Timeline Evidence Archive Files Laundering Raw Data Integrity For Victims Contact
EN RU ZH JA FR DE ES PT IT NL
⚖️ Not a party to a conflict

Volunteer initiative. Not a company. Not a side in a dispute. Click to read.

🔥 About our tone

Rude, direct, uncomfortable. Not sorry. Click to understand why.

💰 $0 received. Ever.

Zero income. Funded by parents. Donations forwarded. Click for proof.

IPFS Archive — phishdestroy.eth

They delete evidence.
We put it where no one can touch it.

TL;DR for journalists, investigators, and anyone short on time:
xmrwallet.com stole an estimated $100M+ in Monero over 8 years via server-side transaction hijacking. NameSilo, LLC (ICANN-accredited registrar, IANA #1479, Phoenix AZ) publicly defended the operator, fabricated a "compromise" story, offered to remove VirusTotal detections, and used X Gold Checkmark to silence the researchers who exposed it. This archive contains 61 SHA-256 verified screenshots, court-ready PDFs, operator emails, ICANN filing, 130M+ domain analysis, and the operator's own farewell letter admitting the investigation forced closure. Every claim is backed. Every file is hashed. Nothing here has been disproven.
💼 Are you a NameSilo investor?

We understand that investors have their own aesthetic preferences and that our cyberpunk design may cause mild cardiac distress in people accustomed to quarterly earnings reports in Excel. We also understand that reading 2,000+ lines of evidence from hackers who destroy phishing for fun is not everyone's idea of a pleasant afternoon. So we've prepared special editions — same facts, different packaging. Choose your level of comfort:

📊 Investor Presentation — 10 slides, corrected numbers 💾 Full Site — Windows 98 Edition — all evidence, retro packaging

Both versions contain the same evidence. The Win98 edition is our tribute to NameSilo's actual admin panel design, which their CEO admitted needs a "complete UX overhaul" after seven years. We think it's perfect as it is.

Independent anti-scam research. A volunteer movement against phishing and online fraud. This archive exists because they tried to erase us — deleted from Bing, locked on Twitter, DMCA'd on GitHub, reported on every platform. So we moved to IPFS via Ethereum Name Service. No server to shut down. No host to pressure. No "report" button to abuse.

130K+Domains blocked
$20M+Stolen & documented
7+Platforms censored
0Claims disproven

What's inside this archive

01Timeline — How it unfolded 02Evidence — 61 verified screenshots 03Money Laundering — The case 04Revenue Anatomy — Follow the money 05Born Dead — NS vs Namecheap 06For Victims & Authorities 07Archive — Permanent mirrors 08Raw Data — CSVs, PDFs, hashes 09Integrity — How to verify 10Contact
🚫

Suppression campaign

They tried to erase this research from the internet

Every platform with a "report" button — weaponized. Every direct question — silence. The same playbook for 10 years.

DEAD Bing All phishdestroy.io results removed. Complete erasure from Microsoft search.
LOCK Twitter / X Gold Checkmark lock. X's own review: "no violation." Still locked. Still billing us.
WON GitHub False DMCA takedown. We contested. Won. Repos restored.
WON Google Multiple DMCA requests against search results. We contested. Won.
SAFE Cloudflare Abuse reports against our domains. We pre-warned registrar & CF. Nothing happened.
DEAD Trustpilot 100+ victim reviews deleted through automated moderation abuse.
DEAD YouTube Other researchers' analysis videos — reported and removed.
DEAD imgBB Evidence screenshots reported and removed. They report everything.
🤡 Operator Deleted GitHub commits & issues. We warned him. He did it anyway. We kept everything.
10yr Hundreds more Every mention, every warning, every victim post. Systematically. For a decade.

QUESTIONS ASKED — ZERO ANSWERS RECEIVED:

"Who is this operator to you?""Why did you fabricate the compromise story?""How many abuse reports did you actually receive?"Silence. No rebuttals. No counter-evidence. Just deletions.

So we moved to IPFS + Ethereum Name Service.

No server · No host · No "report" button · No takedown possible

ghostarchive.org/archive/CXXZ0
NameSilo tweet defending xmrwallet.com
NameSilo, LLC (IANA #1479) publicly defending a $20M+ Monero theft operation — 11.3K views — permanently archived
Timeline

How the madness unfolded.

Every step documented before it happened. We knew the playbook. We were ready.

All 2023 Feb 2026 Mar 2026 Apr 2026 May 2026
2023 — First abuse reports
20+ reports filed through NameSilo's own portal
Ignored +
PhishDestroy submitted 20+ abuse reports about xmrwallet.com and operator-linked mirrors through NameSilo's abuse portal between 2023 and 2026. We hold every delivery receipt — confirmation pages, ticket IDs, automated acknowledgements. Independent researchers had been reporting the same domain for years. Based on archived victim threads and deleted accounts, the real number of reports NameSilo received is likely well over 100. They later claimed: "we had received no abuse reports."
2023–2025 — Years of research
Mapping the operator's suppression machine
Documented +
Before publishing a single word, we spent years documenting how the operator kept a $20M+ theft operation alive for a decade. His strategy: delete everything, everywhere. What he couldn't delete — he buried.

Deletion: DMCA takedowns against Google, GitHub, domain registrars. Mass-reporting Trustpilot reviews (100+ removed). Filing abuse reports using government email addresses. Taking down YouTube analysis videos. Coordinated reporting on BitcoinTalk, Reddit, Twitter.

SEO burial: We nicknamed him "SEO Grandpa" because his second weapon was parasitic SEO. He ordered 50+ paid articles through Kwork, Freelancehunt, and more expensive intermediaries — all sponsored content placed on third-party sites to push victim complaints out of search results. His freelance orders, complete with article texts and link-building instructions, are still indexed on Google Drive in plain sight. When we got one sponsored article taken down, the host site publicly confirmed it was paid placement. He bought low-quality backlinks at scale, parasitizing the "xmrwallet" brand name built on theft.

The code theater: The operator publishes "open source" code on GitHub to appear legitimate. But the actual site is hosted on DDoS-Guard — a bulletproof hosting provider. If the code is honest, why use DDoS-Guard? Because the production code contains session_key exfiltration, encrypted payloads, and server-side TX construction that don't exist in the public GitHub repository.

We mapped the entire playbook and prepared for every step.
2023–2026 — Domain takedowns
We took down his escape domains. One by one.
Taken down +
The operator registered xmrwallet mirror domains across multiple registrars with 5–10 year registration periods — pre-paid escape routes for when domains got banned. Each clone was linked directly from the main site (all archived in Wayback Machine), hosted on IQWeb / DDoS-Guard, with identical code hashes across every mirror.

Let's examine the escape plan in detail. We're not registrar experts — As specialists who have destroyed 500,000+ phishing domains across hundreds of registrars, we recognized the pattern immediately. Here are the operator's registrar choices:

The selection was deliberate. Every registrar the operator chose is known for: lax abuse handling, favorable jurisdictions, and takedown resistance. The "SEO Grandpa" pre-paid 5–10 years on each because he knew from experience that some registrars take months to act. He calculated that these "black" registrars would protect his domains the longest.

What actually happened: WebNic, PDR, Key-Systems — all acted within days. Same evidence, same operator, same code. Not one of them offered to help the scammer clean his VirusTotal record. Not one fabricated a "compromise" story. Not one used Twitter to defend the operator. They did their job.

Then there's NameSilo. Same evidence. Same operator. Same code hashes. Same DDoS-Guard. And NameSilo's response: fabricate a cover story, publicly lie, offer to remove VT detections, use Gold Checkmark to silence researchers.

In our entire career — 500,000+ phishing takedowns, hundreds of registrars — not a single one has ever offered to help a scammer remove VirusTotal detections. Not NiceNIC. Not the worst bulletproof registrars we've dealt with. None. Only NameSilo. We have extensive research on NiceNIC and other "black" registrars — not one of them would have dreamed of publicly defending an operator with active detections and then offering to clean his security record. That is not registrar behavior. That is partner behavior.
February 16, 2026
"You are incorrect with your report"
Operator email +
The operator contacted us directly, demanding we remove our report:
"Hi, You are incorrect with your report. There is no phishing going on with xmrwallet.com, this is the official domain name for xmrwallet. We are an open source crypto wallet that is non-custodial, we don't store seeds or keys, everything is done in your browser locally. Please remove your report on us, thank you. N.R."
He claimed the site was working normally. He did not claim he was hacked. He told us to remove our report. Screenshot →
February 2026
Story changes. Then come the threats.
Threats +
When confronted with the technical evidence — server-side TX hijacking, session_key exfiltrating wallet addresses and private view keys, 8 PHP endpoints, Google Analytics tracking victims — the operator stopped claiming innocence:
"What they use is what they need."
Then came the threats. The operator was confident. He had his registrar. He believed he was untouchable — that we could be silenced like everyone before us. He even suggested we could be taken to court through the registrar. He was wrong about all of it.
March 13, 2026
4 sentences. 4 verifiable lies.
4 Lies +
NameSilo's official corporate account publishes a public defense of xmrwallet.com:
"Our Abuse team conducted an in-depth review... the domain was compromised a few months ago... Prior to that, we had received no abuse reports... [working with the registrant to remove the website from VT reports]."
Lie #1: "Compromised" — We have SHA-256 hashes of the site code from before and after the alleged "compromise" window. The code never changed. The IP never changed. NameSilo invented this story. The operator himself never claimed compromise in his emails — he said the site was working normally. Lie #2: "No abuse reports" — 20+ from us alone since 2023, with delivery receipts. But it goes much further: public posts on BitcoinTalk (2021) and Reddit (as early as 2018) explicitly mention filing abuse reports with NameSilo about xmrwallet.com. These posts are still indexed. Anyone can verify. NameSilo claims they "had received no abuse reports" — the internet's own memory proves otherwise. Likely 100+ total from all reporters over the years. Lie #3: The operator was directly involved — he emailed us defending his code. Lie #4: A registrar publicly committing to remove VirusTotal detections for a known drainer. Not investigate. Not suspend. Help the scammer avoid detection. Full debunking →
March 16, 2026
@Phish_Destroy posts the rebuttals
Published +
Three rebuttals posted to Twitter, each citing the operator's own emails: "@NameSilo is lying", "@NameSilo is acting as press secretary for a $20M+ theft operation", and "Who is this operator to you?" Every tweet archived to Wayback Machine and GhostArchive within minutes of posting — before the lock came. We also tagged NameSilo under older threads from other researchers documenting xmrwallet going back to 2022.
March 18, 2026
Full case file submitted to ICANN & law enforcement
Filed +
Complete evidence package forwarded to ICANN Contractual Compliance and federal law enforcement. SHA-256 verified screenshots, archived tweets, email headers, operator communications, all delivery receipts for ignored abuse reports. Announced publicly on Twitter. This post appears to have triggered what came next.
Late March 2026
Gold Checkmark used to lock @Phish_Destroy
Silenced +
Days after the ICANN escalation, @Phish_Destroy is permanently locked. X Support: "Our support team has determined that a violation against inauthentic behaviors occurred." No tweet quoted. No rule cited. The signature of a human-agent decision via the paid Gold Checkmark live-support channel — concierge censorship you can buy.
April 15, 2026
"No violation. Account restored." — Still locked.
Contradicted +
On appeal, X Support: "Our automated systems have determined there was no violation and have restored your account to full functionality." Subject: "Your account has been restored." The account is still locked. The subscription is still billed. X's own automation cleared us. The Gold Checkmark override persists. Screenshot →
April 2026
Bing, DDoS, DMCA, content scrubbing
Suppressed +
All phishdestroy.io results removed from Bing. phishdestroy.io sustained a volumetric DDoS attack. Part of the attack traffic originated from IP addresses belonging to njal.la — NameSilo's own reseller. This is not attributed to NameSilo directly. It is documented as evidence that njal.la's infrastructure is used for DDoS attacks, not just domain registration for journalists and activists as claimed. DMCA requests filed against Google results. Coordinated reporting against GitHub repos, Medium articles, public mirrors. Every surface with a "report" button — weaponized.
May 2026
IPFS + Ethereum Name Service. No "report" button.
Archived +
Every takedown made the archive bigger. The operator and NameSilo occupy the same side. Both seem confident their arrangement will survive scrutiny. It won't. We are also aware that criminal cases related to xmrwallet are open in Europe. This archive will serve as evidence.
The unanswered questions

Who owns xmrwallet.com?
Why did NameSilo risk everything to protect them?

Evidence

What's in the files — and why.

Every claim is backed by source material. Every screenshot is SHA-256 fingerprinted. Every external link has at least one immutable archive copy.

View Full Evidence Archive — all screenshots, tweets, victim reports, Wayback links, SEO orders →

📧

Operator Emails

"N.R." ([email protected]) → [email protected], Feb 16. Defends site, demands removal. Never claims compromise.

Screenshot →
📜

4 Lies Debunked

NameSilo's Mar 13 tweet: 4 sentences, 4 lies. Each proven false with operator's own emails + code hashes.

Full analysis →
🔍

Code Hashes

SHA-256 before and after "compromise." Code never changed. IP never changed. NameSilo fabricated it.

Proofs →
📊

Technical Breakdown

8 PHP endpoints. session_key = base64(address + viewkey). raw_tx = 0. Server builds its own TX.

View →
📸

61 Evidence Screenshots

16 primary + 19 additional + 26 tweets. Emails, victim reports, DNS maps, VirusTotal, GitHub issues, operator taunts. All SHA-256 fingerprinted. Court-usable.

View all →
🌍

Wayback + GhostArchive

xmrwallet.com, .cc, .biz, .me archived. NameSilo tweet archived. GitHub repos archived. Independent copies.

View all →

Primary Evidence Screenshots — 16 SHA-256 Verified Files

These are the 16 core exhibits. An additional 19 screenshots (victims, GitHub issues, DNS maps, VirusTotal) and 26 tweet screenshots are shown below. Total: 61 evidence images in this archive.

#01 Operator "N.R." email
Feb 16 — defends site, demands report removal. SHA-256: 919b5ee4...
View
#01b PhishDestroy reply
Feb 16 — technical evidence of theft. SHA-256: ecced351...
View
#03 NameSilo's statement — 4 lies
Mar 13 — the tweet. SHA-256: ad29e1d3...
View
#04a "@NameSilo is lying"
Mar 16 — rebuttal citing operator emails. SHA-256: c556e13f...
View
#04b "Press secretary for $20M+ theft"
Mar 16. SHA-256: c9007cb4...
View
#04c "Who is this operator to you?"
Mar 16. SHA-256: bbb0ecd0...
View
#04d CryptOpus: "$10M+ stolen"
Mar 16 quoting Feb 22. SHA-256: 6ffd3020...
View
#05 Registrar comparison
3 registrars acted. NameSilo protected.
View
#06a X Support: "no violation"
Apr 15 — still locked. SHA-256: 2753d02f...
View
#06b "Account restored" — it hasn't
Apr 15. SHA-256: 482d0ebb...
View
#09 PhishDestroy platform
What they tried to silence. SHA-256: de5b430b...
View
#12 NameSilo tweet — GhostArchive
11K views. Permanent link
View
#13 Full tweet thread
GhostArchive permanent copy
View
#14 Thread: Lies Exposed
Mar 14
View
#15 "Abuse dept is a disgrace"
Mar 14
View
#16 "VT delisting service"
Mar 14 — NameSilo removing security detections for scammer
View

Documented Victims

590 XMR
~$177K — Sitejabber
~400 XMR
~$120K — isisB2B, BitcoinTalk Dec 2025
$200K+
Teletype Feb 2024
47 XMR
17 min after deposit — Reddit
30 XMR
5 hrs — bits.media (RU)
$20K
Bitazu Capital — Herald Sheets
28 XMR
Reddit Aug 2020
$3,250
Telegram (CN)
~C$1M
UNVERIFIED — Canadian victim, Ontario
⚠️
Unverified: ~C$1M Canadian victim. Contacted us claiming a police report filed in Ontario. No case number provided — we cannot verify. If true, Canadian law enforcement already has an open case. OPP / RCMP — check your records.

Community Reports & Warnings

Reddit Oct 2020 — "PSA: steals your funds" Reddit Nov 2020 — "Do not use xmrwallet.com" Reddit Dec 2020 — "is a scam" Reddit Mar 2021 — "wallet has been robbed" Reddit May 2021 — "xmrwallet.com scam" Reddit Dec 2022 — "is scamming me" Reddit Aug 2022 — "exit scam" BitcoinTalk — "[WARNING] Stay vigilant!" uBlock Origin — Added to blocklist ScamAdviser — Trust score: 1/100 Our tweets — vanlett.com/Phish_Destroy (LOCKED by Gold Checkmark) TweetFeed IoC — xmrwallet logged as threat indicator

"We had received no abuse reports" — the internet disagrees.

NameSilo claims in their March 13, 2026 tweet that they had never received abuse reports about xmrwallet.com prior to our contact. This is verifiably false. Public posts on BitcoinTalk (2021) and Reddit (as early as 2018) explicitly discuss filing reports with NameSilo about this domain. These posts are still indexed. They were not hidden, not encrypted, not on the dark web — they were on the two largest crypto forums on the internet. NameSilo's abuse team would have to be either spectacularly incompetent or deliberately lying. We know which one it is.

For regulators: Is there an authority that can audit a registrar's abuse ticket system? Subpoena NameSilo's internal records. Compare the number of reports they actually received vs. what they claimed publicly. The gap between those numbers is measurable, provable, and potentially criminal. They spent enormous effort scrubbing the internet of evidence against xmrwallet — but they couldn't scrub BitcoinTalk and Reddit.

A note about Monero and the victims you can't identify.

Monero is private. That's the point. It means victims can't trace their stolen funds. But it also means something else: the operator doesn't know who he stole from.

Over 8 years and an estimated $100M+, the xmrwallet operator drained wallets indiscriminately. Every user who deposited Monero and clicked "send" had their transaction hijacked. The operator has no idea who those people were. Some were retail crypto users. Some were investors. Some were researchers. And some — statistically, inevitably — were people you really do not want to steal from.

We are researchers. We publish evidence and move on. But not everyone who lost money on xmrwallet.com will respond by writing a report. The operator should consider this. NameSilo should consider this. You helped protect a thief who stole from people he cannot identify, in amounts he cannot calculate, in a currency he cannot trace. Some of those people will find him anyway. That is not a threat — it is arithmetic.

Social Media

Freedom of Speech — or Freedom of Scam?

View full bot analysis — 68+ live bot posts vs ~100+ deleted victim warnings →

Warning tweets about xmrwallet — check which survived:

@Considered_ @cryptohako @BitBeacon_xyz @alferg1 @JamesAlphaXYZ @singhsoro ($20K victim)

SEO spam bots from 2018 — all still alive:

@venturecanvas (2018) — STILL LIVE — hundreds of social bookmarking bots with xmrwallet backlinks, all indexed.

We estimate 100–200 tweets total have been deleted across all accounts that ever mentioned xmrwallet.com truthfully — our reports from @Phish_Destroy, independent researchers, victim complaints, security warnings. All gone. Meanwhile, the operator purchased a Kwork service: "social media link blast — Twitter 50 posts, 500 rubles" (~$5 USD). He bought multiple packages. Hundreds of spam bot posts promoting xmrwallet.com from 2018 — every single one still live. Not one removed.

X/Twitter's actions demonstrate a clear double standard: bot spam purchased for 500 rubles on a Russian freelance marketplace remains untouched, while victim reports about a $100M+ theft and researchers with SHA-256 verified evidence get locked. X/Twitter should investigate which employees are processing these reports and why.

And to be clear: X/Twitter stole $200 from us. Subscription payments charged for accounts we cannot access. We submitted 5+ data export requests across 3-4 accounts — all denied or ignored. Those accounts contain approximately 200,000 tweets combined, each of which is potential evidence of someone's crime — a phishing site, a registrar's negligence, a victim's report. X is not just silencing us. X is withholding evidence of mass cybercrime and charging us for the privilege.

But NameSilo also managed to get some of our most inconvenient posts removed. For investigators: this is not a problem — request the deletion logs, verify who filed the reports, check the timestamps. Every removal is traceable. Every moderator action has a paper trail. The posts NameSilo wanted gone the most are exactly the ones that matter.

NameSilo IS the operator. Or the partner. There is no other explanation.

After everything that happened — after the public exposé with 11K views, after 4 lies debunked with the operator's own emails, after ICANN filing, after law enforcement referral, after 3 other registrars suspending the same domains on the same evidence — the site is still live.

Ask yourself: what legitimate registrar would endure this level of public humiliation and regulatory risk for one client? What company would publicly commit to removing VirusTotal detections for a known drainer? What abuse department would fabricate a "compromise" story that contradicts the operator's own emails?

None — unless they own it or profit from it directly.

NameSilo, LLC (IANA #1479) is either the owner of xmrwallet.com, or a direct financial partner in a $100M+ theft operation. There is no third option that explains their behavior. A client-registrar relationship does not produce this level of protection.

And there is a Russian intelligence trail here.

The infrastructure patterns, the operational security methodology, the CIS-marketplace freelance orders, the DDoS-Guard hosting, the suppression playbook — this is not a solo Canadian "volunteer" running a hobby project. This is an operation with institutional backing. The Russian connection is obvious to anyone who has worked in CIS cybercrime investigation. We have evidence. Investigators will receive it upon request.

🔐 How we know about the FSB connection — the full story click to expand

We've known xmrwallet.com was a phishing operation for a long time. An acquaintance of ours lost money there. We tried to get the site taken down — multiple times, over several years. You now know their methods because we've demonstrated them on ourselves and documented every step.

During this period, we wrote to websites that hosted paid promotional articles about xmrwallet — the Kwork-ordered SEO spam. We asked them to verify the claims in the articles, or at minimum remove the false information so people would stop falling for the scam. Most ignored us. One replied.

The reply came from a personal email address. The kind you can look up. We did. Not through any sophisticated OSINT — through a basic Telegram bot. The kind anyone can use. The result was unambiguous: the person's name, position, and employer came back instantly. The employer was the FSB.

The response was in Russian. It was rude. He threatened to "take our servers" and asked where we keep "the backups." We told him: under his mother's pillow. He didn't reply after that. We don't know what backups he was referring to. We found it funny. The article is still live on that site.

That's the FSB connection. Not speculation. Not pattern analysis. A direct response from a person whose employment at a Russian intelligence agency is publicly verifiable through their own operational security failure — using a personal email tied to their real identity. Classic. They suppress researchers and threaten server seizures, but can't be bothered to use a clean email address.

And if the FSB needs a backup of this archive too — it's on IPFS now. Immutable. Decentralized. No pillow required.

We will not name the website, the person, or provide the email address publicly. This information is available to law enforcement upon request. Contact [email protected].

A message to every moderator, every trust & safety employee, every platform admin who deleted a victim's post, locked an account, or removed a warning about xmrwallet.com:

We ask you to publicly explain why you did it. What rule was broken? What policy was violated? You deleted the truth. You silenced victims. You aided a $100M+ theft operation. That is not moderation — that is complicity. Every deletion is logged. Every removed review is traceable. Every locked account has a paper trail. Investigators can and will request those records.

To ICANN Contractual Compliance:
We submitted the full case file on March 18, 2026. Every screenshot. Every email. Every hash. Every lie debunked. Every victim documented. Every suppression attempt logged. You have it all. NameSilo, LLC (IANA #1479) — your accredited registrar — is actively protecting a Russian-linked scam operation that stole $100M+. The site is still live. The domain is still active. The operator posted a farewell letter and the site is STILL UP. Are you comfortable with this? Is this what ICANN accreditation means? A registrar can publicly lie, help a scammer remove security detections, use paid platform access to silence researchers — and keep their accreditation? We are waiting for your answer. The victims are waiting. The evidence is public. The world is watching.

A message from a victim — and a question about ICANN accreditation:
One of the victims contacted NameSilo and was told something along the lines of their "ICANN license" protecting them. Let's be absolutely clear about what ICANN accreditation is and what it is not:

ICANN accreditation is a license to register domain names. It is not a license to commit fraud. It is not a license to cover up money laundering. It is not a license to protect scam operators. It is not a shield against criminal prosecution. It is not a supreme court ruling that permits NameSilo to help a thief steal $100 million. It does not grant immunity from law enforcement, civil lawsuits, or regulatory action.

An ICANN-accredited registrar is more accountable, not less. The RAA (Registrar Accreditation Agreement) explicitly requires abuse handling. NameSilo signed this agreement. NameSilo violates it every day that xmrwallet.com remains active.

To victims: do not let anyone tell you that "ICANN accreditation" protects a registrar from consequences. It doesn't. Sue them. File criminal complaints. Report to your national cybercrime unit. Report to the Arizona Attorney General. NameSilo is a US company in Phoenix, AZ. They are subject to US law, regardless of what ICANN accreditation they hold. A driver's license doesn't protect you from a murder charge.

The ICANN Accreditation Theater

Here is something that genuinely baffles us. In every single abuse response, in every reply to every complaint, NameSilo cites their ICANN accreditation. Every time. Like a mantra. Like a prayer. Like a magic spell that makes abuse reports disappear.

"As an ICANN-accredited registrar..." — yes, and? Do you understand how absurd this sounds to anyone who works in this industry? Let us translate this into terms everyone can understand:

"We are ICANN-accredited" = "We have an SSL certificate"
"We are ICANN-accredited" = "We have a Cloudflare account"
"We are ICANN-accredited" = "We paid a deposit and filled out a form"
"We are ICANN-accredited""We are above the law"
"We are ICANN-accredited""We cannot be sued"
"We are ICANN-accredited""Our crimes are sanctioned"

ICANN accreditation is a commercial license. You pay a deposit. You fill out paperwork. You agree to follow the RAA (Registrar Accreditation Agreement). That's it. It does not make you a regulator. It does not make you untouchable. It is not a fund that covers the actions of fraudsters you protect. It is not a judicial shield. An SSL certificate on a phishing site doesn't make it legitimate — phishers buy SSL certificates every day, including the expensive EV ones. A Cloudflare account doesn't make you safe — every malware distributor has one. And ICANN accreditation doesn't make you honest — it just means you paid the fee.

And it gets better. NameSilo doesn't just cite ICANN accreditation in abuse responses — they put it in their financial filings. In the Q3 2025 earnings release filed on SEDAR+ (November 28, 2025), the company describes itself as: "As an accredited ICANN registrar, Namesilo is one of the fastest-growing domain registrars in the world." This is in an earnings report. For investors. On a securities filing platform. Instead of disclosing that 81.5% of their "domains under management" are phantom registrations with zero traffic, they lead with ICANN accreditation. It's not just a reflex at this point — it's a securities disclosure strategy. Wrap the phantom numbers in the ICANN badge and hope nobody checks. We checked. Source: Stockwatch →

By the time an ICANN complaint is reviewed, processed, and acted upon, the scam domain has already expired, the money is gone, and the victims have given up. The process is slow by design. Filing an ICANN complaint is like calling the fire department after the building has burned down, been demolished, and turned into a parking lot. This is not a check. This is not oversight. This is theater.

Case in point: Trustname.com (IANA #4318) — an ICANN-accredited registrar. "Fastest growing independent registrar." Our investigation found: Estonian tax filings showing €120 in revenue, one employee, negative equity, and a company deletion notice. Both owners are Belarusian. The registrar openly markets bulletproof hosting, serves scam casinos, 18+ content, illegal pharmacies, and fraud operations. ICANN-accredited. Does that accreditation make them legitimate? Does it protect the victims of the scam casinos they host? Of course not. It just means they filled out the same form NameSilo did.

Maybe we should buy ICANN accreditation too. Then we can write it everywhere:
"Hi, this is PhishDestroy. ACCREDITED BY ICANN, CREDENTIALED BY DOMAIN CCK, PAYMENT PROCESSED BY A REGISTRAR AND A HOSTING PROVIDER."
Sounds impressive, right? Sounds like it means something? It doesn't. And when NameSilo writes it in every response to every abuse report they ignore — it doesn't mean anything either. Except that they think it does. And that delusion is part of the problem.

RAA Section 3.18 — the clause NameSilo pretends doesn't exist.
The Registrar Accreditation Agreement — the document NameSilo signed — includes Section 3.18, which explicitly requires registrars to investigate and respond to abuse reports. Not ignore them. Not delete them. Not fabricate cover stories. Not offer to clean VirusTotal detections for the reported domain. Investigate. Respond. Act. We started citing RAA 3.18 in every single report we file. NameSilo's response? The same ICANN accreditation mantra. They invoke the very authority whose rules they violate — in the same sentence where they violate them. It would be comedy if people weren't losing millions.

Maybe NameSilo has a special ICANN — a private edition, issued by the grandfathers from Lubyanka? A bespoke accreditation where 3.18 reads: "The registrar shall ignore all abuse reports, help the scammer clean his record, and cite this accreditation as justification." Because that's how they behave. They use the ICANN badge the way a corrupt cop uses a police badge — not to enforce the law, but to break it with impunity.

ICANN is not the police. It's the DMV.

ICANN was created in 1998 when the internet was an academic project, not a battlefield. Its mandate is technical stability — making sure .com resolves the same in Tokyo, Berlin, and Moscow. It coordinates the root DNS zone, distributes IP addresses (IANA), and maintains protocol standards. Without ICANN, the internet fragments. That's why it exists. Not to police fraud. Not to protect victims. Not to investigate money laundering.

The RAA is a contract, not a law. Violating RAA 3.18 is breach of contract, not a crime. ICANN's ultimate sanction — revoking accreditation — takes years, creates precedent they fear, and risks thousands of domains in limbo. They won't do it. NameSilo uses a DMV certificate as an alibi in a murder trial. ICANN accreditation doesn't protect you from securities fraud, money laundering, or aiding a $100M theft. The real enforcers are FinCEN, SEC, FBI, and the Arizona Attorney General. ICANN is a decoration.

This is not the first time. Artists Against 419 (2018).

Before xmrwallet, before PhishDestroy, another organization tried. In 2018, Artists Against 419 filed ICANN Compliance complaint UNY-783-11184, accusing NameSilo of being a "bullet-proof registrar" for scammers. Their evidence: reseller QHoster (linked to NameSilo) was responsible for 60% of malicious domains they tracked. NameSilo's response: "We are not a hosting provider" and "We cannot determine the legality of content." ICANN's response: closed the complaint. Reason: the registrar "did not receive the report" or the issues "were outside ICANN's scope."

That was 2018. It's 2026. Nothing changed. The same registrar. The same abuse pattern. The same ICANN non-response. An ICANN Notice of Breach will not fix NameSilo — because abuse is not a bug in their business. Abuse IS the business. You don't send a code-violation notice to a building that was designed to be a front. You send law enforcement.

Why ICANN can't act — and why DOJ won't

Abuse, phishing, scam protection, money laundering, FSB connections — all outside ICANN's mandate. They say so themselves. RAA 3.18 requires "investigating abuse," but ICANN has no investigators, no courts, no power to force-close domains, and no mechanism to verify that a registrar actually investigates. For ICANN, "we received the letter and replied" = compliance. Whether the reply says "we'll remove it" or "dismisses the complaint entirely" — ICANN doesn't read it.

NiceNIC, Trustname, NameSilo — all technically compliant: pay fees? Yes. Submit data escrow? Yes. WHOIS works? Yes (via PrivacyGuardian). Their business model is ignoring abuse. But ICANN can't punish that, because ICANN doesn't evaluate the content of abuse responses. For bullet-proof registrars outside the US, ICANN's only option is revoking accreditation — a process that takes years and leaves thousands of domains in limbo. ICANN fears technical collapse more than it fears fraud.

NameSilo is a special case. It's a US company in Phoenix, Arizona — subject to US law (Arizona AG, FBI, FinCEN, SEC). ICANN shouldn't need to handle this. This is DOJ's job. But DOJ is silent too:

ICANN — fears losing a "top 10 registrar" with 5M+ domains. Market weight matters.
DOJ — busy with Doppelganger, LabHost (NameSilo domains were seized, but LLC not named as defendant).
NameSilo — pays fees, submits escrow, doesn't violate technical RAA clauses. Formally clean.
Result — everyone has jurisdiction, nobody acts. The gap between "technically compliant" and "actively criminal" is where NameSilo lives.

This is not a single abuse incident that ICANN can address with a Notice of Breach. This is a systemic business model built on enabling cybercrime — phishing, crypto drainers, darknet services, and what the financial data strongly suggests is money laundering at scale. ICANN compliance letters don't fix that. Federal prosecution does.

njal.la is NameSilo. Period.

NameSilo's favorite defense: "That's our reseller, njal.la. We have no control." WHOIS says otherwise. Look up any njal.la domain — the WHOIS registrar field reads NameSilo, LLC. Not njal.la. Not some independent entity. NameSilo. Whatever internal partnership or reseller agreement they have is their private business. To the outside world — to ICANN, to law enforcement, to victims, to WHOIS — these are NameSilo domains under NameSilo's accreditation and NameSilo's responsibility.

Njalla is a legitimate privacy-focused registrar founded by Peter Sunde (of Pirate Bay). It serves journalists, activists, and privacy-conscious users. But its privacy features — registrant shielding, no public WHOIS, minimal paper trail — were systematically exploited to register crypto scam domains and drainers under NameSilo's accreditation. When abuse reports arrived, NameSilo pointed to njal.la; njal.la pointed to privacy. The domains stayed up. The money disappeared. The privacy shield became an abuse shield. Their internal arrangements do not override WHOIS data, ICANN rules, or the law. You cannot outsource your ICANN obligations to a privacy reseller and then claim innocence when domains under your accreditation steal $100 million.

How other registrars compare — from someone who scans hundreds of thousands of domains.

We are not theorists. We scan, analyze, and report domains at scale — hundreds of thousands of them. We work with registrars every day. Here is what we see:

WebNic (~800K domains)

Improving. They now have a real abuse handler — an actual human who reads reports and takes action. He doesn't yet realize their IPs are being blocked by Cloudflare (sends screenshots of "site not working" instead of "phishing"), but there is visible progress. A registrar that is trying to get better.

NiceNIC (Russian, not Chinese)

Hopeless. Will only improve when they cease to exist. A registrar whose business model is built on not responding to abuse. But even NiceNIC never publicly defended a scammer on Twitter. Even NiceNIC never offered to clean VirusTotal for a drainer. Even they have limits.

NameSilo (IANA #1479)

Invented its own ICANN. Created its own WHOIS. Plays by its own rules. Uses accreditation as a weapon, not an obligation. Even Russian registrars like Reg.ru stopped doing what NameSilo does around 2021. NameSilo is still doing it in 2026. They are not a rogue registrar. They are a criminal enterprise with an ICANN badge.

We are not ICANN experts. We are not lawyers. But we destroy 500,000+ phishing domains and can see what entire regulatory bodies apparently cannot: a registrar that invents its own laws, hides behind its own resellers, cites its accreditation as a defense while violating its accreditation's core requirements, and launders money through phantom domain registrations.

To U.S. federal and state authorities — particularly the State of Arizona:
NameSilo, LLC is incorporated and operates in Phoenix, Arizona. This is your jurisdiction. A company registered in your state is actively protecting a criminal operation with documented ties to Russian-speaking threat actors — an operation that has stolen an estimated $100 million or more from victims worldwide, including U.S. citizens. The evidence is public. The ICANN filing is on record. The operator is identified. The registrar's public lies are archived and debunked. The suppression campaign against researchers and victims is documented down to individual platform reports.

This is not a gray area. This is not a "business dispute." This is a U.S. company facilitating ongoing international fraud — possibly with connections to Russian intelligence services. The infrastructure patterns, the operational methodology, the CIS-marketplace freelance orders, the DDoS-Guard hosting through Russian-jurisdiction providers — this is a textbook state-adjacent cybercrime operation hiding behind a US registrar.

FBI, DOJ Cyber Division, Arizona Attorney General, FinCEN — the evidence package is ready. Contact us and we will provide everything, including materials not published here.

How long will a US-incorporated company be allowed to run interference for a $100M theft operation? Wake up.

A note specifically for the FBI: A US-registered company in Phoenix, Arizona, protecting a Russian-linked cybercrime operation for a decade, fabricating public statements, suppressing security researchers, assisting in VirusTotal delisting — this is not normal registrar behavior. This is the behavior of an asset. Ask them why. Ask them who. Ask them how much. And ask before the evidence trail goes cold — though we've made sure most of it can't be deleted anymore.

We know that European authorities have requested information from X/Twitter regarding related cases. We also know they reportedly received no response. So let's be clear about what's happening: a US company — NameSilo — operating on US soil, with documented connections to Russian-speaking threat actors and infrastructure patterns consistent with FSB-adjacent operations, is using various methods of influence to erase the truth about itself, remove malware detections from VirusTotal, suppress researchers, and silence victims. And everyone looks the other way?

Is this what the United States stands for in 2026?

And if no regulator in the world can verify how many abuse reports were actually filed and ignored — if a registrar can simply say "we received no complaints" and delete the evidence using DMCA requests paid for with stolen money — then what is the point of regulators? If an Arizona-registered company with Russian-linked operators can steal $100 million, suppress every victim report, buy fake reviews, silence researchers through paid platform access, and face zero consequences — then ICANN accreditation is a rubber stamp and the entire abuse handling framework is theater.

Prove us wrong. Investigate. Verify the number of reports NameSilo actually received. Subpoena their abuse ticket system. Compare it to what they claimed publicly. The gap between those numbers is the measure of their complicity.

Open Challenge

Prove that a single word we published is false —
and we will take everything down ourselves.

One word. One claim. One screenshot. Show us what's wrong.

0 factual rebuttals received
in 10 years of operation & months of investigation

Across hundreds of pages of evidence, dozens of victim reports, and 61 SHA-256 verified screenshots — not the operator, not NameSilo, not X, not anyone has produced a single factual rebuttal. Not one.

But if everything we say is true — then DO SOMETHING.

They are stealing millions. Right now. Today. The site is live. The domain is active. Victims are losing money while you read this. Act now.

We did not spend months of our lives building this archive, and victims did not lose millions of dollars, so that a Russian-speaking scammer could post one lie on Twitter and then cry that we saved it. NameSilo wrote 4 false sentences from an official corporate account. We archived them. They got upset that the archive exists. That is their entire defense: Their entire defense is not “it's false” — it's that the archive exists at all.

That's not how this works. You said it. We saved it. The world can read it. Deal with it.

NameSilo's response playbook — and our pre-written answers

We've dealt with enough registrars to know exactly what they'll say. Here's the script, and here's why it doesn't work.

🎙 "We are an ICANN-accredited registrar."

Yes. We know. You mentioned it in your abuse responses, your Twitter posts, your Wikipedia page, and your Q3 2025 SEDAR+ financial filing. Trustname.com (IANA #4318) is also ICANN-accredited — with €120 in revenue and a company deletion notice. ICANN accreditation is a commercial license, not a character reference. Next.

🎙 "The domain was compromised."

We have SHA-256 hashes of the site code from before and after the alleged "compromise window." The code never changed. The IP never changed. The operator himself never claimed compromise — he said the site was working normally. You invented this story. We have the receipts.

🎙 "We had received no abuse reports."

20+ from us alone, with delivery receipts. Public posts on BitcoinTalk (2021) and Reddit (2018) explicitly mention filing reports with NameSilo about xmrwallet.com. These posts are still indexed. The real total from all reporters is likely over 100. Would you like us to publish the delivery receipts?

🎙 "Dead domains are normal in our industry."

Correct. 15-21% is the industry baseline across GoDaddy, Hostinger, Tucows, and Network Solutions. You're at 32.2% — 2x the baseline. With a 615% year-over-year spike. And 10,000-17,000/day bulk runs. Namecheap is in the same market at the same price and sits at 32.6%. Explain the gap. We'll wait.

🎙 "njal.la is an independent reseller."

WHOIS says NameSilo, LLC. Not njal.la. Your internal arrangements don't override public registry data, ICANN rules, or the law. If njal.la domains are under your accreditation, they are your responsibility. You cannot outsource accountability.

🎙 "We will pursue legal action."

The operator threatened the same thing in February. It's May. We're on IPFS now. Every claim in this archive is sourced, SHA-256 verified, and backed by your own public statements. Truth is an absolute defense. Sue us — and this archive becomes court exhibit A through Z. Discovery will be fun.

🎙 [Silence]

Also an option. The one they've chosen so far. Every day of silence is another day the evidence sits on a decentralized network, indexed by search engines, archived by researchers, and read by the people who will eventually act. Silence is not a strategy. It's a countdown.

NameSilo & the SEO Grandpa playbook — same tricks:
NameSilo also loves buying reputation. Their Forbes Advisor "review" comes with a disclosure: "We earn a commission from partner links." Sponsored content dressed as editorial. Sound familiar? The operator buys articles on Kwork. NameSilo buys them on Forbes. Same playbook, different budget.

How much does this actually cost? We've researched the purchased-article industry extensively. A placement in Forbes main starts at roughly $50,000. Regional Forbes editions (Forbes Mexico, Forbes India, etc.) are cheaper, and for an additional fee — roughly 2x the base price — the publication will remove the "sponsored" or "partner content" label entirely, making paid content indistinguishable from editorial. NameSilo's article at least still carries a disclosure. The question is: did they pay extra for the main Forbes, or did they settle for the cheaper option with the label? Either way, this is purchased legitimacy at industrial scale — the same industry the xmrwallet operator uses at 500 rubles per article on Kwork. The difference is only the price tag.

And just like the xmrwallet operator deletes negative Trustpilot reviews — NameSilo does the same. Check their Trustpilot page: waves of 5-star reviews from US-based accounts with exactly 1 review each. Classic bot pattern. They delete negative reviews and flood with fake positives. The registrar and the scammer use the same reputation manipulation techniques. Coincidence? At this point — we don't believe in coincidences.

Even Wikipedia noticed: the NameSilo Wikipedia article has a flag on the "Reception and industry coverage" section marking it as promotional content that requires editing for neutral point of view. They can't even keep their Wikipedia page clean of paid PR.

The Registrar

But let's talk about NameSilo itself.

How we stumbled onto this.

We never set out to analyze NameSilo's entire domain portfolio. We work with registrar data constantly — it's part of what we do when tracking phishing infrastructure. We know that a large percentage of domains on the internet are dead. That's normal. People buy domains and forget about them. Companies register names defensively. Speculators sit on inventory. We get it. We never assumed that "dead domain = suspicious."

But when we were scrolling through the NameSilo dataset — 5.18 million rows — something felt off. Not a statistic. Not a number. Just a visual impression. Row after row of gibberish domain names. sdf8k3jx.sbs, x9wqm2.cfd, aaa111bbb.xyz — with no IP, no email, no phone, no Majestic rank. Just... nothing. Thousands of them. Tens of thousands. The sheer density of emptiness was unusual. We've looked at datasets from GoDaddy, Namecheap, Tucows — they all have dead domains, but the ratio of obviously-random-garbage to real-looking names was different at NameSilo. It was visible to the naked eye.

So we decided to count. Not to prove a theory — we didn't have one. Just to see if our gut feeling was backed by numbers. We pulled datasets from 8 registrars, 130 million domains total, applied the same methodology to all of them, and compared.

The gut feeling was correct. NameSilo was 10 percentage points above its closest competitor. The dead domain rate was 2x the industry baseline. And when we dug deeper — the 615% year-over-year spike, the 10,000 domains/day bulk runs, the junk TLD concentration — it stopped looking like neglect and started looking like a pattern. We didn't go looking for money laundering. The data showed it to us.

Suspected Money Laundering Flow

$100M+ stolen XMR
    │
    ▼
Crypto → Fiat conversion (mixers, DEX, OTC)
    │
    ▼
Bulk domain purchases at NameSilo
    │    10,000-17,000 domains/day
    │    $26.5M wholesale on dead domains
    │    96% no email, 99.9% no web presence
    │
    ▼
NameSilo reports "legitimate revenue"
    │    C$65.5M revenue (2025)
    │    C$133M market cap (~US$98M)
    │    P/E 143.8x (industry avg: 21x)
    │
    ▼
Forbes "review" ✓   Wikipedia "coverage" ✓   Trustpilot bots ✓
    │    Purchased legitimacy
    │    All paid. All labeled. All provable.
    │
    ▼
Clean money out  →  Stock (CSE: URL)  →  "Legitimate tech company"

Why are 81.5% of NameSilo domains dead?

DNS scan: 32.2% no IP + 33% parking stubs = 2.82M (54.4%). Full economic analysis (age, MX, content, patterns): 4.22 million dead domains — 81.5% of 5.18M. There are only 3 possible explanations. All of them are damning:

Theory 1: Money Laundering

Stolen funds converted to domain purchases. Registrar gets "revenue." Domains are never used — the transaction IS the purpose. $50.8M/year phantom profit from dead registrations.

Theory 2: Self-Dealing

NameSilo buys domains from itself to inflate revenue. C$65.5M revenue looks great for investors. But 81.5% of domains are dead. Real active-customer revenue is ~C$12M. The stock trades at P/E 143.8x on phantom numbers. Securities fraud.

Theory 3: Front Operation

The registrar was never built for real customers. The Win98 panel, the $15.56 .com price (#96 of 130), the ignored abuse reports — these aren't failures. They're features. The real product is the transaction itself: accept money, register domain, report revenue, never ask questions. A front doesn't need a good UI. It needs a good accountant.

The NameSilo Pyramid — 5.18 Million Domains Deconstructed

What happens when you actually check if anyone uses these domains?

Total domains
5,179,405
100%
No DNS + parking stubs
2,882,774
56%
Has a real IP address
2,296,631
44%
HTTP alive (actually responds)
~958,188
18.5%
Real business (org/company)
54,855
1.06%
Top-million (has real traffic)
17,875
0.35%
Tranco top 10K
58
lol

What this means in human terms:

99.65%
of NameSilo's portfolio has
ZERO confirmed traffic
1 : 1.3
For every 1 top-million domain,
1.3 phishing domains
387x
Phishing domains outnumber
Tranco top-10K by 387x

The "dirty ratio" depends on what you compare against:

vs Total (5.18M):      0.43%"barely anything"
vs Live IP (2.3M):     0.98%"almost 1%"
vs HTTP alive (958K):  2.34%"every 43rd site"
vs Top-million (17.8K): 125.6%"more scam than legit"
vs Real business (54.8K): 40.9%"1 phishing for every 2.5 businesses"

This is why NameSilo buys phantom domains. When you compare 22,000 malicious domains against 5.18 million total, it's "0.43% — barely anything." But when you strip away the dead weight and compare against domains that actually work, the picture changes completely. The phantom domains are a statistical smokescreen.

Why would anyone choose NameSilo?

A serious question. We looked at every possible reason and tested each one.

Every ICANN-accredited registrar sells the same product — domain names. The TLDs are identical. A .com from NameSilo and a .com from Namecheap point to the same root servers, managed by the same registry (Verisign). There is zero technical difference. So why would a customer choose NameSilo? Let's check every possible reason:

Is it the price?

We checked .com prices across 136 ICANN-accredited registrars using tldes.com (independent price comparison, updated live). Here's where NameSilo actually ranks:

NameSilo's own "vs Other Registrars" page compares their $17.29 against Squarespace ($20), GoDaddy ($23.98), and Name.com ($17.99) — cherry-picked expensive competitors with inflated prices. They conveniently forgot the 95+ that are cheaper. Here's the comparison they didn't want you to see:

#.com RegistrarRegisterRenewTransfer
1Spaceship$2.90$10.18$8.17
3GoDaddy$5.19$23.19$13.19
6Namecheap$6.99$14.98$11.08
14Dynadot$8.99$10.88$10.49
23Porkbun$10.08$11.08$10.08
26Cloudflare$10.46$10.46$10.46
...95 registrars cheaper than NameSilo
~96NameSilo 🤡$15.56$17.29$9.80
#96
Out of 130 registrars
.com register: $15.56
Bottom 26%
5.4x
More expensive than #1
Spaceship $2.90 vs NameSilo $15.56
95+
Cheaper registrars
All ICANN-accredited
Same product. Same TLD.

95 ICANN-accredited registrars sell .com cheaper than NameSilo. Not 5. Not 20. Ninety-five. Namecheap is 2.2x cheaper. Spaceship is 5.4x cheaper. Cloudflare is 1.5x cheaper. All sell the exact same product — a .com domain from the same Verisign registry. All include free WHOIS privacy. All are ICANN-accredited. So why does NameSilo have 5.8 million domains?

Their own comparison page is deliberately misleading.

On namesilo.com, the "NameSilo vs Other Registrars" comparison shows their $17.29 .com against Squarespace ($20.00), GoDaddy ($23.98), and Name.com ($17.99). But wait — those aren't even the real prices. On tldes.com, GoDaddy is $5.19 (not $23.98) and Name.com is $11.24 (not $17.99). NameSilo used inflated renewal/promo-excluded prices for competitors while showing their own registration price. Both GoDaddy and Name.com are actually cheaper than NameSilo at registration. They didn't just cherry-pick expensive competitors — they inflated the competitors' prices too. And they excluded Spaceship ($2.90), Namecheap ($6.99), Cloudflare ($10.46), Porkbun ($10.08), Dynadot ($8.99), and 100+ other cheaper registrars. This is not a comparison — it's marketing fraud. And they highlight "BULK DISCOUNTS" as a unique feature — because of course they do. Bulk discounts for bulk phantom purchases.

They also advertise "Over 150+ Payment Options Accepted". We counted. Their checkout page lists: Visa, Mastercard, Amex, Discover, JCB, Elo, UnionPay (7 cards), PayPal, Alipay, Venmo (3 web wallets), Bitcoin (1 crypto), and NameSilo Account Funds (1 internal). That's 12 payment methods. Not 150. We looked everywhere — no bank transfers, no wire, no other crypto, no invoice billing. Twelve. They inflated the payment count by 12.5x on their own website. The same way they inflate domain counts, revenue figures, and competitor prices. It's a pattern.

Source: tldes.com/com — independent price comparison, 136 ICANN-accredited registrars, live prices. Also cross-referenced with tld-list.com. Verify yourself — the data is public.

"Cheapest on the Internet" — across 12 TLDs

NameSilo's own claim: "we have the cheapest domain name registration prices on the Internet." Here's every TLD checked.

TLDReg $Renew $RankCheap $TotalCheapest is...
.com$15.56$17.29#96$2.90/130Spaceship 5.4x cheaper
.net$14.36$15.95#46$5.20/130Domain.com 2.8x cheaper
.org$9.71$10.79#33$4.62/129Unstoppable 2.1x cheaper
.xyz$1.79$15.79#8$0.98/118Renewal 8.8x registration!
.info$3.75$29.49#17$0.67/126Renewal 7.9x registration!
.io$31.49$69.99#9$14.98/113Spaceship 2.1x cheaper
.top$1.88$4.88#8$1.18/90Spaceship 1.6x cheaper
.app$15.29$16.99#21$4.98/90Spaceship 3.1x cheaper
.tech$7.99$68.99#41$1.53/118Renewal 8.6x registration!
.shop$1.99$38.99#21$0.85/98Renewal 19.6x registration!
.me$8.99$19.99#18$1.98/109Spaceship 4.5x cheaper
.club$1.19$19.49#1$1.19/116#1 for registration only. Renewal: #39 ($19.49).
11 of 12
TLDs where NameSilo is in the cheap half
Except .com — the one that matters
1 of 12
TLDs where NameSilo is #1
.club only. And renewal is #39.
19.6x
Worst renewal trap (.shop)
$1.99 register → $38.99 renew

The Renewal Trap — cheap registration, predatory renewal

NameSilo's "cheap" TLDs are a bait-and-switch: .shop $1.99 → $38.99 (19.6x), .tech $7.99 → $68.99 (8.6x), .xyz $1.79 → $15.79 (8.8x), .info $3.75 → $29.49 (7.9x). Register cheap, renew expensive. But dead domains don't renew — which is exactly the point. If you're buying domains to wash money, you only care about the $0.99 registration price. The $14.95 renewal never happens because the domain expires after 1 year. This is why 98% of dead .buzz domains are 1-year registrations.

NameSilo owns 19.8% of ALL .sbs domains on Earth

374,910 out of 1,895,100 global .sbs registrations are at NameSilo. One registrar holds one-fifth of an entire TLD. For context: NameSilo holds 1.1% of .com. The expected share for a "top 10 registrar" is 2-5% of any TLD. 19.8% in a single junk TLD from their named partner ShortDot is not market success — it's a captive pipeline.

.sbs: NameSilo 19.8% of 1.9M global — .vip: 4.1% of 1.8M — .xyz: 3.6% of 10.2M
.info: 3.3% of 6.5M — .top: 2.8% of 6.6M — .com: 1.1% of 186M

Is it the UX?

Namecheap
Modern UI, 2FA, real-time DNS, apps
Cloudflare
Best-in-class dashboard, zero-markup
💾
NameSilo
Windows 98. Their CEO admits it.

Is it the support?

We tested it. We sent the same abuse report (xmrwallet.com) to multiple registrars. Namecheap: responded and acted. WebNic, PDR, Key-Systems: responded and acted. NameSilo: ignored 20+ reports, publicly lied, offered VT delisting for the scammer, used Gold Checkmark to silence researchers. Their "24/7 Customer Service" (investor deck, slide 6) apparently does not extend to abuse victims.

Is it the ICANN accreditation?

Every registrar in this comparison is ICANN-accredited. That's literally the requirement to sell gTLD domains. There are ~2,500 ICANN-accredited registrars worldwide. NameSilo is not special. Trustname.com (IANA #4318) is also accredited — with €120 in revenue. ICANN accreditation is the domain equivalent of having a business license. It means you filled out the form. It does not mean you are trustworthy, affordable, or competent.

Is it the design? The brand? The reputation?

Their Wikipedia page is flagged as promotional. Their Forbes review is paid placement. Their Trustpilot has bot review patterns. Their admin panel looks like it was designed by the same person who orders SEO articles on Kwork for 500 rubles. Their CEO admitted they need a "complete UX overhaul" after seven years. Their Q1 and Q2 2025 press releases are identical copy-paste.

So why does NameSilo have 5.18 million domains?
Not price. Not UX. Not support. Not reputation. Not ICANN (everyone has it). Then what? The only explanation left is that most of these domains are not bought by real customers making rational choices. They are bought in bulk by unknown actors for unknown purposes — or by NameSilo from itself. Either way, the "5.8M active domains" number that drives the stock price is not what investors think it is.

Lying is not just their cover-up strategy. It's their business model.

Let's step back and look at what we've documented. Every single public-facing claim NameSilo makes is inflated, fabricated, or misleading:

Their claimRealityMethodInflate
"5.8M active domains"~958K activeCount phantoms as "active"6.1x
"150+ payment options"12 methodsCount card brands as "options"12.5x
GoDaddy "$23.98"$5.19Use renewal price, not register4.6x
Name.com "$17.99"$11.24Use inflated price1.6x
"No abuse reports"100+ receivedDelete and deny
"Domain compromised"Code never changedFabricate narrativeFiction
"Low cost leader"#96 of 130 (.com)Show inflated competitor pricesFraud
"Fastest growing"615% dead spikeCount phantoms as growthPhantom

This is not a company that lied once to protect a scammer and got caught. Lying is the operating principle. Every metric, every comparison, every public statement is engineered to show a number larger than reality. The xmrwallet cover-up wasn't an anomaly — it was the same reflex applied to an abuse report. Inflate, deny, deflect, cite ICANN accreditation, move on.

And this answers the original question: why does anyone "choose" NameSilo? Real customers making rational decisions don't choose NameSilo. 95 registrars are cheaper for .com. The UI is from 2008. The support ignores abuse. The only "customers" who need NameSilo are those who need: bulk registration with no questions asked, junk TLDs at $0.99, a privacy service that shields 109K malicious domains, and a registrar that will publicly defend you when you get caught. That's not a customer base. That's an arrangement.

The money comes from phantom domains. The phantom domains come from bulk buyers who don't exist as real businesses. The "revenue growth" comes from counting phantoms. The stock price comes from the revenue growth. Everyone in this chain gets paid. Except the investors. And the victims.

The Numbers Don't Lie

NameSilo (suspicious)

• 1.67M no IP at all + 1.15M on parking stubs = 2.82M DNS-dead

• Full economic analysis (age, MX, content, patterns): 4.22M dead

• Combined: ~4.22M out of 5.18M (81.5%) are dead domains

• $50M+ phantom revenue from dead registrations

• 96% no contact email

• 18% junk TLDs (.sbs/.cfd/.xyz)

• 7x spike in dead registrations 2023→2024

• P/E 143.8x (industry: 21x)

• Forbes: PAID review

• Wikipedia: PROMO flagged

• Trustpilot: bot reviews

Namecheap (how a real registrar works)

• 32.6% dead domains (industry baseline)

• Similar pricing, same market, same state (AZ)

• 93.5% no email (lower)

• 54% .com (legitimate TLD mix)

• Steady growth, no spikes

Responds to every abuse report

• We worked with them directly — showed cloaked scam, they acted

• Modern, clean design

• Significantly larger — 24M+ domains

• No criminal resellers. No FSB connections.

• Organic press, clean Wikipedia, real reviews

• This is what a registrar looks like when it's not a front

NameSilo is 10 percentage points dirtier than its closest peer. This is not a business model difference. This is a red flag.

"But NameSilo is cheaper!" — Is it?

NameSilo's only selling point is price. Their own comparison page shows $17.29 .com against Squarespace and GoDaddy. Let's check the real numbers from tldes.com (independent comparison, 136 registrars):

TLDNamecheapNameSiloDifference
.com register$6.99$15.56+122%
.com renew$14.98$17.29+15%
.com transfer$11.08$9.80-12%
WHOIS privacyFreeFreeTie
Total domains24M+5.18MNC 4.6x
.com rank (of 130)#6#9690 places

NameSilo is 2.2x more expensive than Namecheap for .com registration. Not 37 cents cheaper — $8.57 more expensive. Namecheap is #6, NameSilo is #96 out of 130 ICANN-accredited registrars. The only place NameSilo is cheap is junk TLDs (.sbs $0.99, .cfd $0.99) — the exact TLDs from their ShortDot partner that fill the dead domain graveyard. The cheap price isn't for customers. It's for bulk phantom purchasing.

Who owns .sbs and .cfd? Follow the money.

Registry ↔ Registrar — a partnership worth examining.

The junk TLDs filling NameSilo's dead domain graveyard — .sbs, .cfd, .icu, .cyou, .bond, .buzz, .qpon — are all owned by a single company: ShortDot SA, a Luxembourg-registered Société Anonyme (9 Rue Louvigny, L-1946). ShortDot operates 7 TLDs through CentralNic (London) as technical backend.

On their own website (shortdot.bond/about), ShortDot lists their key registrar partners. Out of "over 400 registrar partners", they name exactly six by name:

GoDaddy, Alibaba, GMO, Namecheap, NameSilo, Dynadot

NameSilo is one of six named partners of the company that owns the exact TLDs dominating their phantom domain portfolio. Now look at the timeline:

Apr 2024ShortDot acquires .sbs from Australian SBS Corporation (IANA record) Apr 2024ShortDot acquires .cfd from DotCFD Registry Ltd (IANA record) 2024NameSilo dead domain registrations spike 615% (67K → 485K) 2025Spike continues: 585K dead domains registered, 10K-17K/day

The economics of this partnership:

ShortDot sells .sbs/.cfd wholesale at ~$0.30-0.50/domain
    │
    ▼
NameSilo registers at $0.99 retail → keeps ~$0.50-0.70 margin
    │    + counts as "domain under management" for investors
    │    + inflates "revenue growth" in quarterly reports
    │    + dilutes scam ratio (more total = lower abuse %)
    │
    ▼
ShortDot reports "growing TLD adoption" to ICANN
    │    + justifies TLD acquisition costs
    │    + attracts more registrar partnerships
    │
    ▼
Both grow. Both report metrics. Nobody checks if domains are real.

NameSilo's ShortDot TLD share vs other registrars:

~11%
ShortDot TLDs at NameSilo
.sbs 7% + .cfd 4%
<0.2%
ShortDot TLDs at GoDaddy
statistical noise
<1%
ShortDot TLDs at Namecheap
normal range

Why does NameSilo have 55x more ShortDot TLD concentration than GoDaddy? Both are ShortDot partners. Both sell .sbs and .cfd. But only NameSilo has 11% of their entire portfolio in ShortDot extensions. The same extensions that dominate their dead domain graveyard and malicious domain blocklists.

These are not accusations. These are questions that demand answers:

1. Who is buying hundreds of thousands of .sbs and .cfd domains through NameSilo and never activating them?
2. Where is the money coming from? Show the payment records.
3. Does ShortDot know that their TLDs are being used as vehicles for phantom revenue at a named partner?
4. Why did the 615% dead domain spike coincide exactly with ShortDot's TLD acquisitions in April 2024?
5. Is ShortDot receiving payment for these registrations? From whom?

A named partnership. A synchronized timeline. A 55x concentration anomaly. A 615% spike in phantom registrations. If this is a coincidence, it is the most expensive coincidence in the history of domain registration.

Sources: shortdot.bond/about (partner list), IANA .sbs delegation, IANA .cfd delegation, PhishDestroy 130M domain analysis.

And then there's njal.la (Njalla) — a privacy-focused registrar whose domains resolve under NameSilo's ICANN accreditation (check any WHOIS). Their pricing: €15/year for .com, €30/year for junk TLDs (.sbs, .cfd, .cyou, .xyz, .homes — the exact TLDs filling NameSilo's dead domain graveyard). That's 2× to 30× more than what NameSilo charges retail for those same TLDs. Why would anyone pay €30 for a .sbs that costs $0.99 direct? You wouldn't — unless the point isn't the price. The point is the privacy layer. Njalla registers on your behalf, their name on WHOIS, your identity hidden. For legitimate privacy? Maybe. For scam domains that need to survive abuse reports? Perfect. And when the abuse report arrives, NameSilo says "that's njal.la, not us" — while WHOIS says NameSilo, LLC on every single domain.

Namecheap — 24M+ domains

2.2x cheaper for .com ($6.99 vs $15.56)
• Modern panel, 2FA, real-time DNS
• Abuse reports: same-day action (we verified)
• Clean Trustpilot, organic Wikipedia
• No dead domain spikes
• No FSB connections
4.6x more total domains (~19x more active)
Lower dead rate (32.6% vs 81.5%)
• Real customer base: ~18.6M active

NameSilo — 5.18M domains

2.2x more expensive for .com ($15.56)
• Panel from the Win98 era (see recreation)
• Abuse reports: auto-deleted (100+ ignored)
• Bot Trustpilot, promo Wikipedia
• 615% spike in phantom registrations
• VT delisting service for scammers
81.5% dead domains
99.65% zero confirmed traffic
• Real customer base: ~958K active

Namecheap is 2.2x cheaper for .com (#6 vs #96), 4.6x bigger, has a modern UX, responds to abuse, and doesn't trade at P/E 143.8x. Adjusted for phantoms, Namecheap's real customer base is ~19x larger. The "NameSilo is cheaper" narrative is not just wrong — it's the opposite of reality. NameSilo is one of the most expensive registrars in the world for .com. Where they ARE cheapest is .sbs at $0.99, .cfd at $0.99 — their ShortDot partner's TLDs that fill the dead domain graveyard.

If NameSilo really is just a discount registrar — where are the customers? Same market, similar pricing, one has 19x more real users. The answer is in the pyramid above: 99.65% of NameSilo's portfolio has zero confirmed traffic. 58 domains in Tranco top 10K. Fifty-eight. The price isn't the product. The phantom domains are the product.

Why would a registrar buy domains from itself?

1. Money laundering. Stolen crypto → Bitcoin → domain purchases at your own registrar. The registrar reports "revenue." The money is clean. Up to $50.8M/year in phantom profit. No questions asked because who audits domain registrations?

2. Ranking inflation. ICANN rankings, industry reports, and press coverage use "domains under management" as the primary metric. More domains = bigger registrar = more trust = more real customers. NameSilo claims "top 10 registrar" status with 6.26M domains. How many are real? If 81.5% are dead, the real active base is ~958K. That's not top 10. That's mid-tier at best.

3. Revenue inflation for stock price. NameSilo Technologies trades at P/E 143.8x. Revenue grew 18.5% in 2025. But how much of that growth is phantom domains? Inflated revenue = inflated stock = real money for insiders selling shares. This is textbook securities fraud if the domain purchases are self-dealing.

4. Diluting the scam ratio. This is the clever part. If 5% of your domains are involved in scam/phishing/fraud, that looks terrible. But if you buy 2 million dead domains from yourself, suddenly scam domains are only 0.5% of your total. "We have 6 million domains and only a tiny fraction are problematic." The dead domains are a smokescreen — statistical noise to make the abuse percentage look smaller than it is.

All four benefits come from the same action: buy domains from yourself. Launder money. Inflate rank. Inflate stock. Dilute the scam ratio. One move, four wins. Who's checking?

A question for NameSilo Technologies investors

CSE: URL  ·  OTC: URLOF  ·  C$1.44  ·  Market cap: C$133M  ·  Shares: 92.6M  ·  CEO: Paul Andreola

Q3 2025: Revenue C$16.9M (+17.9%)  ·  Net income C$1.15M (+135%)  ·  Cash: C$2.4M  ·  Deferred rev: C$33M

For NameSilo shareholders:

You bought shares in a company with a P/E of 143.8x — 7x the industry average. Do you know that 81.5% of the domains you're paying for are dead or empty? 4.2 million domains that nobody uses. Your company's "6.26 million domains under management" is really about 958,188 active domains. The rest is either phantom registrations or parking page filler. The "18.5% revenue growth" in 2025 — how much of that is real customers, and how much is bulk dead-domain purchases that inflate the top line?

Your company publicly defended a $100M+ theft operation. Your company offered to remove VirusTotal security detections for a known crypto drainer. Your company used paid platform access (X Gold Checkmark) to silence the researchers who exposed it. Your company's CEO signed off on a tweet containing 4 verifiable lies. Is this what you invested in? Did you know? Do you know now?

If the dead domain purchases are self-dealing — which the data strongly suggests — then the revenue figures in NameSilo's financial statements are materially misleading. That's not a registrar problem. That's a securities fraud problem. CSE, OSC, and SEC should be asking questions. Shareholders should be demanding an independent audit of domain registration sources. Who is buying 10,000+ domains per day with no intent to use them? Where is the money coming from? Follow the money.

5. The affiliate excuse. NameSilo will claim their Forbes and other "reviews" are affiliate partnerships — just like the xmrwallet operator claims "donations" fund his operation. Technically, some links in those articles use affiliate tracking. But others link directly — no tracking, no commissions. Someone is buying reviews of themselves without even bothering to earn referral fees. The point isn't the affiliate cut. The point is purchased legitimacy.

Adjusted Financials

Strip the Phantoms — What Is NameSilo Actually Worth?

Take the reported numbers. Remove 81.5% dead domains. See what's left.

MetricReportedAdjustedDelta
Domains6.26M~958K-84.7%
Annual revenueC$65.5M~C$12M-81.7%
Revenue/domainC$10.46C$12.53+19.8%
Net income (ann.)C$4.6M<C$1M-80%+
P/E ratio143.8x>700xabsurd
Market capC$133MC$133Movervalued 10x+
Registrar rank"Top 10"Mid-tier~6x inflated

Methodology: "Adjusted revenue" = reported revenue × (active domains / total domains). Active = 958,188 (HTTP alive with content). This is conservative — some "alive" domains are still speculative or parked. Net income adjusted proportionally. P/E = market cap / adjusted net income. Revenue/domain increases because real customers pay more than bulk junk TLD buyers.

REPORTED TO INVESTORS

C$65.5M

"Fastest growing registrar"

REAL BUSINESS (PHANTOMS STRIPPED)

~C$12M

A small mid-tier registrar, overvalued 10x

C$53.5M per year — the gap between reported and real. That's not rounding error. That's not market fluctuation. That's not "different accounting methods." That's either the biggest bulk-buying customer in registrar history who generates zero traffic — or it's fraud. There is no third explanation. CSE, OSC, SEDAR+ — this gap should trigger an independent audit. It hasn't. Yet.

Corporate Structure

Why Canada? Why CSE? Why is the business in Arizona?

The corporate structure is not an accident. It's a feature.

NameSilo Technologies Corp

Canada — holding company
Trades on CSE: URL (Canadian Securities Exchange)
OTC: URLOF
CEO: Paul Andreola
CFO: Natasha Tsai (signs the phantom numbers)

NameSilo LLC

Phoenix, Arizona — actual registrar
ICANN-accredited (IANA #1479)
CEO: Kristaps Ronka (18.5% owner)
Accepts Bitcoin. No KYC. Generates the "revenue."

Why this structure exists:

1 CSE is the weakest major exchange. Minimal listing requirements, minimal scrutiny. Where cannabis companies, crypto shells, and junior miners list when they can't get on TSX or NYSE. A P/E of 143.8x would trigger immediate analyst attention on any serious exchange. On CSE — nobody asks.
2 Dual jurisdiction = investigation nightmare. FBI wants to investigate → "it's a Canadian company, go to RCMP." RCMP wants to investigate → "operations are in the US, go to FBI." SEC doesn't regulate — company is Canadian. OSC (Ontario Securities Commission) has fewer resources than SEC. Each jurisdiction points to the other.
3 Business must be in the US for ICANN accreditation, US payment processors, and American customers. But the holding company is in Canada because Canadian securities regulation is softer, CSE doesn't ask hard questions, and insider stock sales are easier.
4 The money flows across the border. Dirty money enters as Bitcoin in Phoenix (domain purchases). "Clean revenue" is reported in Canada (CSE filings). Stock is sold on Canadian exchange. Two countries, two regulatory systems, one gap in the middle.

Al Capone kept his business in one state and his banks in another. Same logic, different century.

Canada's regulatory gaps — by design

Crypto & Registrars

Canada tightened AML for crypto exchanges (FINTRAC, Travel Rule from 2026). But an ICANN registrar accepting Bitcoin for domains is not an MSB (Money Services Business). Buying a domain is a goods transaction, not a financial service. The registrar is not required to run exchange-level KYC or file SARs (Suspicious Activity Reports) per BTC transaction.

Privacy Laws (PIPEDA + Quebec)

In Canada — especially Quebec — personal data protection is stronger than in the US. Until recently, there was no public beneficial ownership registry. You couldn't simply look up who's behind a company. To deanonymize a "private citizen" you need a criminal subpoena, not a civil discovery request or regulatory inquiry.

The Corp + LLC structure is legal — thousands of companies use it. FINTRAC/OSC are real regulators, but their resources are dwarfed by SEC/FBI. The risk appears only when you combine legal corporate structures with phantom operations — which is exactly what the data shows.

"Nathalie Roy" — not a brand for victims. A regulatory shield for the operator.

The xmrwallet operator chose a specific identity construction: a Canadian female volunteer running a non-commercial open-source project. This is not random. It's a regulatory strategy:

Legal StatusObligationsExposure
Corp / LLCRegistration, taxes, AML, reporting, beneficial ownership disclosureHigh
"Private individual"No license, no registry, privacy laws protect, no MSB obligationsLow

In 2014–2019, crypto wallets operated by "private individuals" did not fall under MSB regulations. Canadian/Quebec privacy laws shielded personal identity without corporate transparency. The "volunteer" + "non-commercial" combination provided exemption from AML/KYC obligations. A "donation-based volunteer project" was a regulatory grey zone that FinCEN and FINTRAC did not aggressively cover.

If the operator had registered as "XMRWallet Ltd." or used a male Eastern European name — regulators would have investigated by 2016–2017. A "Canadian female volunteer" was a status that regulators ignored until it was too late. The identity doesn't exist as a business. That's exactly why the scheme worked for 10 years.

"Nathalie Roy" is not a person. It's a legal construct optimized for regulatory evasion.

Integration Phase

Why Sewer Pipes? Why Underwater Cameras? Why Mexican Taxi Ads?

NameSilo's "diversification" makes no business sense — unless you understand the three phases of money laundering.

PHASE 1: PLACEMENT
Dirty money → domain purchases
Bitcoin accepted, no KYC
$26.5M/year entering
PHASE 2: LAYERING
Domains → "revenue" → stock price
$1 cost → $2.92 on paper
$50.8M phantom profit
PHASE 3: INTEGRATION
"Profits" → buy real companies
Now you own real assets
Laundering complete

Phase 3 is the EXIT. You can't sit on $50.8M phantom profit forever. You need to convert paper money into real assets:

$2.45M → SewerVUE Technology (sewer pipe inspection robots)
$1.60M → Ola Media (Uber screens in Mexico)
LOI     → Reach Systems (underwater cameras & cable winches)
???     → Atlas Engineered, Alchemy Labs, Cheelcare, Allur Group

All purchased with "legitimate profits" from a registrar where 81.5% of domains are dead.

And the more random the acquisitions, the better the cover. If they only bought domain companies, the pattern would be obvious. But sewer pipes + underwater robots + Mexican taxi ads? That looks like an eccentric CEO "diversifying." Nobody investigates a sewer pipe company for money laundering connections. That's the point.

Al Capone had laundromats. NameSilo has sewer pipes.
Different century, same logic: push dirty money through a business, buy real assets, look legitimate.

Prosecution Brief

The Case for Money Laundering

Not a theory. Not speculation. A chain of evidence that leads to one conclusion.

1

STEAL

xmrwallet.com hijacks Monero transactions for 8+ years. Estimated $100M+ stolen. Funds are in XMR — untraceable by design.

2

CONVERT

XMR → BTC via DEX/mixers/OTC. Untraceable step. Output: Bitcoin in anonymous wallets.

3

WASH

Buy domains in bulk at NameSilo. NameSilo accepts Bitcoin. No identity verification required. 10,000-17,000 domains/day. Junk TLDs at $0.99 each from their ShortDot partner. No WHOIS contact. No email. No phone. The domains are never activated — the purchase IS the purpose.

4

REPORT

NameSilo books the purchases as legitimate revenue. C$65.5M/year. "Fastest growing registrar." "6.26M domains under management." Files quarterly earnings on SEDAR+. Stock trades on CSE (URL) and OTC (URLOF). P/E 143.8x. Phantom domains become phantom revenue becomes real stock price.

5

CASH OUT

Insiders sell shares on a public exchange. Clean money. Kristaps Ronka (18.5% owner, LLC CEO) holds ~17M shares. Paul Andreola (parent company CEO) has board control. The stolen crypto has been transformed into Canadian stock market equity. The laundry is complete.

The Bitcoin On-Ramp

NameSilo accepts Bitcoin as payment. This is not a technical detail — this is the on-ramp. The laundering pipeline is: stolen XMR → BTC (via DEX/mixers) → domain purchases at NameSilo → "revenue." The entire chain from theft to clean money requires zero identity verification. No KYC. No bank. No wire transfer. Just Bitcoin to domains to stock price. They don't even accept Monero — which is strange for a registrar that protects the world's largest Monero theft operation. Or maybe not strange at all: accepting XMR directly would be too obvious. The BTC step is the mixer.

The Math

Dead domains (2024):485,000 (615% spike from 67K in 2023) Dead domains (2025):585,000 (10K-17K/day runs) Avg cost per domain:$0.99 - $3.00 (junk TLDs: .sbs, .cfd, .xyz) Annual spend (low):$579,150 (585K × $0.99) Annual spend (mid):$1,755,000 (585K × $3.00) Cumulative dead total:1,668,355 domains with no IP address Estimated total spend:$3.2M - $12M+ on domains that were never activated Source of funds:UNKNOWN — no WHOIS, no email, no phone, no org Payment method:Bitcoin accepted. No KYC required.

Someone is spending millions of dollars per year to buy domains they never use, from a registrar that accepts Bitcoin and asks no questions, and nobody knows who they are. This is either the worst investment in internet history or a money laundering operation. There is no third option.

10 Questions for the Investigation

For FBI, FinCEN, Arizona AG, CSE/OSC, ICANN Compliance — and anyone with subpoena power.

01 Show the payment records for the 585,000 dead domains registered in 2025. Who paid? From which wallets, cards, or accounts? Through which payment processor?
02 How many domain purchases were paid in Bitcoin? What is the total BTC amount? Were any of those transactions traced to mixers, DEXs, or known illicit wallets?
03 How many unique customers are responsible for the 10,000-17,000 daily dead domain registrations? Is it 10,000 people buying 1 domain each, or 3 accounts buying 5,000 each?
04 Do any of those accounts belong to NameSilo employees, officers, or related parties? To Kristaps Ronka? To Paul Andreola? To any entity controlled by them?
05 What is the relationship between NameSilo and ShortDot SA? Is there a revenue-sharing agreement? A volume commitment? A financial relationship beyond standard registrar-registry terms?
06 Subpoena NameSilo's abuse ticket system. How many abuse reports about xmrwallet.com were filed between 2018 and 2026? Compare to their public claim of "no reports received." The gap is the measure of perjury.
07 Who authorized the VirusTotal delisting offer to the xmrwallet operator? Was this a one-time courtesy, or does NameSilo routinely help flagged domains clean their security records?
08 Has NameSilo filed any Suspicious Activity Reports (SARs) with FinCEN regarding the bulk dead domain purchases? If not, why not? 585,000 domains/year with no business purpose from anonymous buyers is textbook suspicious activity.
09 What percentage of NameSilo's reported C$65.5M revenue comes from domains that were never activated? Provide the exact number. Then explain to the CSE, OSC, and investors why this wasn't disclosed as a risk factor.
10 Trace the Bitcoin payments. Blockchain analysis firms (Chainalysis, Elliptic, TRM Labs) can determine whether BTC used to purchase NameSilo domains originated from XMR-BTC swaps, mixing services, or wallets linked to known criminal activity. This is one subpoena and one Chainalysis report away from answers. Do it.

Every one of these questions can be answered with a single subpoena.
The only reason they haven't been answered is that nobody has asked.

Updated Analysis

The Money Laundering Machine — How It Actually Works

A car wash that washes 10 cars a day but reports 100. Where does the money for 90 phantom cars come from? NameSilo is the same — except instead of cars, it's domains. 4.2 million phantom "washes" that don't exist.

Dead Domains
4,221,217
81.5% of all NameSilo domains
Booked as "Revenue"
$77.3M
From domains nobody uses
Paper Profit
$50.8M
$1 in → $2.92 "revenue" out

How the scheme works — step by step

STEP 1: You have $100K in dirty money
STEP 2: Create accounts via PrivacyGuardian
        Each looks like a real client: [email protected]
STEP 3: Buy 10,000 .sbs domains at $14.95 = $149,500 "revenue"
STEP 4: Real cost: 10K × $0.68 wholesale + $0.18 ICANN = $8,600
STEP 5: Books show: Revenue $149,500 − Cost $8,600 = $140,900 "profit"

        The "client" is yourself. You paid $149,500 dirty
        → received $140,900 clean "business income"

Why this works perfectly:

1. PrivacyGuardian hides the buyer

Every domain registered to pw-{hex}@privacyguardian.org. Impossible to prove the "client" = NameSilo itself. 3M+ PG-protected domains.

2. Domains are the perfect product

Digital, no warehouse, no shipping, no trace. Cheap wholesale, expensive retail. Millions of units — easy to hide thousands of "your own" among real ones.

3. Cheap TLDs = maximum multiplier

.cyou: $0.48 → $14.95 = 31x
.sbs:  $0.68 → $14.95 = 22x
.cfd:  $0.68 → $14.95 = 22x
.icu:  $0.98 → $14.95 = 15x

4. Scale makes it invisible

5.18M domains — who checks each one? Real customers mixed in as cover. 4,260 new dead domains per day in 2025.

The economics of laundering through NameSilo

DAILY SPEND
$72,645
on dead domains
DAILY "REVENUE"
$211,807
booked on paper
ANNUAL COST
$26.5M
to registries
ANNUAL "PROFIT"
$50.8M
phantom margin

The dead domains dominate the economics. At estimated retail prices, dead domain registrations represent $77.3M in value (wholesale cost: $26.5M, paper margin: $50.8M). NameSilo's actual reported revenue is C$65.5M (~US$48M) — the gap reflects bulk discounts and junk TLD pricing. Either way, the vast majority of revenue comes from domains nobody uses. The tail wags the dog.

Laundering cost:
Dirty $100,000 →
  $4,500 goes to registries (4.5% fee)
  $95,500 becomes "clean business income"

Standard money laundering rate: 10-30%
NameSilo's rate: 4.5% via cheap TLDs
This is extremely cheap laundering.

Evidence that this is exactly what's happening

81.5% of domains are dead Real clients don't pay for empty domains
99.65% have zero traffic Who pays $17/yr for .com without a site?
19.8% of ALL .sbs = NameSilo One registrar = 1/5 of entire TLD
1.5M new domains in 2025 (4,260/day) Organic growth doesn't look like this
PrivacyGuardian on 3M+ domains Perfect cover — buyer is anonymous
ShortDot TLDs: 732K domains All from one registry — possible kickback
$26.5M/year on dead domains Who pays $26 million for nothing?

NameSilo is a digital car wash.
4.2 million phantom cars. $50.8 million in phantom profit.
And the only "soap" they use is a $0.68 wholesale domain from their own partner.

Financial Analysis

Follow the Money — Who Pays and For What?

C$65.5M revenue. 5.18M domains. Let's see how much is real.

SegmentDomains%Est. RevenueWho?
Dead (no IP, never activated) 1,668,355 32.2% ~$2.5M ???
Parking stubs (Sedo/CF/Shopify) 1,153,281 22.3% ~$5.8M Speculators?
HTTP alive, no business identity ~903,000 17.4% ~$7.2M Personal?
HTTP alive + some org/business ~37,000 0.7% ~$0.4M Micro-biz
Top-million (has real traffic) 17,875 0.35% ~$0.2M Real clients
Tranco top 10K (major sites) 58 0.001% ~$870 Actual brands
IDENTIFIABLE REAL CLIENTS
~$8M
Top-million + businesses + personal sites
~17% of total revenue
GRAY ZONE
~$32M
Parked, speculative, unknown purpose
~67% of total revenue
UNEXPLAINABLE
~$8M
Dead domains, zero activity, no owner
Pure phantom revenue

The Client Problem

If NameSilo's 5.18M domains belong to real customers making real purchaseswhere are they?

Real customers would have:

• Working websites (only 18.5% respond to HTTP)
• Contact emails (96% have none)
• Business identity (1.06% have org name)
• Measurable traffic (0.35% in top-million)
• Reason to pick NameSilo over 95 cheaper options

NameSilo's "customers" have:

• No website (81.5%)
• No email (96%)
• No business name (98.9%)
• No traffic (99.65%)
• Gibberish domain names on .sbs/.cfd
• Registered 10,000-17,000/day in bulk runs

Who are these "customers"? They have no website. No email. No business. No traffic. They buy domains they never use, on TLDs nobody wants, at a registrar that's more expensive than 95 alternatives. They register in bulk — 10,000-17,000 per day — in patterns consistent with automated purchasing. And they pay with Bitcoin, which requires no identity verification.

These aren't customers. Customers use what they buy. These are transactions. The domain is not the product — the transaction is the product. The purpose of buying 585,000 dead domains per year is not to have 585,000 websites. It's to move money from point A (anonymous crypto wallet) to point B (NameSilo revenue line) and make it look like a legitimate business transaction.

Revenue per real domain — the smoking gun

NamecheapNameSilo Total domains:24M+5.18M Dead domain rate:32.6%55.7% Est. active domains:~18.6M~2.36M Revenue:~$180M USD~$48M USD Revenue per TOTAL domain:$7.50$9.27 Revenue per ACTIVE domain:$9.68$20.34

NameSilo makes $20.34 per active domain. Namecheap makes $9.68. NameSilo generates 2.1x more revenue per real customer than Namecheap — while being a smaller, more expensive (for .com: $15.56 vs $6.99), less popular registrar with worse UX. How? Because the phantom domains aren't free. Someone is paying $8-10M/year for domains that generate zero value. That money inflates the revenue line while the "customer" gets nothing — because the customer doesn't exist, or the customer IS NameSilo.

Baseline Comparison

Domains Born Dead — NameSilo vs Namecheap

Same methodology, same data format. Namecheap (24M domains) as industry baseline. If NameSilo's dead domains were "normal" — the rates would match. They don't.

Age CohortNC DeadNS DeadDeltaExcessPattern
0–30 days 25.4% 59.5% +34.1pp 43,758 ██████
1–3 months 25.0% 61.7% +36.7pp 100,694 ███████
3–6 months 25.7% 61.7% +36.0pp 177,560 ███████
6–12 months 27.5% 51.6% +24.1pp 257,766 █████
1–2 years 41.1% 65.4% +24.4pp 423,747 █████
2–5 years 30.3% 40.5% +10.1pp 64,859 ██
5+ years 32.0% 46.0% +14.0pp 116,902 ███
TOTAL 32.6% 55.7% +23.0pp 1,201,304

Namecheap (normal registrar)

Fresh: 26% dead
Mid-life: 38% dead
Mature: 32% dead

LOW → HIGHER → LOWER — normal lifecycle. Domains start alive, some die mid-life from abandoned projects, survivors stabilize.

NameSilo (anomaly)

Fresh: 56% dead
Mid-life: 59% dead
Mature: 46% dead

HIGH → HIGH → HIGH — flat across all ages. Domains are born dead and stay dead. The gap narrows with age only because older cohorts predate the 2024-2025 bulk ramp-up.

EXCESS DEAD DOMAINS
1,201,304
above industry baseline
EXCESS FAKE REVENUE
$22.0M
annual phantom income
EXCESS PAPER PROFIT
$14.5M
money from nowhere

This is not "normal dead domain rates." We controlled for it. Even if you accept that every registrar has dead domains — NameSilo has 1.2 million MORE dead domains than you'd expect from a registrar this size. Those 1.2M excess dead domains generate $22M/year in fake revenue. That's not neglect — that's a 23 percentage-point gap above the baseline, concentrated in domains under 2 years old.

The killer stat: NameSilo's dead rate for domains under 30 days old is 59.5%. Namecheap's is 25.4%. At NameSilo, 6 out of 10 domains are dead within their first month of life. These domains were never intended to be websites. They were born dead. They exist only as revenue line items.

New domain registrations per year (all NameSilo)

2019:    63,882
2020:    82,009 +28%
2021:    94,594 ██ +15%
2022:   109,918 ██ +16%
2023:   193,726 ████ +76%
2024:   616,014 ████████████ +218%
2025: 1,555,424 ██████████████████████████████ +152%

1.5M new domains in 2025 (4,260/day) — 99%+ have no traffic. Growth correlates with spending on registry fees, not customer acquisition. This is not organic growth. This is a budget increase.

What Do These "Domains" Look Like?

We analyzed 1,669,111 dead domains from the 5.1M dataset. Here's what "customers" are buying:

TLDDeadGibberishGib %1-YearSample names
.vip26,06218,19870%14,29102410010.vip, 07261.vip, 09085.vip
.lol15,7259,47760%2,361128012.lol, 1234.lol, 025.lol
.xyz141,10882,77159%74,783000000004.xyz, 000001001.xyz
.mom10,1885,76757%3,783168.mom, 1688.mom, 288.mom
.top58,26423,76641%37,4360005551.top, 00142.top, 00219.top
.buzz17,2586,48538%16,9191xbet-djjj.buzz, 1xbet-vms2.buzz
.sbs91,82334,31637%32,00302g740c6.sbs, 0499777com06xl03.sbs
.cfd84,06720,33824%33,1610000660033aa.cfd, 000077700881qq.cfd
.com782,55999,11613%148,6200-www.com, 00003test.com, 0000yh5.com
378,547
Gibberish names
22.7% of all dead domains
Random strings, hashes, numbered sequences
522,288
1-year registrations
31.3% of dead domains
Bought for exactly 1 year. Never renewed.
98%
.buzz 1-year rate
16,919 of 17,258 dead .buzz domains
ShortDot TLD. One-time purchases.

The registration spike is not gradual growth — it's an explosion:

2022:  46,475 dead registered
2023:  67,946 dead registered  +46%
2024: 485,859 dead registered  +615% ████████████████████████
2025: 585,595 dead registered  +21% █████████████████████████████
2026: 145,298 (4.5 months, annualized ~387K)

These are not domain names. These are transaction IDs. 0499777com06xl03.sbs is not a business. 000000004.xyz is not a brand. 1xbet-djjj.buzz is a gambling phishing domain. 378,547 gibberish names. 522,288 bought for exactly one year and abandoned. No real customer buys 02g740c6.sbs for $0.99, uses it for zero days, and lets it expire. This is automated purchasing with no human intent behind it — except the intent to move money.

C$65.5M revenue with 58 domains in the global top 10,000.
Namecheap has 24M domains and thousands in top-10K. GoDaddy has 80M+. NameSilo has 58.
Where is the money coming from? Not from the 58 real websites. Not from the 17,875 with measurable traffic.
$48M/year from a customer base that is 99.65% invisible.

And a final question: a company with C$65.5M revenue and C$133M market cap can't afford to update a UI that looks like Windows 98? Actually — in their Q3 2025 earnings release, NameSilo LLC CEO Kristaps Ronka admitted they "began a complete UX/UI overhaul using seven years of customer learning." Seven years. It took seven years of customers fleeing to Namecheap before someone noticed the panel looks like a GeoCities page from 1998. But here's what they did with the money instead of fixing UX: they acquired SewerVUE Technologies — a company that inspects sewer pipes with radar. A domain registrar that protects $100M theft operations and inspects sewage. You cannot make this up. See our faithful Win98 recreation of the NameSilo experience →

And then there's the parking IP problem.

Of the domains that DO have an IP address, 36.7% point to just 10 IP addresses — all parking/stub pages. The top IP alone (Sedo parking: 91.195.240.123) hosts 522,466 NameSilo domains. Another 646,381 domains sit on known parking infrastructure. These aren't websites. These are placeholder pages displaying generic ads.

522,466 → Sedo parking (91.195.240.123)
484,719 → Cloudflare default (188.114.96.3 + 188.114.97.3)
82,563 → Shopify default page (23.227.38.65)
63,532 → NameSilo own parking (64.190.62.22)
= 1.15M domains on stub IPs out of 3.5M with DNS

So: 1,668,355 domains (32.2%) have no IP at all — completely dead. Of the 3.51M that DO resolve, 1,153,281 (33%) point to parking/stub IPs. Combined total: ~2,821,636 domains (54.4%) out of 5,179,405 are not real websites. More than half. And that's just DNS. Our full economic analysis—factoring in age, MX records, content, and registration patterns—puts the real dead rate at 81.5% (4,221,217 domains). Over $50M in phantom revenue.

The real active customer base of NameSilo is approximately 958,188 domains — not 5.18M as they claim. Their "top 10 registrar" status is built on phantom registrations. We're not the tax authority. But this is textbook money laundering infrastructure — anonymous buyers, cryptocurrency payments, zero activation, inflated revenue. FinCEN has issued guidance on exactly this pattern. Nobody is following it.

The operator phishes himself. Yes, really.

A note before we continue: many security colleagues wanted to join this investigation. We deliberately refused all help. We saw how the registrar and operator reacted to a simple technical analysis — whining emails, then deletion, then lawyers (never materialized), then suppression. We didn't want to expose anyone else to this. PhishDestroy is nobody. We're nothing. Spending money to destroy us is an unoriginal game, and we've been playing it for a very long time. But every move they make creates more evidence and another line on their criminal resume.

Now — the self-phishing scheme. When we presented our technical analysis, the operator's first response was: "you visited a phishing site." Yes. We know. His site IS the phishing site. But here's the twist: the operator creates phishing copies of his own scam site and then blames victims for visiting "phishing."

The active self-phish right now: xmrwallet.app — check the code yourself. The wallet creation logic and transaction handling is nearly identical to the main xmrwallet.com code. Across 10 years of "phishing" copies — xmrwallet.homes and others — the code structure is the same everywhere. Same processing logic. Same wallet generation. Only difference: the "phishing" copies don't encrypt. Because they're not really phishing copies made by attackers. They're the operator's own mirrors, designed to create plausible deniability: "oh, you must have used a phishing copy, not the real site."

And where were these self-phishing domains hosted? On njal.la — a NameSilo reseller. The same njal.la whose API NameSilo disabled. The same ecosystem. When the "blockchain syncing" excuse got debunked by the official Monero project, these geniuses pivoted to: "it's not us, it's phishing copies targeting us!" Except the phishing copies are hosted on their own partner's infrastructure, use the same code, and connect to the same DDoS-Guard / IQWeb backend.

The Russian-speaking scammer behind this is known in the community — check keplr.at and related domains. Same actor, same methodology, multiple sites. We always do public scans (we noticed they started using URLscan — but for users with a Pro subscription, everything is accessible). Compare the code of xmrwallet.app with xmrwallet.com. Compare the wallet creation flow. Compare the transaction handling. Then tell us again that one is "phishing" and the other is "legitimate."

To be precise: there is exactly one independent actor we identified who made actual phishing copies of xmrwallet — a known Russian-speaking scammer operating primarily on .at domains (keplr.at and similar), who phishes multiple crypto wallets. He created copies of xmrwallet as one of many targets. Every other "phishing copy" of xmrwallet over the past 10 years was created by the operator himself.

Why would a scammer phish his own scam? Two reasons. First: to create a narrative. "Look, people are making phishing copies of our legitimate service — we must be important, we must be real." It's reputation theater. A legitimate wallet gets phished. A scam wallet doesn't — unless the scammer does it himself. The self-phishing copies let the operator claim credibility he never had. Second: to deflect blame. When victims complain that their funds disappeared, the operator points to the "phishing copies" and says: "You must have used a fake site, not ours." The victim blames the phishers. The operator keeps stealing. The registrar nods along. Everyone wins — except the people losing their money.

The xmrwallet.homes, xmrwallet.app, and dozens of other "phishing copies" that the operator conveniently blames — all trace back to the same origin. Same code. Same logic. Same hosting. Same operator playing both sides. The only real phishing actor (keplr.at) simply copied what was already a scam. Everyone else who got blamed for "phishing xmrwallet" was the operator himself, running mirrors of his own theft operation and pretending they were attacks.

Self-phishing through your own reseller network, blaming victims for your own mirror infrastructure, while your registrar helps you clean VirusTotal detections. This isn't a scam anymore. This is an industrial operation.

NameSilo Domain Console
NameSilo Domain Manager
NameSilo DNS Management
NameSilo Domain Defender

This is the admin panel of a company that people trust with their businesses. Look at the design. Look at the UI. Does this look like a modern, well-funded technology company? Or does it look like something built by the same person who orders SEO articles on Kwork for 500 rubles?

Now compare it to fd.nic.ru — a Russian registrar. Remarkably similar aesthetic, isn't it? Same era, same design philosophy, same target audience.

NameSilo claims to manage 6.26 million domains. Our analysis of 5.18 million shows 81.5% are dead — 4.22 million domains with no website, no email, no purpose. Bulk domain registration at scale with anonymous Bitcoin payment and zero activation is not a business model — it is a washing machine.

The Forbes Advisor Article — A Case Study in Purchased Legitimacy

Forbes Advisor published a "review" of NameSilo ("Audited & Verified: May 6, 2024"). It contains the affiliate disclosure: "We earn a commission from partner links." The article recommends NameSilo as the "best registrar for low-cost domains." Let's fact-check it against reality:

Forbes ClaimsRealityVerdict
"$10.95/year for .com"$15.56 register, $17.29 renew (tldes.com)Wrong
"Best for low-cost .com"#96 of 130 registrars. 95 are cheaper.False
"24/7 customer support"Site now shows business hours, not 24/7Outdated
"Highly rated support"100+ abuse reports ignored. VT delisting offered to scammers.False
Compares with Google DomainsGoogle Domains shut down Sept 2023. Article "audited May 2024."Dead source
"3 million active domains"They now claim 6.26M. Real active: ~958K.Both inflated (real: ~958K)
Panel screenshotsOnly the pretty public facade. Real admin panel (Win98) hidden behind login.Misleading

Forbes also includes this disclaimer: "Information may have changed since publication. Past performance is not indicative of future results." and "Forbes Advisor adheres to strict editorial integrity standards."

"Editorial integrity" that recommends a registrar as "best for low-cost .com" when 95 registrars are cheaper. That says "24/7 support" when the site shows business hours. That compares with a dead competitor. That shows fake screenshots of a panel that doesn't exist. Same playbook as Kwork SEO articles — different budget, same result. A $500 Kwork article and a Forbes Advisor "review" serve the same purpose: purchased legitimacy.

And it doesn't stop at Forbes. NameSilo's "news" on Yahoo Finance carries this label: "This is a paid press release." Every "article" about NameSilo in financial media is purchased. The Forbes review. The Yahoo Finance press releases. The Trustpilot ratings. The Wikipedia page (flagged as promotional). There is no organic positive coverage of NameSilo. It is all bought.

FTC Warning Letter — December 20, 2024

The U.S. Federal Trade Commission sent NameSilo an official warning letter on December 20, 2024, signed by Lois C. Greisman (Associate Director, Bureau of Consumer Protection, Division of Marketing Practices). The letter states:

"I write to inform you that one or more domains registered by NameSilo appear to be perpetrating an imposter scam that utilizes the Federal Trade Commission (FTC) name without authorization and implies a false affiliation with the FTC."

"The FTC is not affiliated with the entities or individuals operating this website. Please be advised that it is a violation of the Rule on Impersonation of Government and Businesses ("Impersonator Rule"), 16 C.F.R. § 461, to "materially and falsely pose as, directly or by implication, a government entity or officer.""

"We expect to hear from NameSilo regarding this urgent consumer protection matter promptly."

Think about what this means: a federal agency had to send an official letter to get NameSilo to act on a domain impersonating the FTC itself. Not a random phishing site. Not a crypto drainer. A domain pretending to be the Federal Trade Commission. If even the FTC needs to send formal correspondence to get a phishing domain removed — what chance does a regular victim have? The answer: none. Read the full FTC letter (PDF) →

BBB Complaints — Pattern of Abuse Denial

NameSilo's Better Business Bureau page contains complaints from real victims. A pattern emerges: victims report phishing domains, NameSilo deflects:

Victim complaint (BBB):

"NameSilo did not remove the domain that was proven to be used for phishing and allowed it to continue impersonating our company. Their phishing abuse form does not work. When I tried emailing them, they only had an auto-responder. We filed a complaint with ICANN since their abuse reporting system is essentially non-functional. We are considering filing a lawsuit under ACPA."

NameSilo response (March 18, 2024):

"We cannot confirm phishing — it appears to be SPAM. As a domain name registrar, we do not have any control over the content of emails... It is too easy to spoof domain names for us to investigate complaints."

Translation: "We can't confirm phishing" (we won't look). "We don't control email content" (not our problem). "Too easy to spoof" (we won't investigate). This is the same playbook we documented with xmrwallet — deflect, minimize, refuse. The difference: these aren't our reports. These are real businesses, filing on the BBB, getting the same non-answers. Read all BBB complaints →

Trustpilot — Bot Farms Competing with Bot Farms

NameSilo's Trustpilot rating looks impressive — until you think about it. Their real customer base is ~958K active domains. How many of those customers would voluntarily write a glowing review of a registrar with a Win98 admin panel, $15.56 .com pricing (#96/130), and support that responds to phishing reports with "we can't confirm phishing"?

The pattern is complete:

Domains: buy from yourself → "6.26M under management"
Articles: pay Forbes, Yahoo Finance → "highly reviewed"
Wikipedia: write about yourself → "independently notable" (flagged as promotional)
Reviews: write about yourself → Trustpilot rating
ICANN: cite accreditation → "we are legitimate"
Real customers: ~958K. Real support: "we can't confirm phishing." Real panel: Windows 98.

We tested Trustpilot ourselves. We left a 3-star review for NiceNIC — not even negative, just honest. No profanity, no accusations, just facts. Deleted after one complaint. A verified account. A real review. Gone. Meanwhile, NameSilo's page is full of suspiciously enthusiastic 5-star reviews from accounts with US geolocation — because the geo matters. American reviewers = "look, real American customers buy our domains" (not "we launder stolen crypto by buying domains from ourselves"). The reviews serve the same purpose as the phantom domains: creating the appearance of a legitimate American customer base that does not exist.

Example: "Patty Johnson" (Trustpilot profile) — US-based, 2 reviews total. One 5-star review for NameSilo (Jan 2026): "Leonid was very helpful... 5 stars!" The other review? For Otrium — a company with reviews alleging fraud and stolen money. One bot account writing for two different scam-adjacent businesses. And the reviews share a pattern: they name specific support agents ("Leonid"), praise response time, and read like templated customer service surveys — not like someone who just bought a $10 domain. Real domain buyers review prices and panel UX. Bot reviews praise "Leonid."

TRUSTPILOT DATA ANALYSIS — 2,280 NameSilo vs 2,480 Namecheap reviews

MetricNameSiloNamecheap
5-star reviews88.9%74.0%
1-star reviews7.2%16.7%
Single-review accounts62.4%59.6%
No avatar (fresh accounts)67.3%51.5%
About support/chat/service70.0%60.2%
About price/cost9.8%37.5%
Named agent "Leonid"5.7%0.0%
US geolocation35.1%26.5%

We understand the support obsession, by the way. Have you seen their admin panel? (we recreated it). With that interface, we'd need support too — or an ambulance. Half the functions don't work, the UI was last updated when Clinton was president, and the CEO himself admitted it needs a "complete UX overhaul" after seven years of promises. So yes: if you somehow became a NameSilo customer, you would indeed contact support. Constantly. Because nothing works without it.

But here's the tell: real frustrated users write about how terrible the interface is. That's what the 1-star reviews say — broken DNS, locked accounts, suspended domains, phishing reports ignored. Real pain, real detail, 265 characters average. The 5-star reviews? "Great support! Leonid helped. 5 stars." — 84 characters median. Real users complain about the product. Fake users praise the people.

And about those people — Leonid appeared from nowhere on April 13, 2025. Zero mentions before. Then 65 reviews in his first two months. That's not a popular support agent. That's a KPI. The timing coincides exactly with our investigation going public. The pattern is clear: investigation starts → negative coverage appears → bot farm activates → "Leonid was amazing!" fills the page. May 2025: 106 reviews (5x normal), 95% five-star, zero one-star. Not one unhappy customer in 106 reviews. For a registrar ranked #96 in .com pricing with a panel from 1998.

Independent AI Forensic Analysis — 2,480 vs 2,480 reviews

We scraped 2,480 NameSilo and 2,480 Namecheap Trustpilot reviews and submitted them to an independent Claude API analysis, anonymized as "Company A" and "Company B." The AI had no knowledge of which company was which. Its conclusions:

Forensic IndicatorNameSiloNamecheap
5-star ratio89.1%74.0%
1-star ratio7.1%16.7%
Disposable accounts (1 review, no avatar)39% of all~25%
...of those, gave 5 stars92%~65%
Reviews mentioning price11.2%39.2%
Reviews about support/service73.8%62.4%
Named single agent in reviewsLeonid: 168none
5-star vocabulary diversity (TTR)0.073~0.15
HK reviews: 100% five-star57/57n/a
May-Jun 2025 spike (5x normal)215 reviewsnone
AI manipulation verdict92%15%

From the AI report: "Company A exhibits extensive, multi-dimensional evidence of systematic review manipulation through coordinated artificial generation. The probability of these patterns occurring organically approaches zero."

TRUSTPILOT EVIDENCE FILES — SHA-256 VERIFIED
namesilo-trustpilot-all.json (2,480 reviews) — fc73d928...
namecheap-trustpilot-all.json (2,480 reviews) — 789cbc50...
namesilo-trustpilot-manifest.json (all 2,480 user IDs + metadata) — 8f17ca48...
namecheap-trustpilot-manifest.json (2,480 user IDs — control group) — fd9d647a...
trustpilot-forensic-report-final.txt (independent AI analysis) — eaa0fdac...

Every Trustpilot user ID is in the manifest. Every review text, date, country, star rating, avatar status, and total review count is preserved. Cross-reference any entry against ca.trustpilot.com/review/www.namesilo.com. Nothing was fabricated. Nothing was altered. We analyzed what they published. They published what we found.

Everything is self-referential. The domains inflate the revenue. The revenue funds the articles. The articles build the Trustpilot. The Trustpilot convinces investors. The investors fund the stock price. The stock price justifies the acquisitions. The acquisitions launder the money. And 81.5% of it is built on domains that nobody uses, reviews that nobody wrote, and articles that nobody commissioned organically. It's turtles all the way down — and every turtle is NameSilo.

Domain Registration Anomaly Report — 130M+ domains analyzed

We analyzed 5.1 million NameSilo domains against 7 other registrars (130M+ total). 32.2% of NameSilo domains are dead — never activated, no IP, no email, no web presence. Industry baseline: 15-21%. That's $12 million spent on domains that were never used. Dead registrations spiked 7x between 2023 and 2024. Bulk registration runs of 10,000-17,000 domains/day throughout 2025. Disproportionate use of junk TLDs (.sbs, .cfd, .xyz). 96% of domains have no contact email. Consistent with money laundering, self-dealing, or systematic revenue inflation.

Full Report Download 5.1M domains (54MB gz)

For context: NameSilo Technologies Corp. (CSE: URL, OTC: URLOF) has a market cap of C$133M (~US$98M), revenue of C$65.5M, and a net margin of 1.7%. They trade at P/E 143.8x vs industry average 21x. A company valued at C$133M is protecting a $100M+ theft operation. The math doesn't add up — unless the theft operation IS part of the business model.

Corporate structure — public record:

NameSilo Technologies Corp. — parent company. Incorporated in British Columbia, Canada. Listed on the Canadian Securities Exchange (CSE: URL). Also trades OTC in the US as URLOF. Subject to Canadian securities regulation (BCSC).

NameSilo, LLC — operating subsidiary. Registered in Phoenix, Arizona, USA. ICANN-accredited registrar, IANA ID #1479. Subject to US law, ICANN RAA, and Arizona state jurisdiction.

This means two regulatory jurisdictions have authority: Canadian securities regulators (BCSC/OSC) over the parent company and its stock, and US authorities (FBI, DOJ, Arizona AG, FinCEN) over the operating entity. Neither has acted.

PrivacyGuardian.org — NameSilo's built-in scam shield

PhishDestroy scan of NameSilo's WHOIS privacy service — April 2026

PrivacyGuardian.org is not a third-party service. It is owned and operated by NameSilo. Every domain that uses PrivacyGuardian has its registrant email replaced with a pw-{hex}@privacyguardian.org address — making the real owner invisible to abuse reporters, law enforcement, and victims. Privacy is legitimate. Using your own privacy service to shield 109,000+ malicious domains from identification is not privacy — it's infrastructure for fraud.

4.97MPG candidates
109KHARD confirmed PG
181KOn public blocklists
1,065VirusTotal flagged

How we got these numbers: We extracted 4,974,265 candidate domains from the NameSilo customer dataset by matching PrivacyGuardian.org WHOIS markers. We then validated each domain via RDAP against rdap.namesilo.com. Of those validated, 109,195 were HARD confirmed as PrivacyGuardian-protected. We cross-referenced the full list against Spamhaus DBL, SURBL, PhishTank, PhishingArmy, CERT-PL, AlienVault OTX, Hagezi, uBlock, AdGuard, ThreatFox, and our own internal blocklist of 130K+ domains.

Top blocklist sources

Spamhaus DBL: 77,522
SURBL: 68,345
PhishDestroy internal: 22,783
Hagezi TIF: 16,090
1Hosts: 14,075
ScamAdviser: 6,222
PhishingArmy: 2,439
CERT-PL: 2,367
AlienVault OTX: 1,180

What these domains do

Cryptocurrency theft: 1,064
WalletConnect phishing: 69
Gambling scam: 21
Tech support scam: 20
Social media phishing: 18
Seed phrase phishing: 11
Airdrop scam: 7

Top drainers: Angel Drainer (153), Solana Drainer (48)

Top TLDs (malicious PG domains)

.com: 41,265 — .top: 26,600 — .net: 15,412
.sbs: 12,004 — .org: 11,035 — .biz: 6,962
.wiki: 6,597 — .info: 5,647 — .cfd: 5,353
.xyz: 5,225 — .vip: 4,929 — .help: 4,442
.click: 4,404 — .rest: 2,206 — .icu: 1,619

Same junk TLD profile as the dead domain analysis. .sbs, .cfd, .xyz, .top — the same abuse-prone TLDs dominate both datasets.

Top targeted brands

SushiSwap: 213 — Base: 161 — Across: 57
Sui: 38 — Hyperliquid: 32 — Google: 27
Solana: 26 — Bet365: 26 — Ledger: 25
Ethereum: 21 — Linea: 21 — OKX: 20
Coinbase: 25 — Pump.fun: 23

Ledger, Coinbase, OKX, Ethereum — real financial brands being impersonated through NameSilo's own privacy service.

Hosting geography (malicious PG domains)

US: 31,816 — DE: 20,254 — NL: 11,811
HK: 11,327 — SG: 6,639 — GB: 1,886
IE: 1,791 — JP: 1,734 — MY: 1,516

VirusTotal breakdown

Flagged ≥1 engine: 1,065 (63% of enriched)
Flagged ≥4 engines: 485 (29%)
Flagged ≥10 engines: 303 (18%)
AlienVault OTX active: 221 (13%)

The bottom line: NameSilo operates its own WHOIS privacy service. That service shields 109,000+ confirmed malicious domains from identification. These domains impersonate Coinbase, Ledger, OKX, Ethereum, Google, and dozens of other brands. They run Angel Drainer, Solana Drainer, and wallet-connect phishing at industrial scale. 77,522 of them are flagged by Spamhaus. And NameSilo — the ICANN-accredited registrar that operates PrivacyGuardian — tells every abuse reporter: "As an ICANN-accredited registrar..."

This is not negligence. This is a business model. The privacy service exists to make abuse reporting harder. The junk TLDs exist because they're cheap and disposable. The dead domains exist to inflate revenue. And the ICANN accreditation exists to wave at anyone who asks questions. 109,000 malicious domains protected by your own service, NameSilo. How many more do you need before someone calls this what it is?



Let's be clear about what we're looking at. These are not sophisticated actors. The operational pattern is identical to hundreds of Russian-origin scam operations that pay kickbacks to FSB-adjacent structures for protection — the only difference is the scale and the fact that they're hiding behind a US-incorporated company in Arizona instead of a Belize shell. The logic is the same: steal, suppress, buy reputation, delete evidence, threaten researchers, and rely on institutional inertia to never face consequences. They got comfortable because it worked for 10 years. It's not going to work for the 11th.

[email protected] — we share what we know with any victim, investigator, or prosecutor.

SEO Manipulation

"SEO Grandpa" — Operator's Google Drive Orders

Google Drive — Folder 1 Google Drive — Folder 2 Google Drive — Folder 3 Google Slides Google Sites Google Forms

Drive owner: [email protected] (last modified Oct 2023)

The Exit

Exhibit — Operator's Farewell Letter

The operator ran. The site is still live. NameSilo still hasn't suspended the domain.

On May 5, 2026, the xmrwallet operator posted a farewell letter on the site and GitHub repository — announcing complete closure. He signed it "The Creator of xmrwallet.com" without using his real name. This letter is direct evidence: it proves the operator was aware of the investigation, it contains verifiable lies about the theft mechanism, and it confirms the site was operated by a single individual from 2018 to 2026. We saved a copy immediately. As of today, the domain xmrwallet.com is still active and NameSilo still has not suspended it.

Lie #1 — "View key cannot give access to spend your funds"

"A view key does not, and cannot, give the service access to spend your funds."

Reality: The theft mechanism does not use the view key to spend. It uses session_key exfiltration — the wallet address and private view key are base64-encoded into a session identifier, sent to the server, where the server constructs its own transaction using 8 PHP endpoints. The operator knows this because he wrote the code. He is deliberately misdirecting victims toward a view-key debate while the actual exploit is server-side transaction hijacking. This is consciousness of guilt.

Lie #2 — "Unfunded" and "cannot afford server costs"

"This project is unfunded and maintained in my spare time, I simply cannot afford the server costs."

Reality: The operator stole an estimated $100M+ in Monero over 8 years. Server hosting on DDoS-Guard costs ~$550/month. He pre-paid 5-10 year domain registrations across 6+ registrars. He purchased 50+ SEO articles, social media spam packages, and maintained multiple mirror domains simultaneously. The "unfunded volunteer" narrative is for victims who don't read the technical evidence.

Admission — "The person who attacked us"

"We have recently been the target of sustained attacks... The person who attacked us did so under the accusation that our service requires a view key."

What this confirms: The operator acknowledges PhishDestroy's investigation forced the closure. He frames security research as "attacks." He does not deny any specific finding. He does not produce counter-evidence. He redirects to the view-key strawman. An innocent operator would publish the server logs proving no theft occurred. He didn't.

Evidence value — "Thank you to everyone who sent donations"

"A special and sincere thank you to everyone who sent donations throughout the years. Your immense generosity is what kept the servers running."

For investigators: The operator claims donations funded the servers. This is falsifiable. Subpoena the donation address transaction history. Compare total received donations vs. total funds that "disappeared" from user wallets. The gap between those numbers is the theft volume. The operator just told you where to look.

Read Full Farewell Letter SHA-256: 6c31afb9d6cccb1018323e491ebba78457fa7e2ebf7794670684b9e5c009a199

Captured from xmrwallet.com on May 5, 2026. The letter was published as the site's index page. We archived the complete HTML including all CSS, scripts, and metadata. The operator signed as "The Creator of xmrwallet.com" — not as "Nathalie Roy", not by any name. But the email headers from February say N.R. And the WHOIS records say the rest.

Why did he "leave"? Not guilt. Evidence destruction.

The operator — who registered under the name "Nathalie Roy" (a woman's name; the actual operator is male and elderly, nicknamed "SEO Grandpa" by us for his love of buying spam links and junk articles on Kwork for 500 rubles a pop) — did not shut down out of remorse. He redirected the xmrwallet.com domain to GitHub Pages, where the farewell letter is now hosted. This is not a shutdown. This is a calculated move to:

1. Erase URLscan evidence. When the domain points to GitHub Pages, previous URLscan scans of the malicious site become stale. New scans show a benign GitHub-hosted page. The forensic record of what the site actually did — the 8 PHP endpoints, the session_key exfiltration, the server-side TX hijacking — gets buried under clean scans of a static farewell letter.

2. Automatically reduce VirusTotal detections. When security vendors re-scan xmrwallet.com and see a GitHub Pages site instead of a malware-laden wallet, they remove their detections. The operator has been filing regular VT appeals and re-scan requests — we observed this pattern. Each re-scan with the domain pointing to GitHub lowers the detection count. This is exactly what NameSilo promised to help with: "working with the registrant to remove the website from VT reports." They found a way.

3. NameSilo got nervous. The ICANN filing, the law enforcement referral, the public exposure with 11K views — and then US authorities apparently started asking questions. The farewell letter appeared shortly after. Coincidence? The operator didn't suddenly develop a conscience after 8 years and $100M. Someone told him to cool down. Someone with a vested interest in making the problem go away quietly.

4. The DNS history confirms this was deliberate — and clumsy. The domain xmrwallet.com was never pointed to GitHub before this. For years it resolved to DDoS-Guard/IQWeb infrastructure — the real scam backend. The redirect to GitHub Pages was recent, intentional, and it took the operator 3 attempts to get the DNS configuration right. A "developer" who built a "sophisticated open-source wallet" needed three tries to set up a GitHub Pages CNAME. This level of technical skill is consistent with: the NameSilo admin panel design, the Kwork article ordering, and everything else about this operation. These are not sophisticated actors. They are persistent ones.

The "farewell" is not an exit. It's a cleanup operation. The domain is still registered. The DNS is still active. The operator is still out there. And the evidence destruction is ongoing — every day the domain points to GitHub, another security vendor removes their detection. This is why we archived everything before they could erase it.

Exhibit — Suppressed Social Media Evidence

@Phish_Destroy — 26 tweets that got us silenced

Every tweet posted by @Phish_Destroy was screenshotted and archived before the account was locked via X Gold Checkmark corporate support. These 26 screenshots are the complete record of our public communication about xmrwallet and NameSilo. X/Twitter deleted the originals. We kept the receipts.

For investigators: Request X/Twitter's deletion logs for @Phish_Destroy. Compare what was removed vs. what survived. Cross-reference with the timestamps in these screenshots. Every moderator action has a paper trail. The reports that triggered the lock were filed by NameSilo or the operator — request the reporter identity.

Click any screenshot to view full size. All 26 images are part of the IPFS archive. Original posts were deleted from X/Twitter after Gold Checkmark corporate intervention — these are the only surviving copies outside of X's own servers.

Exhibit — xmrwallet Victim & Technical Evidence

Additional Evidence Screenshots

Victim theft reports, deleted GitHub issues, DNS infrastructure maps, VirusTotal detections, and the operator's CIS-origin indicators. All SHA-256 verified in ALL_EVIDENCE_HASHES.txt.

400 XMR stolen — BitcoinTalk victim report
30 XMR stolen — bits.media Russian victim
GitHub Issue #15 — "Money stolen"
VirusTotal — multi-vendor detection
DNS Map — xmrwallet.com infrastructure
DNS Map — xmrwallet.cc (suspended)
DNS Map — xmrwallet.biz (suspended)
Issue #35 — overview (DELETED by operator)
Issue #35 — auth flow diagram
Issue #35 — 8 PHP endpoints
Russian trail — CIS origin indicators

Court-Ready Documents — PDFs & Formal Filings

📄
ICANN Complaint
PDF — d4e7641a...
📄
Evidence Report
PDF — c21d7ce7...
📄
Victim Advisory
PDF — e38a36f9...
📄
Deleted Evidence Timeline
PDF — 9db29c39...
📝
Medium Article Mirror
HTML — local copy of published article
🔍
Technical Research Report
Full xmrwallet analysis — a325461c...
For Victims & Authorities

You are not powerless. Don't stay silent.

The operator's entire strategy depends on victims giving up after being silenced. This section is for those who refuse.

🛡️

If you are a victim

We know it feels hopeless. Monero is private. Your money seems gone. They deleted your reviews, your posts, your warnings. They want you to believe there's nothing you can do. That's not true.

  • There are legal levers. The registrar is a US company (NameSilo, LLC, IANA #1479). They can be called to court. The scam operator himself suggested this — interesting, isn't it?
  • Monero is private, not invisible. Transaction timing, exchange deposits, IP correlation, and the operator's own infrastructure leave traces. Evidence exists. Forensics firms specialize in this.
  • Criminal cases are open in Europe. You are not alone. Other victims have contacted us. The documented amount exceeds $20M, and we believe the real total is at least 5 times higher.
  • Don't be afraid of account deletion. Yes, they will try to delete your posts, your reviews, your warnings. Let them. Every deletion is documented. Every suppression attempt becomes evidence. They cannot just steal your money and force you to stay silent.
  • File abuse reports. Even if previous reports were ignored, file them. With NameSilo. With ICANN. With your local law enforcement. Each report creates a paper trail that becomes harder to deny.
  • Contact us: [email protected] — your report will be added to the case file.

The operator's power was making victims disappear. This archive makes that impossible.

⚖️

For law enforcement & regulators

This archive is structured as a court-ready evidence package. Everything you need is here.

  • ICANN Compliance: Full case file submitted March 18, 2026. NameSilo (IANA #1479) is an accredited registrar subject to RAA obligations including abuse handling.
  • Evidence integrity: Every screenshot is SHA-256 fingerprinted in EVIDENCE_HASHES.txt. The hashes were published before any party could have modified the originals.
  • Operator identification: The operator signed emails as "N.R." Technical infrastructure analysis, domain registration patterns, and payment trail documentation are in OPERATOR_PROFILE.md.
  • Registrar conduct: NameSilo's public statement contains 4 independently falsifiable claims. Full analysis: THE-LIES.md. The suppression campaign is documented in PRESSURE.md.
  • License: Explicit written consent for any victim, prosecutor, regulator, or court to use this material as-is.
  • Theft mechanism: Server-side transaction hijacking via 8 PHP endpoints. Full technical breakdown in the xmrwallet investigation.
  • Scale: Documented losses exceed $20M. Based on victim contacts and timeline analysis, the actual total over the full operating period is likely $100M+.
  • Recommended subpoenas — Trustpilot: Request all deleted/removed reviews for xmrwallet.com. Over 100 victim reviews were removed through automated moderation abuse. The original reviews are recoverable via SHA-256 hashes and Wayback Machine snapshots of the Trustpilot page. The delta between archived and current reviews is the suppression count.
  • Recommended subpoenas — GitHub: Request the full issue history for the xmrwallet repository, including deleted issues. We observed issues disappearing — the gap between sequential issue IDs and the ones we recorded proves deletions. Request deleted user accounts associated with victim reports.
  • Domain registration pattern: The operator registered xmrwallet mirrors across multiple registrars with 5–10 year registration periods. Each clone domain linked directly from the main site — all archived in the Wayback Machine. We systematically took these domains down, one by one. A legitimate service does not pre-register escape domains for a decade across multiple registrars. This is infrastructure for a long-term fraud operation.
  • Hosting forensics: All domains use IQWeb / DDoS-Guard infrastructure. The codebase hash is identical across every mirror — public scan results confirm this. These are not independent clones or compromised copies. This is a single operator deploying the same theft code across a network of domains on bulletproof hosting.
A personal note from PhishDestroy

"Feel free to dismiss all of this. We've been dismissed before — usually right before we turned out to be correct."

Who we are

Specialists in CIS-origin scam operations. Hundreds of phishing sites shut down. The patterns here — DDoS-Guard, Kwork orders, SEO burial, suppression playbook — are a recognizable operational signature.

What we know

There is a direct connection between the operator and the registrar beyond a standard client relationship. The operator invited us to prove he was a thief. We did. Then they tried to erase us.

The scale

Initial estimate: $20M. Actual figure: very likely north of $100 million. We use the conservative number publicly. But we know.

For investigators

Every suppression attempt is traceable. Subpoena Trustpilot (100+ deleted reviews) and GitHub (21+ deleted issues). The suppression campaign is evidence of the operation.

To the victims who lost their Monero over the last decade:

This archive exists for you. The operator is identified. The registrar is on record. Criminal cases are open in Europe. You are not alone and you are not powerless.

Archive

Complete mirrors. Self-contained. Permanent.

Every repository, every page, every screenshot. GitHub goes down, domains get seized, accounts get locked — it's all still here.

Blocklist

DestroyList

Real-time phishing & scam domain blocklist. 130,000+ curated threats. Plain text, hosts, AdBlock Plus, dnsmasq. Threat intelligence API. All raw data included.

Evidence

NameSilo Cover-Up

The registrar's tweet, operator emails, X Support contradictions, SHA-256 verified screenshots, full technical breakdown. Filed with ICANN and law enforcement.

Research

xmrwallet.com

Private key theft, server-side TX hijacking, 8 PHP endpoints, Google Analytics tracking. Deleted GitHub Issues #35 & #36 — cached copies included.

Intel

ScamIntelLogs

Scam operator infrastructure analysis. Phishing kits, panel configs, affiliate networks, crypto drainer source code. Raw intelligence.

Tools

DestroyScammers

Interactive scam analysis dashboard. Domain lookup, operator tracking, infrastructure mapping.

Archive Map

What's inside. Where to find it.

Full directory of this IPFS archive. Every page, every document, every piece of evidence — linked and described.

Raw Data

Download. Verify. Investigate.

Machine-readable datasets for investigators, journalists, and forensic analysts. Every file is SHA-256 verified. Download everything — check our work.

💾

NameSilo Domain Dataset

CSV.GZ · 54 MB · 5,179,405 domains

Complete NameSilo registrar dump: domain URL, registration/expiry dates, Majestic rank, contact email, phone, IP address, geolocation. The dataset behind the anomaly report.

Download CSV.GZ ↓
🔒

Evidence Hash Manifest

TXT · 61 evidence files

SHA-256 hashes for all 61 evidence screenshots (16 primary + 19 additional + 26 tweets). Generated at capture time — any mismatch = tampering.

Download Hashes ↓
🌍

Cached Evidence Archive

270+ files · ~80 MB · SHA256SUMS included

Complete mirror of external evidence: Reddit threads, Wayback Machine snapshots, VirusTotal reports, URLscan results, Trustpilot reviews, SecurityTrails DNS history. Saved before deletion pressure.

SHA256SUMS ↓
🧬

DNS History — SecurityTrails

JSON · 40 files · 7 domains + njal.la

Complete A/NS/MX/TXT/CNAME history, RDAP live status, subdomains, associated domains. Proves: Namecheap(2014) → DigitalOcean(2018) → Cloudflare(2021) → DDoS-Guard(2024) → GitHub Pages(2026).

Browse JSONs ↓
🔎

URLscan API Dumps

JSON + HTML + PNG · 47 files

Scan results for xmrwallet.com and .app. Transaction logs, DOM snapshots, link analysis. API JSON with full HTTP headers, certificates, and resource hashes.

Browse Scans ↓
🚨

VirusTotal Reports

HTML + PNG · 44 files · 7 domains + 3 IPs

Detection, details, relations, community tabs for every xmrwallet domain (.com, .app, .cc, .biz, .me, .net, .homes) plus njal.la and associated IPs.

Browse VT ↓
📄

Court-Ready PDFs

PDF · 4 documents

ICANN complaint, evidence report, victim advisory, deleted evidence timeline. Formatted for legal proceedings.

Browse PDFs ↓
📊

Domain Anomaly Report

Markdown · 130M+ domains analyzed

8-registrar comparison: dead domain rates, TLD profiles, IP concentration, cost analysis. NameSilo at 32.2% dead vs 15-21% baseline. $50M+ phantom revenue from dead registrations.

Read Report ↓
🤖

Bot Farm URL List

TXT · 68+ URLs

Complete list of Twitter/X bot posts promoting xmrwallet. Three waves: 2018 Kwork batch, 2023 Google Drive match, 2025-2026 still active. All live, none removed.

Download URLs ↓
Verification: sha256sum -c SHA256SUMS.txt — run this on any downloaded directory. Every file's integrity is independently verifiable. If a hash doesn't match, the file was tampered with after publication. Open an issue or contact [email protected].
Suppression Log

Every platform. Every time. Same playbook.

The operator kept victims silent for a decade. Then he tried it on us. We documented it all before it happened.

Twitter / X

Gold Checkmark corporate support used to lock @Phish_Destroy. X reviewed: "no violation." Still locked.

Bing Search

All phishdestroy.io results removed from Bing. Complete erasure from Microsoft search.

GitHub

False DMCA takedowns against repos. Operator deleted Issues #35 & #36 with victim reports.

Trustpilot

100+ victim reviews removed through automated moderation abuse.

Google / DMCA

DMCA requests against Google search results, domains, hosting. Anything reportable gets reported.

SEO Burial

50+ paid articles via Kwork, Freelancehunt, intermediaries. Orders indexed on Google Drive.

YouTube

Technical analysis videos reported and removed. Researchers demonstrating the theft silenced.

BitcoinTalk

Coordinated reporting against warning threads. Community discussion suppressed.

Gov Emails

Government email addresses used to file fraudulent abuse reports on platforms.

DDoS-Guard

"Open source" wallet on bulletproof hosting. GitHub code ≠ production code. Anti-analysis infrastructure.

Every platform with a "report" button has been weaponized. Every search engine accepting DMCA requests has been abused. Every freelance marketplace used to buy burial. This is a decade-long strategy — not an accident. The operator and NameSilo are on the same side. The case file is with ICANN Contractual Compliance and federal law enforcement.

Archive Integrity

Evidence Catalog & Chain of Custody

Every file is SHA-256 fingerprinted at capture time. Any byte changed = hash mismatch = tampering detected. This is a court-grade evidence chain.

61Screenshots
16Documents
5PDFs
54MBDataset
460+Total files
🔒 Complete Hash Manifest 36 evidence files — SHA-256
8be4e8c2...
🌐 Archive Index Wayback + GhostArchive URLs
3dd65240...
Primary Hashes 16 core screenshots — SHA-256
1bbb41d4...

Main Pages

index.html — This pagesee git evidence.html — Full evidence archive38dceb84 xmrwallet-research.html — Technical reporta325461c

Court Documents

ICANN Complaint (PDF)d4e7641a Evidence Report (PDF)c21d7ce7 Victim Advisory (PDF)e38a36f9 Deleted Evidence Timeline (PDF)9db29c39 ICANN Complaint (HTML)176c7ba3

Key Evidence

Operator Farewell Letter (May 2026)6c31afb9 5.1M Domain Dataset (54MB gz)126a19f6 Medium Article MirrorHTML Deleted GitHub Issue #35 (cached)HTML Deleted GitHub Issue #36 (cached)HTML

Investigation Dossier — 16 files

THE-LIES.md — 4 lies debunked61d7a44d PROOFS.md — SHA-256 proof chain8b70ea93 OPERATOR_PROFILE.md — operator ID0aafb506 PRESSURE.md — suppression7879ec02 CONNECTION.md — registrar link3c7682de ARTICLE_FULL.md — full articleb5bc1f43 SCAM_TECHNICAL.md — theft mechanism26e361be XMRWALLET_TECHNICAL.md — deep-dive43fe1269 VICTIMS.md — victim reports50e7ae01 SOURCES.md — all sources9f273af9 TWITTER_ARCHIVE.md — tweet archiveaaf2e714 MEDIUM_MIRROR.md — articles5057b4ae DOMAIN_ANOMALY_REPORT — 130M+ analysis760873fd LICENSE — explicit usage consent77d1be74

61 Evidence Images — Complete Breakdown

16 Primary Screenshots

Operator emails, NameSilo tweet (4 lies), @Phish_Destroy rebuttals, X Support "no violation", GhostArchive copies, VT delisting evidence. All in evidence/

11 Additional Screenshots

Victim reports (BitcoinTalk, bits.media), deleted GitHub Issues #13/#15/#35, DNS infrastructure maps, VirusTotal, Trustpilot, operator taunts. All in screenshots/

26 Tweet Screenshots

Complete @Phish_Destroy archive. Every tweet captured before Gold Checkmark lock. The posts X/Twitter tried to erase. All in tweets/

🛡️

How to verify integrity

Download any file from this archive. Run sha256sum <filename> and compare the output against the hash shown here or in ALL_EVIDENCE_HASHES.txt. If any hash doesn't match, the file was tampered with after publication. All hashes were generated at the time of capture — before any party could modify the originals. Report any mismatch to [email protected].

Contact

Report. Verify. Contribute.

Main Site

phishdestroy.io

GitHub

github.com/phishdestroy

Codeberg

codeberg.org/phishdestroy

Ethereum Name Service

phishdestroy.eth

Medium

phishdestroy.medium.com

Telegram Bot

@PhishDestroy

Mastodon

mastodon.social/@phishdestroy

Victim Reports

[email protected]

Submit Evidence

[email protected]