16. 72 likes, 7.9K views. Never answered. Then our account was locked.


Exhibit E — The GhostArchive receipts (they can't delete these)

These are from the GhostArchive snapshot taken before they started deleting. The full tweet thread, archived March 16, 2026. NameSilo's official reply is visible. Our responses are visible. The timestamps are visible. Everything they tried to make disappear is right here.

GhostArchive snapshot — @Phish_Destroy confronting @namesilo on March 12: 9 reports is no joke anymore. Stop letting this old man scam people. NiceNIC, WebNic, Key-Systems, PDR all banned his domains. NameSilo protects him. XMRWallet.com SCAM banner visible.

GhostArchive — our original tweet confronting NameSilo, March 12. "9 reports is no joke anymore. Stop letting this old man scam people." Below it: NameSilo's official reply with the four lies. Archived before they could touch it.

GhostArchive snapshot — NameSilo's full official reply: Our Abuse team conducted an in-depth review... domain was compromised... no abuse reports received... working to get website delisted from VT reports. 8:08 PM March 12, 2026. 11.3K views.

The full NameSilo, LLC (IANA #1479) tweet — every word. "The registrant is also working to get the website delisted from VT reports." A registrar helping a scammer erase security warnings. They said this. Out loud. 11.3K people saw it.

Exhibit F — The thread they killed (archived copies)

These tweets were published on @Phish_Destroy on March 14, 2026 — two days before the account was locked. They confronted NameSilo directly, called out the lies, and documented everything. NameSilo's response was not to answer — it was to get the account locked.

Tweet thread March 14 — I am not going to prove anything further to the registrar. Google exists, the public record exists. The hack story is a lie and the claim that there were no earlier reports is also a lie. Reports from PhishDestroy existed. Good luck to you and your Russian scammer.

@Phish_Destroy, March 14: "The 'hack' story is a lie, and the claim that there were no earlier reports is also a lie. Reports from PhishDestroy existed, and this can be verified even through public tweets. So good luck to you and your Russian scammer."

Tweet thread March 14 — Your abuse department is a disgrace. For 10 years you have been protecting a scammer. Do you not have enough evidence? What is happening here is illegal. This old lying Russian fraudster and his fake website are not some mystery.

@Phish_Destroy, March 14: "Your abuse department is a disgrace. For 10 years you have been protecting a scammer, and even now you have done absolutely nothing. What is happening here is illegal." Plus: the GitHub PR screenshot — "We believe that truth is better than your profit."

Tweet March 14 — New service from NameSilo: their abuse team is helping scammers get VirusTotal bans removed. I honestly thought that after NICENIC nothing could surprise me anymore — but you still managed to surprise me. Abuse Report Complaint Filed, Abuse Report Ignored infographic.

@Phish_Destroy, March 14: "New service from NameSilo: helping scammers get VirusTotal bans removed." The infographic shows the cycle: Abuse Report filed → Complaint Filed → Abuse Report Ignored → NameSilo: "the domain was compromised" → "working to get delisted from VT." All while archived snapshots from 2021-2022 prove the malicious activity was always there.


The connection — in one paragraph

A scammer running a ten-year crypto drainer, on $550-a-month bulletproof hosting in Belize, behind Russian DDoS-Guard, wrote to us on February 17, 2026: "Feel free to subpoena the domain registrar for my information." Twenty-four days later, on March 13, 2026, that same registrar — NameSilo, LLC (IANA #1479) — published an official tweet calling him "the victim" of a hypothetical hack, denying our 20+ abuse reports ever arrived, and announcing a public commitment to clean up his VirusTotal detections. Three other registrars (PDR, WebNic, NICENIC) holding the same domain looked at the same evidence and suspended in days. NameSilo, LLC (IANA #1479) wrote a press release for him. They put the connection in public themselves. This repository is the receipts.

Full evidence chain: CONNECTION.md


The lies — in one table

NameSilo's claim Reality Verdict
"Domain was compromised a few months ago." The theft code is the website. 8 PHP endpoints, server-side session_key exfiltration, raw_tx_and_hash.raw = 0. Built to steal from day one, ~10 years. The operator never claimed a hack in his own emails. FALSE
"Prior to that, we had received no abuse reports." 20+ delivery-receipted abuse reports through their own portal, 2023-2026. Our tweet from one day before their statement says "9 reports is no joke anymore." FALSE
"After an extensive review... not involving the registrant." The operator wrote to us defending his code as his own. NameSilo, LLC (IANA #1479) adopted a "compromise" framing the operator himself never advanced. FALSE
"Working with the registrant to remove the website from VT reports." A registrar helping a confirmed scammer erase his security warnings from 6+ authoritative vendors. Not abuse handling. Active obstruction of consumer-protection telemetry. DAMNING

Full line-by-line breakdown: THE-LIES.md


The pressure campaign — what they're still doing right now

The moment we replied with the operator's own emails, the silencing started. They have not stopped.

Date What happened Status
2026-03-13 NameSilo, LLC (IANA #1479) publishes the four-lie defense Archived forever
2026-03-16 We post the receipts — "@NameSilo is lying" Tweets now invisible (account locked)
2026-03-18 We escalate to ICANN + law enforcement On record
2026-03-?? @Phish_Destroy permanently locked via Gold Checkmark live-support Still locked
2026-04-15 X automation: "no violation, restored" Lock not lifted. Gold still billed.
Ongoing Bing search delisting of phishdestroy.io Tracking
Ongoing DDoS from "njan la" reseller infrastructure Mitigated
8 years Operator: fake DMCA, mass-report reviews, delete GitHub issues, 50+ paid SEO articles to bury victims Documented

Full timeline: PRESSURE.md · Operator's 8-year suppression history: OPERATOR_PROFILE.md


What's in this repository

.
├── README.md                  <- you are here (landing page with key evidence)
├── PROOFS.md                  <- MASTER INDEX: every piece of evidence, every mirror
├── ARTICLE_FULL.md            <- full long-form article (mirror of Medium / phishdestroy.io)
├── CONNECTION.md              <- evidence chain: NameSilo, LLC (IANA #1479) <-> xmrwallet operator
├── THE-LIES.md                <- line-by-line debunking of NameSilo's March 13 statement
├── PRESSURE.md                <- silencing attempts, dated, still-ongoing
├── SCAM_TECHNICAL.md          <- full technical investigation (viewkey x40/session, 8 endpoints, IOCs)
├── XMRWALLET_TECHNICAL.md     <- server-side key drainer summary (case-file format)
├── OPERATOR_PROFILE.md        <- complete operator dossier (identity, domains, IPs, victims, IOCs)
├── VICTIMS.md                 <- documented victims, full 2016-2026 timeline, scoreboard
├── EVIDENCE_INDEX.md          <- every screenshot, indexed, with section + date + sha256
├── MEDIUM_MIRROR.md           <- all Medium articles + pre-formed Wayback save URLs
├── TWITTER_ARCHIVE.md         <- @Phish_Destroy archive methodology & tooling
├── SOURCES.md                 <- permanent archive URLs for every external claim
├── EVIDENCE_HASHES.txt        <- SHA-256 of every screenshot (verify with sha256sum -c)
├── LICENSE                    <- CC-BY-4.0 + explicit grant for legal/regulatory use
├── SECURITY.md                <- how victims and researchers can report
├── CITATION.cff               <- machine-readable citation for academic / legal use
├── DEPLOY.md                  <- push + IPFS/Arweave pinning + mass archive submission
├── .github/ISSUE_TEMPLATE/    <- templates for victim reports and additional evidence
├── evidence/                  <- 10 screenshots, descriptive filenames, SHA-256 verified
├── tools/                     <- reproducible Twitter archive tooling (Wayback / archive.ph / DDG)
└── docs/                      <- GitHub Pages mirror — fully SEO-optimized static site

Where do I start? Open PROOFS.md — every piece of evidence and every mirror in one place. That is the file to share if you only have one URL.


Verify the evidence yourself

Every screenshot in evidence/ has a SHA-256 fingerprint in EVIDENCE_HASHES.txt. To check that nothing has been tampered with:

git clone https://github.com/phishdestroy/namesilo-evidence.git
cd namesilo-evidence/evidence
sha256sum -c ../EVIDENCE_HASHES.txt

All 10 files should report OK. If any fails, do not trust the modified copy — open an Issue and we will investigate.


For victims of xmrwallet[.]com

If you have lost funds to xmrwallet[.]com, this repository is a ready-made evidence package you can attach to:

The license file in this repo (LICENSE) is explicit, written consent to use this evidence as-is in any of the above. No further authorization required from PhishDestroy.

Direct contact for victims: report@phishdestroy.io

Open an Issue using the Victim Report template if you want your case added to the public ledger.

Documented victims and the full 2016-2026 timeline: VICTIMS.md


For ICANN compliance officers, regulators, journalists

The full case file was forwarded to ICANN Contractual Compliance on March 18, 2026. This repository is the public mirror of that filing, with the same screenshots, the same hashes, and the same explicit consent for republication.

If you need additional materials (raw email headers, server-side capture of the eight xmrwallet[.]com PHP endpoints, the 20+ historical abuse-report delivery receipts to NameSilo, LLC (IANA #1479) dating back to 2023), contact abuse@phishdestroy.io with a subject line that identifies your role.


Why this matters beyond one domain

NameSilo, LLC (IANA #1479) is tied — in our records — to hundreds of active crypto-scam domains targeting US users. Across two years of work we have submitted thousands of abuse reports through their portal. The pattern, consistently, is silence.

xmrwallet[.]com is the case where they broke their silence. They went on the record. They put a defense of a confirmed scammer in their own corporate voice, on a public channel, with an offer to help him erase his security record.

This is not a single registrar making a single review error. This is a registrar publishing a corporate policy of protecting a specific operator — and using paid platform-level access (X Gold Checkmark live support) to silence the people who proved them wrong.

If a registrar can do this once, in public, and walk it off — every other registrar learns the lesson.

So this case is not going to walk off.


Mirrors

This story is being kept alive in multiple places, intentionally:

Cut down one link. Five more grow back. We run on the Hydra principle.


Scammers delete evidence. NameSilo, LLC (IANA #1479) defended one. X locked our account. Bing is delisting us. The archive remains. The truth remains. We remain.

PhishDestroy Research · phishdestroy.io · abuse@phishdestroy.io

About

NameSilo defended a $20M Monero drainer, lied about 20+ abuse reports, helped scrub VirusTotal, then silenced us on X. X cleared us — lock stayed. Full evidence, SHA-256 verified, court-ready.

Topics

Resources

License

Security policy

Citation

Loading

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 1