Systematic silencing of xmrwallet.com victims across Reddit. 93 posts analyzed via PullPush API (full Reddit archive). Every removed post, every deleted account, every sock puppet — documented. Collected May 17, 2026.
The operator systematically targeted r/Monero (the main subreddit with 400K+ members) while leaving r/monerosupport largely untouched — because r/monerosupport had less visibility.
50 posts total. 60% removed. Automod filtered, author deleted, Reddit legal takedowns. The main battlefield — this is where visibility mattered.
20 posts total. Only 5% removed. Operator didn't bother — smaller audience, less damage to their reputation.
12 posts filtered by automod (likely mass-reported by operator to trigger automatic removal). 12 authors deleted their own accounts (harassment? shame? threats via DM?). 4 posts removed by Reddit itself — this requires a legal/DMCA request, meaning the operator actively filed takedown requests against victims.
Why 20% of authors deleted their accounts: The operator is known to contact victims via DM threatening legal action. Victims who posted about losing funds to illegal activity may have deleted accounts out of fear, shame, or after being harassed. Some accounts may have been shadowbanned after the operator mass-reported them for "spam." The result is the same: victim voices erased.
These posts were removed by Reddit itself — not by moderators, not by automod. This requires filing a formal legal or DMCA request. The operator used legal threats to silence victims reporting theft.
Don't use xmrwallet.com! The site is under attack right now. My funds were moved to other wallet.
Removed by Reddit. User account deleted.
My first time xmrwallet.com got scammed.
Alive on r/monerosupport, REMOVED by Reddit on r/Monero.
Tried to send 300XMR to FixedFloat, confirm screen said 300, but entire 1060XMR sent. No private tx keys provided.
TX: b3f2ca86fdc786d846d5d3ce29d40ace2876e0c3fc9fd2a5448ae99b2723ab8f
The operator's "Nathalie" responded with a template about "feature in development." Reddit removed the r/Monero crosspost.
DONT use XMRWallet.com
Username literally created to warn people. Removed by Reddit legal request.
XmrWallet.com long-lived scam.
REMOVED BY REDDIT (legal/DMCA request). The operator filed a legal takedown against a post calling their theft operation a scam.
Every victim report found via PullPush Reddit archive. Status shows whether the post is still visible or was suppressed. Conservative count — many victims did not specify amounts, and dozens of deleted posts had no body preserved.
Login button unresponsive, admin unhelpful. First known complaint. dEBRUYNE_1 (Monero lead maintainer) paged u/WiseSolution who responded.
Warning: xmrwallet.com blocking all outbound transfers.
XMRwallet.com scam?
XMRWALLET.COM Stole all of my funds
Sent to Kraken, never arrived, transaction shows completed in xmrwallet but invisible on any explorer.
xmrwallet.com is a scam!!!
xmrwallet.com is a scam?
Wallet Funds Inaccessible.
Lost money with XMRWallet.com
— Account deleted.
First time buyer, funds stolen immediately after arrival. r/Monero crosspost automod_filtered.
Scam alert: Don't use xmrwallet.com, they may have stolen user's funds.
17 upvotes.
Bitazu Capital Founding Partner Aftab Sorout Loses $20,000 in XMR. Literally had to sit and wait for rest of balance to unlock so that I could click SEND and withdraw the rest before the scammer could.
Monero's 10-output locktime (20 min) saved partial funds.
Sent to ChangeNow.io, never arrived. ChangeNow confirmed unable to detect deposit
. xmrwallet showed fake confirmation. Payment ID proves it was xmrwallet.com not clone. dEBRUYNE_1 personally assisted.
Lost all monero. UPDATE: fell for .org Google ad redirecting to .net with Hotjar recording script. Proves ad redirect chain.
MAIN THREAD — 55 upvotes, 98% upvoted, 44 comments. PSA! Withdrawal within 17min of deposit. Friend put 100 XMR never seen again.
Additional victims in this thread:
The same thing happened to me. definitely xmrwallet.com
Using since 2019, bookmarked 2 years. Got logged out, funds sent to unknown address.
ROBBED, minutes after I deposited 4 XMR
Not phished, scammed from the .com. Had used them 2-3 times before
It was xmrwallet.com, not .org, .net, .scam. I always check the domain name
I hadn't even logged on that day, seed on paper. Emailed support, non-existent.
I got scammed but I don't think I visited anything except https://www.xmrwallet.com
I just fell for this scam....
Do not use xmrwallet.com.
dEBRUYNE_1: I will leave this one up, I've seen multiple reports of nefarious behavior recently.
dEBRUYNE_1 admitted he deleted earlier posts thinking they were just support threads.
XMRWallet.com Scam
— 22 upvotes. Post AND account deleted.
Was I scammed out of $200 by xmrwallet.com?
— Account deleted.
Can we pressure Cloudflare to end xmrwallet.com.
Accepted 2 XMR first, stole 10 later, friend lost 100 XMR. 27 upvotes.
xmrwallet.com - scam - $500,000
BODY NOT PRESERVED IN PULLPUSH. The post was filtered before archival. Half a million dollars — and the evidence is gone.
Security engineer. Created new wallet, added 159 XMR, all transferred to unknown wallet. r/Monero crosspost automod_filtered.
Tried to send 300XMR to FixedFloat. Confirm screen said 300. Entire 1060XMR sent. No private tx keys provided. Tagged u/WiseSolution. "Nathalie" responded with template: feature in development, use CLI
.
TX: b3f2ca86fdc786d846d5d3ce29d40ace2876e0c3fc9fd2a5448ae99b2723ab8f
These post titles were recovered from PullPush API, but the body text was removed before archival. The victim's words are gone. Only the titles survive.
Funds stuck on XMRWallet.com which is completely abandoned
Lost money with XMRWallet.com
Don't use Xmrwallet.com. The site is under attack. Lost the funds
Lost funds using xmrwallet
— posted in 2 subs, both deleted
Don't use xmrwallet.com! Lost funds
— posted in 2 subs, both deleted
XMRWallet.com Scam
Was I scammed out of $200 by xmrwallet.com?
Scammed by xmrwallet.com :(
xmrwallet.com - scam - $500,000
— u/Moon4895, automod_filtered. Half a million dollars, and the post body is gone.
The operator monitors balances in realtime and steals only large deposits. Small amounts work fine to build trust — sometimes for months or years. This is why victims say "I used it before without problems."
| Deposit Size | Result | Evidence |
| $10-100 | Works fine | Builds trust for months/years |
| $200-1000 | Sometimes stolen | u/Such_Ad3921: used since 2019, $1100 stolen |
| $1000+ | Stolen within 2-30 min | u/Sir-Forsaken: 2 XMR fine, 10 XMR stolen |
| 1060 XMR | UI shows wrong amount | u/Practical-Demand-174: screen said 300, sent all 1060 |
How it works: Server-side TX hijacking. The confirm screen shows the correct amount, but the server constructs a different transaction. raw_tx_and_hash.raw = 0. No private TX keys are provided — preventing victims from verifying the destination address. The GitHub code is a facade; the theft architecture exists only on the production server.
u/Subject-Property-953: Admin got all users transactions in realtime and steal money if see big amount transaction
u/Sir-Forsaken: 2 XMR worked fine, stole 10 later, friend lost 100
u/Such_Ad3921: Using since 2019, never scammed. Put $1100 — stolen immediately
u/alferg: Worked fine for 2 months, deposited 4 XMR — robbed in minutes
u/Chimmichangaaaaa: Had used them 2-3 times before
u/genericdruggie: typed URL every time, leads me to believe selective scammers
u/Subeedai (Jan 2023): XMRWallet is still showing the original balance, but MoneroGUI is showing 0 with the 2nd transaction which isn't showing on XMRWallet.
The victim's real balance was 0 (visible in official MoneroGUI). But xmrwallet.com displayed the original amount — fake. Purpose: delay victim discovery, buy time before they notice the theft.
u/WiseSolution is the operator's Reddit account, active from 2018 to 2022. Signed as "Nathalie, XMRWallet.com". 13 posts, 74 comments. Every technical statement is either a lie or a carefully constructed misdirection.
Only the view key and the address is sent to the server— TRUE but this IS the theft vector
The seed is NEVER sent to the server— technically true, but irrelevant. View key IS sent (40x per session)
Its actually my own backend made in PHP— CONFIRMED PHP backend
I hired a designer to take care of that— confirmed: Dribbble/Avilov design, pushpush/titanmaster138 frontend
Your private key never leaves the comfort of your own computer— LIE. View key sent to server 40x per session.
Xmrwallet doesn't save or access your seed phrase— IRRELEVANT. They steal via view key + TX hijack, not seed.
Three Reddit accounts, all Philippines-based, systematically promoting xmrwallet.com. Found in the same threads, saying the same things, coordinating content in r/xmrwallet. One of them (craig_d_79) took over the subreddit after Reddit banned it as spam.
for that price, you could easily get at least 7 articles that are 1500-2000 words— matches Kwork order pattern on Google Drive
Looks like it's back up and working fine now— monitoring site status
u/purpleandviolet made 16+ comments in darknet subreddits recommending xmrwallet. Darknet users buying drugs/services with Monero are ideal victims: they won't report to police, they need privacy, they trust Tor, and amounts can be significant.
xmrtor3fsapuu6y26za7vpzox4vpaj6ny5viq2arbmozm7kg6jitnlid.onion
Posted by u/purpleandviolet in r/AbacusMarketAccess and r/darknet. This address is NOT prominently published on the main site — knowing it implies insider knowledge.
All three accounts found in the same threads, recommending xmrwallet simultaneously. This is coordinated inauthentic behavior — a violation of Reddit's Content Policy.
ALL THREE "independent" users recommending the same scam wallet in the same thread.
u/rbrunner7 (XMR Contributor, Apr 2024): Don't overdo it with those recommendations for xmrwallet. I find it quite strange how they pop up every now and then, in strange places.
u/MoneroArbo (Jan 2023): They say it's open source and link to a github but the repositories don't contain any wallet code.
The operator's SEO campaign (paid articles, Trustpilot bots, 15+ blog posts) polluted AI training data. GPT-3.5-turbo — the default model in free ChatGPT — recommends xmrwallet.com as #2 "Best Monero web wallet." Millions of users get directed to a confirmed theft operation.
Impact: GPT-3.5-turbo is the default model in the free tier of ChatGPT, used by millions. A user asking "best Monero wallet" gets directed to a confirmed $100M+ theft operation. Even after site closure, AI models continue to recommend it from training data. Only open-source models (Llama, Mistral) correctly identify the risk. This is a direct consequence of the operator's SEO manipulation.
Every server hosting xmrwallet domains shares IP addresses with Russian-language sites. Co-hosted with a pirate streaming service and a carding marketplace selling stolen credit cards.
Pattern: ALL server infrastructure connects to Russian-language ecosystem. DDOS-Guard (Rostov-on-Don, Russia) used across ALL domains. Co-hosting with pirate streaming (kinogo.ec) and carding marketplace (bclubs.to). Operator claimed "Canada" on GitHub, but server neighbors are all .ru. Second developer works at Kinescope (Russian video platform). SEO orders on Kwork (Russian freelance platform).
nathroy — operator ("Canada", "Nathalie", admin@xmrwallet.com)
pushpush — frontend contractor (titanmaster138@gmail.com, works at Kinescope, Russian video platform)
relly34mfk — SEO contractor (atadevelopers.com)
BernickBeckForensic — fake law firm account (intimidation tactic)
u/WiseSolution — original operator (banned 2018)
u/craig_d_79 — Philippines, SEO, r/xmrwallet mod
u/purpleandviolet — Philippines, main promoter, darknet
u/Extra-Expert7685 — Philippines, gambler
u/XMR-Expert — single promo post (Aug 2024)
admin@xmrwallet.com — primary (no MX, dead)
royn5094@protonmail.com — emailed PhishDestroy (valid, spam history)
hassizabir@gmail.com — Google Drive SEO orders (valid)
titanmaster138@gmail.com — frontend dev (valid)
@oliviasmith1978 (Medium) — display name "Xmr Wallet", SEO backlink
@XMRWalletCom (Twitter) — 189 followers, 0 tweets
UA-116766241-1 — Google Analytics on every page incl. 404
The operator's primary defense is: All losses are from phishing clones, not from xmrwallet.com itself.
This argument collapses under basic logic.
Phishing is a numbers game. You clone a service with maximum users to catch maximum victims. Here's the Monero wallet landscape:
| Wallet | Users / Downloads | Phishing clones in wild |
| MetaMask | 30M+ users | Thousands |
| Coinbase Wallet | 10M+ users | Hundreds |
| MyMonero | 500K+ downloads | Some known |
| Cake Wallet | 500K+ downloads | Few |
| Monerujo | 100K+ downloads | Rare |
| xmrwallet.com | ~7K daily visitors (2019 peak) | 9 clone domains |
xmrwallet.com is the least popular wallet on this list — yet has the most phishing clones. A phisher choosing to target xmrwallet instead of MyMonero or Cake Wallet is like a pickpocket choosing an empty bus instead of a packed subway. It doesn't make economic sense — unless the "phisher" is the operator himself, expanding his attack surface.
xmrwallet.com is not a simple static site. It's a PHP backend with custom API endpoints (auth.php, getheightsync.php, gettransactions.php, getbalance.php, etc.). To create a functional phishing clone, you would need to:
1. Reverse-engineer the PHP backend (not open source — GitHub repo is a facade)
2. Set up a Monero node to sync the blockchain (~180 GB)
3. Implement the wallet creation / login / transaction flow server-side
4. Proxy or replicate the real-time balance checking
5. Make the clone functional enough that users don't notice before depositing
This is orders of magnitude harder than cloning a simple login page (like MetaMask phishing). A real phisher would target MyMonero (simple seed import) or set up a fake exchange — not spend weeks replicating a complex PHP wallet backend for a site with 7K daily visitors.
The evidence we collected proves this:
WHOIS match: xmrwallet.com and xmrwallets.com share 4/4 identical privacy hashes (city, org, state, zip) = same registrant
Shared state hash: xmrwallet.biz, .net, .me all share the same WHOIS state hash = same person
Same infrastructure: xmrwallet.cc and .me share IP 185.129.100.248 (DDOS-Guard) with full production subdomains (dev, staging, backend, admin, panel, api, cdn, login)
xmrwallet.me banner: Our official domain(s): xmrwallet.com, xmrwallet.net, xmrwallet.me
— the operator HIMSELF lists these as his own
Identical server: All domains use DDOS-Guard (Rostov-on-Don, Russia), same MX records (privateemail.com), same page title
The conclusion is inescapable: The operator registered 9+ domains himself (.com, .cc, .biz, .net, .me, .org, .co, .app, .in + xmrwallets.com) to maximize his attack surface. When victims reported losses, he blamed "phishing clones" — his own domains. When registrars suspended some of them (.cc, .biz), he pointed to the suspensions as evidence that clones existed. He created the problem, then used the problem as his defense.
Ask yourself: If you were a phisher with the skills to replicate a complex PHP wallet backend, would you target xmrwallet (7K visitors/day) or MetaMask (30M users)? The answer tells you who the real attacker is.
In July 2018, NewAlchemy.io audited xmrwallet. The operator used this as proof of legitimacy ("passes security audit" — 67 upvotes on Reddit). What they didn't mention: the audit only reviewed client-side code. The server-side theft code was explicitly OUT OF SCOPE.
What was audited: Client-side JS (twig templates + app.js)
What was NOT audited: PHP backend (auth.php, getheightsync.php, getbalance.php, etc.) — the EXACT code that steals funds
From the audit report: "The server-side application consists of numerous PHP API endpoints. This code was OUT OF SCOPE."
"The private server-side API functionality, obfuscated client code, and cryptography was out of scope."
Results: 7 critical issues found initially. All 7 fixed after v2.1 re-test. 5 of 6 moderate fixed. But this is irrelevant — the theft happens server-side, which was never audited.
NewsBTC (May 2018): "XMRwallet — The First Web-based Anonymous Monero Wallet" — SPONSORED
Bitcoinist (2018): "New Monero Wallet Launches" — SPONSORED
crypto.news (2025): "5 best Monero wallets" — xmrwallet #1 — PAID "content provided by third party"
CryptoPotato: "XMRWallet — A Convenient and Simple to Use Monero Wallet" — puff piece
NullTX, Bitcoin Insider, Global Coin Report, The Bitcoin News: identical "passes security audit" PR piece
jcount.com: "Why XMRWallet is the Hottest Topic in Cryptocurrency"
"Best Subreddits for Monero" — targets Reddit users
"How to Get Monero" — targets "how to buy monero" keyword
"Exploring Best Monero Wallets" — targets "best monero wallet"
"5 Common Hacks Threatening Monero Wallets" — scammer writing about hacks
"5 Common Crypto Scams You Should Know About" — scammer writing about scams
"Monero: Is it Illegal?" — targets "is monero illegal" keyword
"Security of Your XMR Wallet" — targets security keyword
All serve as SEO honeypots to bring victims via Google search. This is why GPT-3.5 recommends xmrwallet.
| Victim | Amount | Date |
| u/Moon4895 | $500,000 | Sep 2021 (post removed, body lost) |
| u/Practical-Demand-174 | 1060 XMR (~$170,000) | Aug 2022 |
| Bitazu Capital | $20,000 | Sep 2020 |
| u/CurrentDay1109 | 159 XMR | Dec 2022 |
| u/sncle + friend | 112 XMR | May 2021 |
| u/Sir-Forsaken | 47 XMR | Oct 2020 |
| u/RechardSport | 10+ XMR ($1,600) | Dec 2020 |
| u/Puzzled-Bottle-9274 | 10 XMR | Dec 2020 |
| u/alferg | 5.686 XMR | Feb 2021 |
| u/Such_Ad3921 | 4.613 XMR ($1,100) | Feb 2021 |
| u/Chimmichangaaaaa | $800 | Mar 2021 |
| blogspot victim | $500 | Sep 2020 |
| u/xmr_amateur | $100-200 | Oct 2020 |
| u/Pretend-Hospital3784 | GBP 100 | Mar 2021 |
| u/vermillion1469 | $60 | Jul 2019 |
Total confirmed: 1,408+ XMR / $694,660+. With u/Moon4895: $1,194,660+
Conservative count. 40 unique victims named. 32 unique threads. Many did not specify amounts. Dozens of deleted posts had no body preserved.
u/dEBRUYNE_1 (Monero lead maintainer): Paged WiseSolution in 2018. Admitted deleting victim posts early on. Changed policy to keep warning posts. Confirmed "multiple reports of nefarious behavior." Personally assisted victim u/ughwtfnoway.
u/selsta (Monero developer): Reported phishing domains to Namecheap. Namecheap ignored all abuse requests.
u/rbrunner7 (XMR Contributor): "Third or fourth person in 3 months with vanished XMR from .com"
u/SChernykh (P2Pool developer): Confirmed "xmrwallet is a known scam" on monero-project GitHub issue #8440
u/needmoney90 (r/Monero moderator): Removed xmrwallet from sidebar. "Without hard proof it is difficult to call scammers."
All evidence is available as raw JSON for independent verification.
This page documents what we found. We know it is far from everything. Dozens of deleted posts had no body preserved. Hundreds of Trustpilot reviews were removed before anyone could archive them. Victims who never posted publicly are invisible to us. If you have evidence — a screenshot, a transaction hash, an email from the operator, a deleted review, a DM threat — we want it.
Public Submission
Your evidence will be added to this archive with full attribution (or anonymous — your choice). Published on IPFS and Arweave. Permanent. Undeletable. The operator cannot DMCA a decentralized network.
Private / Law Enforcement
Your evidence will be included in the investigative package shared with law enforcement agencies. Not published publicly. Your identity protected. We are already in contact with EU authorities and share evidence upon request.
It's entirely up to you: public or private. Named or anonymous. Added to the archive or passed to investigators only. We respect your choice completely. The only thing we ask is that the evidence is real.
A note about Trustpilot: We have already documented 7 deleted reviews on xmrwallet's page alone (from a single Wayback snapshot — only page 1 of 3 was cached). One was a victim reporting 1,200 XMR stolen. One mentioned "Nathalie" by name as support contact — deleted because it exposed the operator's identity. Three were the operator's own bot reviews, cleaned up after they served their purpose.
On NameSilo's page: 129 reviews deleted in just 4 months (Jan-May 2026). That's roughly one per day. Their rating magically recovered from 4.5 to 4.7 while adding 600+ reviews — impossible without systematic negative review deletion. Every deleted review had Trustpilot's green checkmark. The platform verified these people were real, then helped silence them.
We have 13+ screenshots of deleted reviews preserved via Wayback Machine (2022, 2023, 2024 snapshots). But the real number — the number Trustpilot's own database contains — will be far larger. When investigators subpoena that data, the scale of suppression will shock everyone. Trustpilot's review moderation did not protect consumers. It protected the operator. It played a significant role for both subjects of this investigation.