Evidence Archive

Every screenshot, every email, every article — preserved here because the operator and his registrar have a history of making evidence disappear. SHA-256 hashes for every file are in EVIDENCE_HASHES.txt.

MAY 9, 2026 — xmrwallet.com IS STILL ACTIVE. NAMESILO DOES NOT CARE.

NameSilo, LLC (IANA #1479) is indifferent to laws, regulations, and the rights of victims when it comes to protecting this scam. The site remains live. Dozens of abuse reports — ignored. VirusTotal detections from multiple security vendors — ignored. Documented victims with specific loss amounts — ignored. Operator emails admitting control — ignored. SHA-256 verified evidence — ignored. ICANN Compliance filing — ignored. Public exposure on Twitter with 11K+ views — ignored. Their own 4-lie tweet debunked line by line — they don't care. The operator posted a "farewell letter" on May 5. The site is still up. People can still lose money right now.

We call on all victims to file complaints against NameSilo, LLC directly — not just the operator, but the registrar that knowingly protected him. File with ICANN, with your local law enforcement, with the FBI IC3, with European cybercrime units. NameSilo is a US company. They can be held accountable.

We have evidence of a direct Russian connection between the operator and the registrar. We have evidence that they are linked. Let them keep deleting each other's traces — they stole millions and they are clowns who think it won't catch up to them.

Contact us: abuse@phishdestroy.io — we will share what we know with any victim, investigator, or prosecutor.

Operator Emails

Direct correspondence with the xmrwallet operator

NameSilo's Public Statement

March 13, 2026 — 4 sentences, 4 lies

@Phish_Destroy Rebuttals

March 14-16, 2026 — before the account was locked

X Support Contradiction

April 15, 2026 — "No violation. Account restored." Still locked.

Platform & Infrastructure

PhishDestroy platform screenshot

Articles & Research

Mirrored articles — in case they try to delete these too

Medium Mirror

xmrwallet.com — The Full Exposé

Complete Medium article mirrored locally. Original: phishdestroy.medium.com

Research Post

xmrwallet Scam Exposed

Main exposé — theft mechanism, PHP endpoints, server-side TX hijacking.

Research Post

NameSilo xmrwallet Cover-Up

How the registrar publicly defended a $20M+ theft operation.

Research Post

Is xmrwallet Safe?

Safety analysis — why xmrwallet.com steals your Monero.

Research Post

Captcha Defeated

How we bypassed the operator's anti-analysis captcha.

Research Post

Nathalie Roy — Operator Identity

Investigation into the person behind xmrwallet.com.

Research Post

Deleted Evidence

What the operator erased — and what we cached before it disappeared.

Research Post

Safe Monero Wallet Alternatives

Recommended alternatives to xmrwallet.com.

Cached

All Deleted Evidence

GitHub issues, reviews, posts — everything the operator tried to erase.

Cached Issue

GitHub Issue #35

Deleted victim report — cached from GitHub before removal.

Cached Issue

GitHub Issue #36

Deleted victim report — cached from GitHub before removal.

Filing

ICANN Complaint

The formal complaint filed with ICANN Contractual Compliance.

Evidence Documents

Full case file — markdown, readable, linkable

Document

THE LIES

4 sentences, 4 lies — line-by-line debunking of NameSilo's tweet.

Document

PROOFS

SHA-256 verified evidence chain and proof documentation.

Document

OPERATOR PROFILE

Who is "N.R."? Infrastructure analysis and identification.

Document

PRESSURE CAMPAIGN

Every suppression attempt documented — Twitter, Bing, GitHub, YouTube.

Document

THE CONNECTION

What links the operator to NameSilo?

Document

TECHNICAL ANALYSIS

8 PHP endpoints, session_key exfiltration, server-side TX hijacking.

Document

FULL ARTICLE

Complete investigation article — everything in one document.

Document

TWITTER ARCHIVE

How @Phish_Destroy tweets were archived before the lock.

Document

SOURCES

All external references with immutable archive URLs.

Operator's "Farewell" — May 5, 2026

The operator posted a goodbye letter. 3 days ago. Read it carefully.

Deleted GitHub Issues — Wayback Proof

21+ issues deleted. The Wayback Machine remembers.

These issues were deleted by the operator to suppress victim reports and security analysis. The Wayback Machine captured them before deletion.

Wayback — Nov 23, 2020

Issue #11

Deleted by operator. Wayback Machine preserved snapshot.

Wayback — Nov 23, 2020

Issue #12

Deleted by operator. Wayback Machine preserved snapshot.

Wayback — Nov 23, 2020

Issue #13

Deleted by operator. Wayback Machine preserved snapshot.

Wayback — Nov 23, 2020

Issue #15

Deleted by operator. Wayback Machine preserved snapshot.

Cached — Feb 2026

Issue #35

Comprehensive fraud documentation. Deleted Feb 23, 2026. Our cached copy.

Cached — Feb 2026

Issue #36

Victim report with technical evidence. Deleted Feb 23, 2026. Our cached copy.

Community Reports — Reddit, uBlock, Forums

Independent reports from the community

Herald Sheets — Press

Bitazu Capital Founding Partner Loses $20,000 in XMR Using xmrwallet

Soro Singh (@singhsoro), founding partner of Bitazu Capital, lost $20,000 in XMR through xmrwallet.com. Independent press coverage. Note: @Herald_Sheets Twitter account — also deleted/suspended. Coincidence?

Twitter — DELETED

@singhsoro original tweet — September 2020

The original victim tweet by Soro Singh reporting $20K XMR theft from xmrwallet.com. Tweet deleted. The pattern continues: every victim who speaks up gets silenced. Freedom of speech — or freedom of scam for NameSilo?

Twitter — DELETED

@Herald_Sheets — press account gone too

Herald Sheets covered the Bitazu Capital $20K loss story. Their Twitter account is now gone. Another coincidence. How many accounts need to disappear before someone asks who's filing the reports?

Teletype — Feb 27, 2024

Victim report on Teletype: "$200K+ stolen"

Independent victim report on Teletype blogging platform: "Stole over 200 thousand dollars, please do not use this site." Posted February 2024 — a full year before our investigation went public.

Reddit r/Monero — Dec 2020

"xmrwallet.com is a scam"

Direct victim post on r/Monero from December 2020. Community knew for years. Nothing was done.

Reddit r/monerosupport — May 2021

"xmrwallet.com scam"

Victim report on Monero support subreddit. May 2021.

Reddit r/Monero — Aug 2022

"xmrwallet.com exit scam"

Community discussion about xmrwallet exit scam. August 2022 — years before our investigation.

Reddit r/monerosupport — Mar 2021

"xmrwallet.com — my wallet has been robbed"

Direct victim report: wallet robbed through xmrwallet.com. March 2021.

Reddit r/monerosupport — Dec 2022

"xmrwallet.com is scamming me"

Another victim. December 2022. The reports go back years. NameSilo claims "no abuse reports received."

Reddit r/Monero — Oct 2020

"PSA: xmrwallet.com is a scam who steals your funds"

Public Service Announcement. October 2020. Community knew. NameSilo knew. Nobody acted.

Reddit r/Monero — Nov 2020

"Do not use xmrwallet.com"

Community warning. November 2020.

Reddit r/Monero — Aug 2020

"28 XMR stolen from my wallet today"

28 XMR stolen. August 2020. Victim reports going back at least 6 years.

Reddit r/monerosupport — Jan 2021

"XMR wallet compromised — lost all XMR"

Lost everything. January 2021.

Reddit r/Monero — May 2021

"Can we all pressure as a community for Cloudflare..."

Community tried to get Cloudflare to act against xmrwallet. May 2021. Even the community knew infrastructure providers were complicit.

Reddit — All mentions

Full search: all xmrwallet.com threads

Dozens more. Operator u/WiseSolution banned from r/Monero in 2018.

BitcoinTalk

[WARNING] XMRWallet.com Scams — Stay vigilant!

Warning thread on BitcoinTalk. Community alert about xmrwallet theft.

BitcoinTalk — Dec 2025

"Lost ~400 XMR using xmrwallet.com"

isisB2B lost ~400 XMR (~$120K). Selective scam: test transactions passed, large transfer did not. December 2025.

BitcoinTalk — Dec 2020

"Question about xmrwallet.com safety"

Moderator response: "If it's a web wallet, they can steal your funds."

Sitejabber — 1.5/5 rating

xmrwallet.com Reviews — 590 XMR stolen

4 reviews, 1.5/5. Includes the largest documented single loss: 590 XMR (~$177K).

ScamAdviser — 1/100

xmrwallet.com — Trust Score: 1 out of 100

The lowest possible trust score from ScamAdviser.

Telegram — Apr 2026

Chinese victim — $3,250 stolen

Victim report in Chinese Monero Telegram group. $3,250 lost through xmrwallet.com.

bits.media (RU) — Dec 2020

xmrwallet.com SCAM / Мошенник

Russian-language victim report. 30 XMR stolen (~$9K). "Admin logs all seed phrases, receives real-time balance notifications. Deposited 30 XMR — within 5 hours transferred to unknown address." 3,800+ views. December 2020 — in Russian. The Russian trail was visible from the very beginning.

Scamy.io

xmrwallet.com — Security & Trust Analysis

Independent scam analysis. "Impersonating Monero is particularly dangerous."

Scam Detector

xmrwallet.com — Trust Score: 33.5/100

Scam Detector rates xmrwallet.com as "Medium Risk / Warning." Independent automated analysis.

uBlock Origin

uAssets Issue #25172 — xmrwallet.com added to blocklist

xmrwallet.com reported to and blocked by uBlock Origin — the most popular ad/malware blocker. Community confirmation of malicious classification.

TweetFeed IoC — Mar 16, 2026

xmrwallet.com logged in threat intel feed

Independent threat intelligence feed by @0xDanielLopez captured xmrwallet.com as IoC from tweet by @skocherhan (2026-03-16 13:57:36). The tweet existed. It's gone now. Freedom of speech — or freedom of scam?

Freedom of Speech — or Freedom of Scam?

A question for X and for anyone who investigates this.

Consider the pattern:

Every single account that publicly mentioned xmrwallet.com in a negative context has been silenced. Every one. The operator's Gold Checkmark corporate support channel overrides X's own automated moderation system. The lock persists even after X itself determined there was no violation. Our subscription is still being billed for an account we cannot access.

Given X's stated commitment to freedom of speech — who exactly is the operator's friend at X? Who processes these reports? Who overrides the automated "no violation" determination? This pattern warrants investigation: not by us, but by X's own trust and safety team, or by anyone with subpoena power.

Tweets about xmrwallet — check which ones survive:

Meanwhile, the operator's SEO spam bots from 2018:

Open each link. See which warnings survived and which didn't. Then check the spam bots — all alive. The pattern speaks for itself.

Our full tweet archive is publicly viewable: vanlett.com/Phish_Destroy — read every single tweet. Anti-phishing research, abuse reports to registrars, evidence documentation. NiceNIC investigation (476 likes, 192 RTs). NameSilo exposé threads. Not a single tweet violates any platform rule. Not one. This is what they locked.

Freedom of speech. Unless a scammer with a Gold Checkmark doesn't want you to speak.

"SEO Grandpa" — Operator's Google Drive Orders

Freelance article orders. On Google Drive. In plain sight.

The operator ordered paid SEO articles through Kwork, Freelancehunt, and intermediaries to bury victim complaints in search results. The orders — complete with article texts, link-building instructions, and presentation materials — are indexed on Google Drive in the open. This is why we call him "SEO Grandpa" — a decade-old scam propped up by mass-purchased low-quality backlinks, sponsored "reviews," and freelance article orders from CIS marketplaces. The design quality of his materials is notably reminiscent of NameSilo's legacy admin panel (circa 2011) — make of that what you will.

Google Drive owner: hassizabir@gmail.com — this email is listed as the owner of the SEO order files (last modified Oct 20, 2023). This is either the operator's real email, or the email of an intermediary who placed the article orders on behalf of the operator. Either way — it's on the record now.

Google Drive — Public

SEO Article Orders — Folder 1

Open folder with paid article texts and link-building orders for xmrwallet promotion. Publicly indexed.

Google Drive — Public

SEO Article Orders — Folder 2

Additional paid content orders. Same operator, same pattern.

Google Drive — Public

SEO Article Orders — Folder 3

More article texts and promotional materials ordered through freelance intermediaries.

Google Slides — Public

xmrwallet Presentation / Brief

Operator's promotional presentation — likely used for freelance article briefs. Design style notably similar to NameSilo's legacy admin panel (circa 2011).

Google Drawings — Public

xmrwallet Design / Graphics

Operator's design files. Open on Google Drive.

Google Forms — Public

xmrwallet Form / Survey

Operator's Google Form — possibly used for data collection or feedback faking.

Google Sites — Public

xmr-wallet1 — Google Sites Page

Operator's Google Sites landing page for xmrwallet. Part of the SEO spam network — low-quality pages designed to boost search rankings and redirect victims.

Wayback Machine Archives

Independent third-party snapshots — we don't control these

Archived by the Internet Archive independently. These prove what was online at the time of capture. If the originals are taken down, these remain.

Wayback — May 8, 2026

PhishDestroy GitHub Organization

Snapshot of the full GitHub org page with all public repositories.

Wayback — May 8, 2026

namesilo-evidence Repository

The complete evidence dossier repo as it appeared on GitHub.

Wayback — May 8, 2026

DO-NOT-USE-xmrwallet-com Repository

The xmrwallet investigation repo on GitHub.

Wayback — May 8, 2026

xmrwallet Research — GitHub Pages

The published research site as it appeared on GitHub Pages.

Wayback — Apr 11, 2026

xmrwallet.com — The Scam Site

Snapshot of the live scam site. Proof it was running, not "compromised." Code matches our analysis.

Wayback — Feb 20-23, 2026

xmrwallet.cc — Mirror Domain

Clone domain registered by the same operator. Identical code, identical theft mechanism. We got this one taken down.

Wayback — Feb 20, 2026

xmrwallet.biz — Mirror Domain

Another clone. Same operator, same code hash, same DDoS-Guard hosting. Taken down.

Wayback — Mar 12, 2026

xmrwallet.me — Mirror Domain

Yet another clone. All mirrors linked from the main site, all on bulletproof hosting, all with identical code.

GhostArchive

NameSilo's Tweet — Permanent Archive

The 4-lie tweet by NameSilo, LLC (IANA #1479). GhostArchive independent copy. 11.3K views.

Wayback Machine Screenshots — Victim Reports

Captured before deletion

Additional Screenshots & Technical Evidence

More evidence from the investigation

All Documents & Technical Files

Every file in the archive

Document

README — Main Evidence Repo

Full introduction, mirrors, hydra principle.

Document

XMRWALLET TECHNICAL

Full technical analysis of the theft mechanism.

Document

DEPLOY

Deployment, IPFS pinning, mass archive instructions.

Document

SECURITY

Security policy and responsible disclosure.

Document

EVIDENCE.md

Evidence directory index.

Document

ARCHIVED EVIDENCE INDEX

Full index of all archived sources — Wayback, Reddit, BitcoinTalk, Trustpilot, victim table.

Document

LOST FUNDS

Instructions for victims who lost funds.

Document

EVIDENCE HASHES (xmrwallet)

SHA-256 hashes for xmrwallet evidence files.

Document

Nathalie Roy — Operator Profile

Operator identification: GitHub nathroy, Reddit WiseSolution, royn5094@protonmail.com.

Document

Is xmrwallet Safe?

Safety analysis — no, it steals your keys.

Document

"Not a scam, trust me"

Operator's defense analyzed.

Document

Use getmonero.org Instead

Safe wallet recommendation.

Document

xmrwallet.com — Scam Analysis

Full scam documentation for the primary domain.

Document

xmrwallet.biz — Suspended

Clone domain takedown documentation.

Document

xmrwallet.cc — Suspended

Clone domain takedown.

Document

xmrwallet.onion — Tor Mirror

Onion domain analysis.

Document

Deleted Evidence Timeline

What the operator erased and when.

Document

Medium Article — Full Text (MD)

Complete Medium article in markdown format.

Technical

YOUR KEYS ARE MINE

Key theft proof-of-concept documentation.

Technical

captcha.js Source

Operator's captcha code — extracted and analyzed.

Technical

Files That Should Exist But Don't

Missing files in operator's GitHub vs production — proof of code divergence.

Tools

Investigation Tools

Tools used in the investigation.

NameSilo Domain Anomaly Report

5.1 million domains analyzed. 32% are dead. $12M wasted.

We analyzed all 5,179,405 NameSilo domains against 7 other registrars (130M+ total). NameSilo's dead domain rate is 2x the industry baseline — 32.2% vs 15-21%. Dead registrations spiked 7x between 2023 and 2024. Bulk runs of 10,000-17,000 domains/day. 96% have no contact email. Consistent with money laundering, self-dealing, or revenue inflation.

Report

Full Anomaly Analysis

130M+ domains, 8 registrars, detailed tables and findings.

Data

Download All 5.1M Domains (54MB gz)

Complete dataset: domain, registration/expiry dates, IP, email, phone, Majestic rank.

Hashes

Complete SHA-256 Manifest

36 evidence files, all hashed individually.

Company valuation: NameSilo Technologies Corp. (CSE: URL) — market cap $112M, revenue C$65.5M, net margin 1.7%, P/E 143.8x (industry avg 21x). A $112M company protecting a $100M+ theft operation.

Design comparison: NameSilo's admin panel looks like it was built in 2011 — and never updated. Compare it to fd.nic.ru (Russian registrar). Remarkably similar. Same era, same aesthetic, same audience.

Evidence: Namesilo domain console
NameSilo Console
Evidence: NameSilo Domain Manager UI
NameSilo Manager
Evidence: Namesilo Manage DNS
NameSilo DNS
Evidence: NameSilo Domain Defender
NameSilo Defender
Tweet Archive — 31 Screenshots

@Phish_Destroy tweets — before X locked our account

All captured from vanlett.com/Phish_Destroy. Full tweet archive of our investigation. Not a single rule violated.

Evidence: Screenshot 1 Evidence: Screenshot 2 Evidence: Screenshot 3 Evidence: Screenshot 4 Evidence: Screenshot 5 Evidence: Screenshot 6 Evidence: Screenshot 7 Evidence: Screenshot 8 Evidence: Screenshot 9 Evidence: Screenshot 10 Evidence: Screenshot 11 Evidence: Screenshot 15 Evidence: Screenshot 16 Evidence: Screenshot 17 Evidence: Screenshot 18 Evidence: Screenshot 20 Evidence: Screenshot 21 Evidence: Screenshot 24 Evidence: Screenshot 25 Evidence: Screenshot 26 Evidence: Screenshot 27 Evidence: Screenshot 28 Evidence: Screenshot 29 Evidence: Screenshot 30 Evidence: Screenshot 31
Integrity Verification

SHA-256 fingerprints — tamper-proof

Every screenshot was hashed at the moment of capture. If any file has been modified, the hash won't match. Verify: cd evidence && sha256sum -c ../EVIDENCE_HASHES.txt

36 evidence files total. Full manifest: ALL_EVIDENCE_HASHES.txt · Original subset: EVIDENCE_HASHES.txt

FileSHA-256
PRIMARY EVIDENCE
01-operator-email-feb16.png919b5ee4c0f3a889381c644b557736d35625c69abaddd0ec7a8251eb514b0111
01-phishdestroy-reply-feb16.pngecced35149dbf19dff7399cd86708d28aff7b8ab044e132c4c92cafbe222a753
03-namesilo-statement-mar13.pngad29e1d3d4803ff37c88ef860bef6de9e62f6ce533657f2e5c5460eb2e0b8ebf
04-tweet-cryptopus-quote.png6ffd3020793e9d850f0f10f7b4406b165e7d266d692a647ecb24eab9840e7f7f
04-tweet-honest-question.pngbbb0ecd0b7164bf91ace59bc0de01ae953a828a34765b36b89e07479e76ee674
04-tweet-namesilo-is-lying.pngc556e13ff0e4265cbba76b6a518f0862dee67467c1b264181e27eef8046eda6a
04-tweet-press-secretary.pngc9007cb4acf1a264fb82e36a57708a1c35e4b6824eb2734a6a7dff095588bd84
05-tweet-scam-banner-registrars.png6102d6c10b96e0035a90efaf2ba7f62a81f39d9ecadd2df73deced9985c6398d
06-x-support-no-violation.png2753d02ffeb1b2853bdc33ddec888e3652d9d3829b265e1228c8f28b53b86efa
06-x-support-subject-restored.png482d0ebba1656c3b338957e40cda0abc7a0017eb6ad08f2a0d639468298ccaf3
09-phishdestroy-platform.pngde5b430bb4cad5a422ddf1bb6a8c348fffdf0673e7ea8bfface4fb312f46b087
12-ghostarchive-namesilo-tweet-top.pnge7afa63c39dcd9392e0b8d3def6c21d520bea820e885df4cb6a01b323579f952
13-ghostarchive-namesilo-tweet-full.png94770cd763cded626365d9bcdf2c987b8d38cb0427dcf68835f7022522477c04
14-tweet-thread-mar14-lies-exposed.pnge26ca5edc2132806614d563673b7342b00bd77cd6f019d8bd34635fae8a1c34d
15-tweet-thread-mar14-abuse-dept-disgrace.pngaa6422a5ab92f39410e3d7dd0d72f6cf220564601968fe38442353d0d389ef73
16-tweet-mar14-vt-delisting-service.png7eb010e8255a81160c765cd1849f2793df407bbe2e4723c8914f8d63297bef50
INVESTIGATION SCREENSHOTS
bitcointalk_400xmr.pngb99cec4e9f557541dd1500ce45c3d34b5421248f61f5a894614fb4bd2a9edbc0
bitsmedia_russian_victim.png1e370af06bec01d214c4dd5f8688612d2c4482430746e02bad52240e993a77f0
github_issue_13_scam.pngb91fe9258472fb0e4eef9e537c990e07f56fc9dd4b225960a62c2b8474b14546
github_issue_15_money_stolen.pngd538c04747420ae4c990baffcafe832c62a15914bb4f8302b4e062fb2ed791b3
TECHNICAL EVIDENCE
dnsmap-xmrwallet-com.pngb8d8c27169aa840ee330351abda5d4d33abcff4362084f28fb9f26cc368d4a25
dnsmap-xmrwallet-cc.png07b1071c98470c2fef001fe7d69c97c3955029024192a3cb764b8ed5ad64f35c
dnsmap-xmrwallet-biz.png7f7ba03b77b009efc349fb4cd854e1693d8768e5bc3a2314442a389a5abd54be
issue35-overview.pngc3ac6d16acbd893cc42702015bd55210c040811551250e947bad789cda3898eb
issue35-endpoints.pngc8f66a8e5f251abd9d939fdb3cb6c19eb9c23ba6e9de80611e490070cf91bd9b
issue35-authflow.png6424d90e169bbd8918a556f0fa37865db54842a052e6efcfb9931e389547cb84
virustotal-detection.png6e96941253dcc6fc33f075418147c17054397384c4e1c7fd5c956e5cabdb2983
old-ru-dog.pngc6eca7eb776a1b647abf786ec3ccd785a8da2dd627c835af6830e40064ec87a3
Available on Request

Not published here — preserved for ICANN / court

Restricted

Full Email Thread (Feb 16-17, 2026)

Includes the operator's line: "Feel free to subpoena the domain registrar for my information." Available to ICANN Compliance and law enforcement.

Restricted

8 PHP Endpoint Server Captures

Raw HTTP traces showing session_key exfiltration from xmrwallet.com production. Excerpted in the public technical breakdown.

Restricted

20+ Abuse Report Delivery Receipts

Confirmation pages, ticket IDs, automated acknowledgements from NameSilo's own intake system (2023-2026). Disproves "no abuse reports received."

Restricted

SMTP Headers & Mail Server Logs

Corroborating dates and authenticity of operator email correspondence.

Restricted

DDoS Source-IP Analysis

Linking attack traffic against phishdestroy.io to NameSilo reseller infrastructure. Pending separate publication.

Contact

Request Access

Contact abuse@phishdestroy.io with your role and specific materials needed.

← Back to PhishDestroy Archive
SHA-256 hashes: EVIDENCE_HASHES.txt
Evidence: