<!--
NameSilo, LLC (IANA #1479) / xmrwallet — public evidence repository
Canonical: https://phishdestroy.io/namesilo-evidence
SEO topics: namesilo, xmrwallet, monero-drainer, crypto-scam, registrar-abuse, icann-compliance, phishdestroy
-->

<div align="center">

# NameSilo, LLC (IANA #1479) Is Protecting `xmrwallet[.]com`

### A US ICANN-accredited registrar publicly defended a 10-year, $20M Monero drainer — and is still actively trying to erase the evidence.

*NameSilo, LLC really doesn't like this text. Not because it's false — because they wrote the original themselves. Their official tweet defending a $20M Monero drainer is Exhibit A below. Since they can't dispute the evidence, they dispute the existence of anyone who publishes it: mass complaints to X/Twitter (our account locked — X cleared us in writing, lock stayed), Bing and Google delisting requests against phishdestroy.io, and the operator's lifetime hobby — mass-reporting real victim reviews on Trustpilot (100+ removed reviews, partially verifiable via Web Archive and rating hash history — authorities can request Trustpilot's full deletion logs). Our Twitter threads tagging @NameSilo with abuse reports go back one and two years — they killed those accounts too. We have copies of everything. Their entire strategy right now is simple: don't answer for what they're part of and erase every trace that it happened. It's not working.*

**[Master proof index &rarr;](PROOFS.md)** &nbsp;·&nbsp; **[Full article &rarr;](ARTICLE_FULL.md)** &nbsp;·&nbsp; **[The Connection &rarr;](CONNECTION.md)** &nbsp;·&nbsp; **[The Lies &rarr;](THE-LIES.md)** &nbsp;·&nbsp; **[Pressure Campaign &rarr;](PRESSURE.md)** &nbsp;·&nbsp; **[Technical breakdown &rarr;](SCAM_TECHNICAL.md)** &nbsp;·&nbsp; **[Operator dossier &rarr;](OPERATOR_PROFILE.md)** &nbsp;·&nbsp; **[Victims &amp; timeline &rarr;](VICTIMS.md)** &nbsp;·&nbsp; **[Evidence Index &rarr;](EVIDENCE_INDEX.md)**

[![License: CC BY 4.0](https://img.shields.io/badge/License-CC_BY_4.0-blue.svg)](LICENSE)
[![Evidence: SHA-256 verified](https://img.shields.io/badge/evidence-SHA--256_verified-green.svg)](EVIDENCE_HASHES.txt)
[![Mirror: GitHub Pages](https://img.shields.io/badge/mirror-GitHub_Pages-black.svg)](docs/)
[![Canonical: phishdestroy.io](https://img.shields.io/badge/canonical-phishdestroy.io-red.svg)](https://phishdestroy.io)

</div>

---

> **A note on what you're reading and why we were ready.**
>
> We knew the operator's playbook before NameSilo, LLC (IANA #1479) ever opened their mouth. We'd been watching since 2016. We'd seen him delete real victim reviews off Trustpilot. We'd seen the fake DMCAs on GitHub. We'd seen the puppet Twitter accounts mass-reporting researchers. We'd seen the 50+ paid SEO articles burying the complaints. We'd seen him scrub BitcoinTalk threads, nuke YouTube videos, wipe Reddit posts. Eight years of the same pattern: never answer the evidence, just make the person who published it disappear.
>
> So when NameSilo, LLC (IANA #1479) posted their official defense of him — four sentences, four lies, on a public channel, from a verified corporate account — we didn't panic. We archived it. Instantly. GhostArchive, Wayback, local capture, SHA-256 hash. Before they could blink. Because we already knew this registrar was going to do exactly what the scammer always does: try to erase the receipts. They did. On schedule. With their paid Gold Checkmark support channel on X.
>
> They think they're clever. They're not. They're predictable. Every move they've made, we anticipated. Every surface they've taken down, we'd already mirrored. Every complaint they've filed, we've logged. They operate like the evidence will eventually go away. It won't.
>
> One more thing: **the $10M-$20M number is a floor, not a ceiling.** Eight years, thousands of wallets, operator-side key exfiltration on every single login — the real number is significantly higher. We use the conservative estimate because we only publish what we can prove. But we know. And the on-chain analysis, when it's complete, is going to make this README look like the opening statement.
>
> And to NameSilo, LLC (IANA #1479): you publicly committed — in writing, from your official account — to helping a confirmed scammer get his VirusTotal detections removed. **You said that. Out loud. On the internet. While the drainer was still live.** You really thought nobody would keep the receipt?
>
> **Let's get one thing straight.** This is not a cry for help. We don't need sympathy, petitions, or outrage. We are not victims here — the people who lost their Monero on `xmrwallet[.]com` are. We are researchers. We document. We publish. We archive. That's what we do.
>
> What you are looking at is a **flat evidence file**. Screenshots. Emails. Timestamps. Hashes. Every claim sourced, every exhibit fingerprinted, every lie cross-referenced against the liar's own words.
>
> NameSilo, LLC (IANA #1479) and the operator have spent **eight years** pressing the "report" button on every platform that hosts the truth about them. They deleted GitHub issues. They mass-reported victim reviews. They filed fake DMCAs. They got our Twitter locked. They're trying to delist us from Bing right now. **They have never — not once, in eight years — produced a single technical rebuttal.** Not one line of code. Not one network capture. Not one counter-argument. Just the report button, over and over, on every surface they can reach.
>
> That is not the behavior of people who have been falsely accused. That is the behavior of people who know exactly what they did and have no answer except to make the evidence disappear.
>
> **It's not disappearing.** This repo is mirrored, hashed, archived, pinned to IPFS, and spread across jurisdictions they'd need a dozen separate legal actions to touch. Every takedown attempt gets logged as another entry in [`PRESSURE.md`](PRESSURE.md). Every deleted review gets noted in [`VICTIMS.md`](VICTIMS.md). Every fake DMCA gets documented in [`SECURITY.md`](SECURITY.md).
>
> They're not erasing anything. They're building our case for us.

---

## What this repository is

This is the immutable, court-usable case file for what NameSilo, LLC (IANA #1479) did when caught defending a Monero theft operation that has been live for roughly **ten years** and stolen an estimated **$10M-$20M** in user funds.

NameSilo, LLC (IANA #1479) did not ignore our reports — that would be ordinary registrar negligence. NameSilo, LLC (IANA #1479) went **publicly on the record** to call the operator "the victim," to deny ever receiving any of our 20+ delivery-receipted abuse reports, and to commit — in writing, on Twitter — to **helping the operator scrub his security detections from VirusTotal**.

When we proved every sentence of that statement was false, the takedown started.

> **Our research account was locked. Our domain has been targeted with Bing delisting attempts. They are still lying. They are still trying to erase this story.**
>
> So this repository exists. Mirrored. Hashed. Permanently archived. Not deletable.

---

## Exhibit A — NameSilo's lie, in their own words

This is NameSilo's official corporate tweet of **March 13, 2026** — published under our investigation thread, defending a confirmed $20M crypto drainer. Four sentences. Four lies. Permanently archived: [ghostarchive.org/archive/CXXZ0](https://ghostarchive.org/archive/CXXZ0)

<div align="center">

![NameSilo's official corporate tweet of March 13 2026 — calling the xmrwallet operator the victim, denying 20+ abuse reports, and committing to help scrub VirusTotal detections](evidence/03-namesilo-statement-mar13.png)

*NameSilo, LLC (IANA #1479) (@namesilo), replying to @Phish_Destroy — March 13, 2026. 11K views. They chose to put this in public. It stays in public.*

</div>

We confronted them **the day before** this tweet: *"9 reports is no joke anymore."* Their response was not to act on the reports — it was to publicly defend the scammer. Two days later, we called it what it was:

<div align="center">

![PhishDestroy rebuttal thread — NameSilo, LLC (IANA #1479) is acting as press secretary for a 2M+ Monero theft operation. 6 security vendors flag it. 3 registrars suspended it.](evidence/04-tweet-press-secretary.png)

*@Phish_Destroy, March 16, 2026 — "NameSilo, LLC (IANA #1479) is acting as press secretary for a $2M+ Monero theft operation." These tweets are now invisible because the account was locked.*

</div>

---

## Exhibit B — The operator's own email, proving NameSilo, LLC (IANA #1479) lied

The operator wrote to us **first** — February 16, 2026, from `royn5094@protonmail.com`. He defended the site as his own work. He never claimed a hack. This email alone destroys NameSilo's "domain was compromised" narrative.

<div align="center">

![Email from the xmrwallet operator nathroy, February 16 2026 — defending the site, claiming no phishing, asking PhishDestroy to remove the report. He never claims a hack.](evidence/01-operator-email-feb16.png)

*The operator, in his own words: "There is no phishing going on with xmrwallet.com." He never claimed a hack. NameSilo, LLC (IANA #1479) invented the "compromise" story 25 days later.*

</div>

We replied the same day with a complete technical breakdown — 8 PHP endpoints, `session_key` exfiltration, `raw_tx_and_hash.raw = 0` — and an explicit warning:

<div align="center">

![PhishDestroy technical reply to the operator, February 16 2026 — documenting session_key viewkey exfiltration, production-only parameters, and the warning: What happens next depends entirely on how you choose to proceed.](evidence/01-phishdestroy-reply-feb16.png)

*"What happens next depends entirely on how you choose to proceed." — PhishDestroy, Feb 16. He chose to keep lying. His registrar chose to help.*

</div>

---

## Exhibit C — They silenced us. X cleared us. The lock stayed.

After we posted the receipts publicly and escalated to ICANN, our account was permanently locked. X's own automation reviewed the appeal and wrote back **in writing**:

<div align="center">

<table><tr>
<td width="50%">

![X Support email, April 15 2026: Our automated systems have determined there was no violation and have restored your account to full functionality.](evidence/06-x-support-no-violation.png)

</td>
<td width="50%">

![X Support email subject line: Your account has been restored, April 15 2026](evidence/06-x-support-subject-restored.png)

</td>
</tr></table>

*X Support, April 15, 2026: "No violation. Restored to full functionality." The account is **still locked.** The Gold subscription is **still being billed.** A human agent at X — accessible via NameSilo's paid Gold Checkmark support channel — overrode the machine.*

</div>

**Concierge censorship that you can buy.** Full breakdown: [`PRESSURE.md`](PRESSURE.md)

---

## Exhibit D — The question they never answered

<div align="center">

![PhishDestroy tweet: Honest question for NameSilo, LLC (IANA #1479) — Who is this operator to you? Employee? Contractor? Friend of support staff? Relative? Because he told us subpoena the registrar like a man who already had your answer.](evidence/04-tweet-honest-question.png)

*"Who is this operator to you?" — @Phish_Destroy, March 16. 72 likes, 7.9K views. Never answered. Then our account was locked.*

</div>

---

## Exhibit E — The GhostArchive receipts (they can't delete these)

These are from the [GhostArchive snapshot](https://ghostarchive.org/archive/CXXZ0) taken **before** they started deleting. The full tweet thread, archived March 16, 2026. NameSilo's official reply is visible. Our responses are visible. The timestamps are visible. Everything they tried to make disappear is right here.

<div align="center">

![GhostArchive snapshot — @Phish_Destroy confronting @namesilo on March 12: 9 reports is no joke anymore. Stop letting this old man scam people. NiceNIC, WebNic, Key-Systems, PDR all banned his domains. NameSilo protects him. XMRWallet.com SCAM banner visible.](evidence/12-ghostarchive-namesilo-tweet-top.png)

*GhostArchive — our original tweet confronting NameSilo, March 12. "9 reports is no joke anymore. Stop letting this old man scam people." Below it: NameSilo's official reply with the four lies. Archived before they could touch it.*

</div>

<div align="center">

![GhostArchive snapshot — NameSilo's full official reply: Our Abuse team conducted an in-depth review... domain was compromised... no abuse reports received... working to get website delisted from VT reports. 8:08 PM March 12, 2026. 11.3K views.](evidence/13-ghostarchive-namesilo-tweet-full.png)

*The full NameSilo, LLC (IANA #1479) tweet — every word. "The registrant is also working to get the website delisted from VT reports." A registrar helping a scammer erase security warnings. They said this. Out loud. 11.3K people saw it.*

</div>

## Exhibit F — The thread they killed (archived copies)

These tweets were published on @Phish_Destroy on **March 14, 2026** — two days before the account was locked. They confronted NameSilo directly, called out the lies, and documented everything. NameSilo's response was not to answer — it was to get the account locked.

<div align="center">

![Tweet thread March 14 — I am not going to prove anything further to the registrar. Google exists, the public record exists. The hack story is a lie and the claim that there were no earlier reports is also a lie. Reports from PhishDestroy existed. Good luck to you and your Russian scammer.](evidence/14-tweet-thread-mar14-lies-exposed.png)

*@Phish_Destroy, March 14: "The 'hack' story is a lie, and the claim that there were no earlier reports is also a lie. Reports from PhishDestroy existed, and this can be verified even through public tweets. So good luck to you and your Russian scammer."*

</div>

<div align="center">

![Tweet thread March 14 — Your abuse department is a disgrace. For 10 years you have been protecting a scammer. Do you not have enough evidence? What is happening here is illegal. This old lying Russian fraudster and his fake website are not some mystery.](evidence/15-tweet-thread-mar14-abuse-dept-disgrace.png)

*@Phish_Destroy, March 14: "Your abuse department is a disgrace. For 10 years you have been protecting a scammer, and even now you have done absolutely nothing. What is happening here is illegal." Plus: the GitHub PR screenshot — "We believe that truth is better than your profit."*

</div>

<div align="center">

![Tweet March 14 — New service from NameSilo: their abuse team is helping scammers get VirusTotal bans removed. I honestly thought that after NICENIC nothing could surprise me anymore — but you still managed to surprise me. Abuse Report Complaint Filed, Abuse Report Ignored infographic.](evidence/16-tweet-mar14-vt-delisting-service.png)

*@Phish_Destroy, March 14: "New service from NameSilo: helping scammers get VirusTotal bans removed." The infographic shows the cycle: Abuse Report filed → Complaint Filed → Abuse Report Ignored → NameSilo: "the domain was compromised" → "working to get delisted from VT." All while archived snapshots from 2021-2022 prove the malicious activity was always there.*

</div>

---

## The connection — in one paragraph

A scammer running a ten-year crypto drainer, on $550-a-month bulletproof hosting in Belize, behind Russian DDoS-Guard, wrote to us on **February 17, 2026**: *"Feel free to subpoena the domain registrar for my information."* Twenty-four days later, on **March 13, 2026**, that same registrar — **NameSilo, LLC (IANA #1479)** — published an official tweet calling him **"the victim"** of a hypothetical hack, denying our 20+ abuse reports ever arrived, and announcing a public commitment to **clean up his VirusTotal detections**. Three other registrars (PDR, WebNic, NICENIC) holding the same domain looked at the same evidence and **suspended in days**. NameSilo, LLC (IANA #1479) wrote a press release for him. **They put the connection in public themselves.** This repository is the receipts.

> Full evidence chain: [`CONNECTION.md`](CONNECTION.md)

---

## The lies — in one table

| NameSilo's claim | Reality | Verdict |
|---|---|---|
| "Domain was compromised a few months ago." | The theft code *is* the website. 8 PHP endpoints, server-side `session_key` exfiltration, `raw_tx_and_hash.raw = 0`. Built to steal from day one, ~10 years. The operator **never claimed a hack** in his own emails. | **FALSE** |
| "Prior to that, we had received no abuse reports." | **20+ delivery-receipted abuse reports** through their own portal, 2023-2026. Our tweet from **one day before** their statement says "9 reports is no joke anymore." | **FALSE** |
| "After an extensive review... not involving the registrant." | The operator wrote to **us** defending his code as his own. NameSilo, LLC (IANA #1479) adopted a "compromise" framing the operator himself never advanced. | **FALSE** |
| "Working with the registrant to remove the website from VT reports." | A registrar helping a confirmed scammer erase his security warnings from 6+ authoritative vendors. Not abuse handling. **Active obstruction of consumer-protection telemetry.** | **DAMNING** |

> Full line-by-line breakdown: [`THE-LIES.md`](THE-LIES.md)

---

## The pressure campaign — what they're still doing right now

The moment we replied with the operator's own emails, the silencing started. **They have not stopped.**

| Date | What happened | Status |
|---|---|---|
| 2026-03-13 | NameSilo, LLC (IANA #1479) publishes the four-lie defense | [Archived forever](https://ghostarchive.org/archive/CXXZ0) |
| 2026-03-16 | We post the receipts — "@NameSilo is lying" | Tweets now invisible (account locked) |
| 2026-03-18 | We escalate to ICANN + law enforcement | On record |
| 2026-03-?? | **@Phish_Destroy permanently locked** via Gold Checkmark live-support | **Still locked** |
| 2026-04-15 | X automation: *"no violation, restored"* | **Lock not lifted. Gold still billed.** |
| Ongoing | **Bing search delisting** of `phishdestroy.io` | Tracking |
| Ongoing | **DDoS** from "njan la" reseller infrastructure | Mitigated |
| 8 years | Operator: fake DMCA, mass-report reviews, delete GitHub issues, 50+ paid SEO articles to bury victims | [Documented](OPERATOR_PROFILE.md) |

> Full timeline: [`PRESSURE.md`](PRESSURE.md) &middot; Operator's 8-year suppression history: [`OPERATOR_PROFILE.md`](OPERATOR_PROFILE.md)

---

## What's in this repository

```
.
├── README.md                  <- you are here (landing page with key evidence)
├── PROOFS.md                  <- MASTER INDEX: every piece of evidence, every mirror
├── ARTICLE_FULL.md            <- full long-form article (mirror of Medium / phishdestroy.io)
├── CONNECTION.md              <- evidence chain: NameSilo, LLC (IANA #1479) <-> xmrwallet operator
├── THE-LIES.md                <- line-by-line debunking of NameSilo's March 13 statement
├── PRESSURE.md                <- silencing attempts, dated, still-ongoing
├── SCAM_TECHNICAL.md          <- full technical investigation (viewkey x40/session, 8 endpoints, IOCs)
├── XMRWALLET_TECHNICAL.md     <- server-side key drainer summary (case-file format)
├── OPERATOR_PROFILE.md        <- complete operator dossier (identity, domains, IPs, victims, IOCs)
├── VICTIMS.md                 <- documented victims, full 2016-2026 timeline, scoreboard
├── EVIDENCE_INDEX.md          <- every screenshot, indexed, with section + date + sha256
├── MEDIUM_MIRROR.md           <- all Medium articles + pre-formed Wayback save URLs
├── TWITTER_ARCHIVE.md         <- @Phish_Destroy archive methodology & tooling
├── SOURCES.md                 <- permanent archive URLs for every external claim
├── EVIDENCE_HASHES.txt        <- SHA-256 of every screenshot (verify with sha256sum -c)
├── LICENSE                    <- CC-BY-4.0 + explicit grant for legal/regulatory use
├── SECURITY.md                <- how victims and researchers can report
├── CITATION.cff               <- machine-readable citation for academic / legal use
├── DEPLOY.md                  <- push + IPFS/Arweave pinning + mass archive submission
├── .github/ISSUE_TEMPLATE/    <- templates for victim reports and additional evidence
├── evidence/                  <- 10 screenshots, descriptive filenames, SHA-256 verified
├── tools/                     <- reproducible Twitter archive tooling (Wayback / archive.ph / DDG)
└── docs/                      <- GitHub Pages mirror — fully SEO-optimized static site
```

> **Where do I start?** Open [`PROOFS.md`](PROOFS.md) — every piece of evidence and every mirror in one place. That is the file to share if you only have one URL.

---

## Verify the evidence yourself

Every screenshot in `evidence/` has a SHA-256 fingerprint in [`EVIDENCE_HASHES.txt`](EVIDENCE_HASHES.txt). To check that nothing has been tampered with:

```bash
git clone https://github.com/phishdestroy/namesilo-evidence.git
cd namesilo-evidence/evidence
sha256sum -c ../EVIDENCE_HASHES.txt
```

All 10 files should report `OK`. If any fails, do not trust the modified copy — open an Issue and we will investigate.

---

## For victims of `xmrwallet[.]com`

If you have lost funds to `xmrwallet[.]com`, this repository is a **ready-made evidence package** you can attach to:

- A police report (in any jurisdiction)
- An IC3 (FBI) cybercrime complaint — https://www.ic3.gov
- A FTC complaint — https://reportfraud.ftc.gov
- An ICANN Contractual Compliance complaint against NameSilo, LLC (IANA #1479) — https://www.icann.org/compliance
- A civil claim against NameSilo, LLC (IANA #1479) and/or the operator
- A chargeback / insurance filing

The license file in this repo ([`LICENSE`](LICENSE)) is **explicit, written consent** to use this evidence as-is in any of the above. No further authorization required from PhishDestroy.

Direct contact for victims: **[report@phishdestroy.io](mailto:report@phishdestroy.io)**

> Open an Issue using the [Victim Report template](.github/ISSUE_TEMPLATE/victim-report.yml) if you want your case added to the public ledger.
>
> Documented victims and the full 2016-2026 timeline: [`VICTIMS.md`](VICTIMS.md)

---

## For ICANN compliance officers, regulators, journalists

The full case file was forwarded to **ICANN Contractual Compliance on March 18, 2026**. This repository is the public mirror of that filing, with the same screenshots, the same hashes, and the same explicit consent for republication.

If you need additional materials (raw email headers, server-side capture of the eight `xmrwallet[.]com` PHP endpoints, the 20+ historical abuse-report delivery receipts to NameSilo, LLC (IANA #1479) dating back to 2023), contact **[abuse@phishdestroy.io](mailto:abuse@phishdestroy.io)** with a subject line that identifies your role.

---

## Why this matters beyond one domain

NameSilo, LLC (IANA #1479) is tied — in our records — to **hundreds of active crypto-scam domains targeting US users**. Across two years of work we have submitted thousands of abuse reports through their portal. The pattern, consistently, is silence.

`xmrwallet[.]com` is the case where they broke their silence. They went on the record. They put a defense of a confirmed scammer in their own corporate voice, on a public channel, with an offer to help him erase his security record.

This is not a single registrar making a single review error. **This is a registrar publishing a corporate policy of protecting a specific operator** — and using paid platform-level access (X Gold Checkmark live support) to silence the people who proved them wrong.

If a registrar can do this once, in public, and walk it off — every other registrar learns the lesson.

So this case is not going to walk off.

---

## Mirrors

This story is being kept alive in multiple places, intentionally:

- **Canonical:** [phishdestroy.io/namesilo-killed-our-twitter](https://phishdestroy.io/namesilo-killed-our-twitter)
- **Medium:** [phishdestroy.medium.com/namesilo-lied-to-defend-a-20m-crypto-scam](https://phishdestroy.medium.com/namesilo-lied-to-defend-a-20m-crypto-scam-then-took-down-our-twitter-4904d15d531e)
- **GitHub Pages mirror:** [`docs/index.html`](docs/index.html) (deploy via Settings -> Pages -> /docs)
- **GhostArchive (NameSilo's tweet):** [ghostarchive.org/archive/CXXZ0](https://ghostarchive.org/archive/CXXZ0)
- **GitHub evidence repo (this one):** the file you are reading right now
- **IPFS / Arweave:** CID and TX ID published after pinning (see [`DEPLOY.md`](DEPLOY.md))

> Cut down one link. Five more grow back. We run on the **Hydra principle**.

---

<div align="center">

### *Scammers delete evidence. NameSilo, LLC (IANA #1479) defended one. X locked our account. Bing is delisting us. The archive remains. The truth remains. We remain.*

**PhishDestroy Research** · [phishdestroy.io](https://phishdestroy.io) · [abuse@phishdestroy.io](mailto:abuse@phishdestroy.io)

</div>
