# xmrwallet.cc — SUSPENDED (Escape Domain)

> **xmrwallet.cc was a redirect domain for xmrwallet.com scam. Suspended by registrar after abuse reports.**

## What happened

After PhishDestroy published evidence of server-side TX hijacking and view key theft on xmrwallet.com, the operator registered **xmrwallet.cc** as an escape domain — a backup redirect in case the main domain gets taken down.

| Detail | Value |
|--------|-------|
| Domain | xmrwallet.cc |
| Registered | 2026-02-04 (same week as PhishDestroy publication) |
| Prepaid | **8 years** |
| Registrar | PublicDomainRegistry |
| Hosting | DDoS-Guard (Russia), AS57724 |
| IP | 185.129.100.248 |
| Status | **SUSPENDED** |

## Why it was registered

The timing speaks for itself:
- **2026-02-04**: xmrwallet.cc registered
- **2026-02-13**: PhishDestroy publishes Issue #35 (TX hijacking proof)
- The operator registered this domain **before** our publication went live — suggesting advance knowledge that exposure was coming

## DNS proof — same operator

xmrwallet.cc shared **identical infrastructure** with xmrwallet.com:
- Same MX records: mx1/mx2.privateemail.com
- Same NS records: ns1/ns2.ddos-guard.net
- Same WOT verification token: `8a5554c915e3c17278a7`

One inbox. One operator. Three domains.

## Current status

**SUSPENDED** by PublicDomainRegistry after abuse reports. 8-year prepayment wasted.

## Main investigation

- [Full Evidence](https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/)
- [Deleted Issues Archive](https://phishdestroy.github.io/DO-NOT-USE-xmrwallet-com/deleted.html)
- [xmrwallet.com still active — report to abuse@namesilo.com](mailto:abuse@namesilo.com)

---

*Investigation by [PhishDestroy Research](https://github.com/phishdestroy)*
