PhishDestroy Windows 98 Evidence Archive 


A fatal exception 0x1479:DEADBEEF has occurred in NAMESILO.EXE.
The current operation "COVER_UP_$100M_THEFT" cannot continue.

* Press any key to return to the evidence archive.
* Press CTRL+ALT+DEL to pretend this never happened (NameSilo's preferred option).

EVIDENCE_NOT_FOUND is not a valid error code when the evidence is on IPFS.

> 585,000 dead domains registered in 2025
> $0 in abuse reports actioned
> 10,000-17,000 phantom domains purchased daily
> Bitcoin accepted. No KYC. No questions.
> P/E 143.8x (industry average: 21x)

The registrar will be restarted. Your stolen funds will not be returned.

Press any key to continue _
🌐Main Archive
(Cyberpunk)
📊Investor
Presentation
💻NameSilo
Panel
📷Evidence
Gallery
🤖Bot Farm
Analysis
💣truth.exe
💾5.1M Domain
Dataset
🌍Languages
(10)
PhishDestroy Evidence Archive — FULL REPORT
_
X
⚠ WARNING: This page contains facts about NameSilo, LLC (IANA #1479, Phoenix AZ). Facts may cause discomfort to shareholders, executives, and people who believe ICANN accreditation is a get-out-of-jail-free card. You have been warned. We haven't.

TL;DR: xmrwallet.com stole an estimated $100M+ in Monero over 8 years via server-side transaction hijacking. NameSilo, LLC publicly defended the operator, fabricated a "compromise" story, offered to remove VirusTotal detections, and used X Gold Checkmark to silence researchers. This archive contains 61 SHA-256 verified screenshots, court-ready PDFs, operator emails, ICANN filing, 130M+ domain analysis, and the operator's own farewell letter.

Archive Stats
Domains blocked130,000+Stolen & documented$20M+
Platforms censored7+Claims disproven0
Evidence screenshots61 (SHA-256)Court-ready PDFs5
Domain dataset5.18M rows (54MB)Cached evidence270+ files
Suppression Campaign
PlatformStatusWhat happened
BingDEADAll phishdestroy.io results removed
Twitter / XLOCKEDGold Checkmark lock. X review: "no violation." Still locked.
GitHubWONFalse DMCA. Contested. Repos restored.
GoogleWONDMCA requests against search. Contested. Won.
IPFS/ENSSAFENo server. No host. No "report" button.
TrustpilotDEAD100+ victim reviews removed
YouTubeDEADTechnical analysis videos reported & removed

How we found it: We were scrolling through 5.18M NameSilo domains. Row after row of gibberish: sdf8k3jx.sbs, x9wqm2.cfd. No IP, no email, no phone, no rank. We decided to count. NameSilo was 10pp above its closest competitor. 2x industry baseline. 615% spike. We didn't go looking for money laundering. The data showed it to us.

The NameSilo Pyramid — 5.18M Domains Deconstructed
_
X
LayerCount%Status
Total domains5,179,405100%What they claim
No DNS + parking stubs2,882,77456%PHANTOM
Has real IP2,296,63144%Maybe real
HTTP alive (responds)~958,18818.5%Possibly legit
Real business54,8551.06%Actual companies
Top-million traffic17,8750.35%Real websites
Tranco top 10K58lolThat's it
Zero Traffic99.65%
of portfolio
Phishing Ratio1 : 1.3
legit : phishing
vs Top-10K387x
more scam than legit
Dirty Ratio by Comparison Base
Compare againstRatioTranslation
Total (5.18M)0.43%"barely anything" ← what NameSilo claims
Live IP (2.3M)0.98%"almost 1%"
HTTP alive (958K)2.34%"every 43rd site"
Top-million (17.8K)125.6%"more scam than legit"
Real business (54.8K)40.9%"1 phishing for every 2.5 businesses"

The phantom domains are a statistical smokescreen. Dilute the denominator → hide the crime rate.

Price Comparison — "Low Cost Leader" Exposed
_
X

Source: tldes.com — 136 ICANN-accredited registrars, live prices.

#.com RegistrarRegisterRenewTransfer
1Spaceship$2.90$10.18$8.17
3GoDaddy$5.19$23.19$13.19
6Namecheap$6.99$14.98$11.08
14Dynadot$8.99$10.88$10.49
23Porkbun$10.08$11.08$10.08
26Cloudflare$10.46$10.46$10.46
... 100+ registrars cheaper than NameSilo ...
~96NameSilo 🤡$15.56$17.29$9.80
#96 of 130Bottom 26%
vs Spaceship5.4x more expensive
Cheaper registrars95+
Their Comparison Page is Fraud
CompetitorNameSilo claimsReal price (tldes.com)Inflated by
GoDaddy$23.98$5.194.6x
Name.com$17.99$11.241.6x

They also claim "Over 150+ Payment Options." We counted: 12 methods. 7 cards + 3 web wallets + Bitcoin + Account Funds. Inflated 12.5x.

Why would anyone choose NameSilo? Not price (#96). Not UX (Win98). Not support (ignored 20+ abuse reports). Not ICANN (everyone has it). The only explanation: most domains aren't bought by real customers.
ShortDot SA Partnership — Follow the Money
_
X

ShortDot SA (Luxembourg, 9 Rue Louvigny) owns: .sbs, .cfd, .icu, .cyou, .bond, .buzz, .qpon

On shortdot.bond/about, they name 6 partners out of 400+:

GoDaddy, Alibaba, GMO, Namecheap, NameSilo, Dynadot
Timeline
Apr 2024ShortDot acquires .sbs from Australian SBS Corporation
Apr 2024ShortDot acquires .cfd from DotCFD Registry Ltd
2024NameSilo dead domains spike 615% (67K → 485K)
2025Spike continues: 585K dead domains, 10K-17K/day
ShortDot sells .sbs/.cfd wholesale ~$0.30-0.50 | v NameSilo registers at $0.99 retail | + counts as "domain under management" | + inflates revenue in quarterly reports | + dilutes scam ratio v ShortDot reports "growing TLD adoption" | + justifies acquisition costs v Both grow. Both report metrics. Nobody checks.
NameSilo~11%
ShortDot TLDs
GoDaddy<0.2%
ShortDot TLDs
Anomaly55x
concentration gap
5 Questions That Demand Answers:
1. Who buys hundreds of thousands of .sbs/.cfd and never activates them?
2. Where is the money coming from? Show the payment records.
3. Does ShortDot know their TLDs are vehicles for phantom revenue?
4. Why did the 615% spike coincide exactly with ShortDot's acquisitions?
5. Is ShortDot receiving payment for these registrations? From whom?
⚠ PROSECUTION BRIEF — The Case for Money Laundering
_
X
Not a theory. Not speculation. A chain of evidence that leads to one conclusion.
1STEAL — xmrwallet.com hijacks Monero transactions for 8+ years. ~$100M+ stolen. Funds in XMR — untraceable.
2CONVERT — XMR → BTC via DEX/mixers/OTC. Untraceable step. Output: Bitcoin.
3WASH — Buy domains at NameSilo. NameSilo accepts Bitcoin. No KYC. 10K-17K domains/day. $0.99 junk TLDs. Never activated. The purchase IS the purpose.
4REPORT — NameSilo books as revenue. C$65.5M/year. "Fastest growing." Stock on CSE (URL). P/E 143.8x.
5CASH OUT — Insiders sell shares. Kristaps Ronka (18.5%, ~17M shares). Clean money. Laundry complete.
The Bitcoin On-Ramp

NameSilo accepts Bitcoin. This is the on-ramp. Stolen XMR → BTC → domains → "revenue." Zero identity verification. No KYC. No bank. They don't even accept Monero — the BTC step IS the mixer.

The Math
Dead domains (2024)485,000 (615% spike)
Dead domains (2025)585,000 (10K-17K/day)
Avg cost per domain$0.99 - $3.00 (junk TLDs)
Annual spend (low)$579,150
Annual spend (mid)$1,755,000
Cumulative dead total1,668,355 domains
Total estimated spend$3.2M - $12M+
Source of fundsUNKNOWN
Payment methodBitcoin accepted. No KYC.

This is either the worst investment in internet history or money laundering. There is no third option.

10 Questions for the Investigation

For FBI, FinCEN, Arizona AG, CSE/OSC, ICANN — anyone with subpoena power.

01Show the payment records for 585,000 dead domains. Who paid? Which wallets/cards/accounts?
02How many purchases were in Bitcoin? Total BTC amount? Traced to mixers or illicit wallets?
03How many unique customers buy 10K-17K dead domains/day? 10,000 buyers or 3 accounts?
04Do any accounts belong to NameSilo employees/officers? Ronka? Andreola? Related entities?
05What is the financial relationship with ShortDot SA? Revenue sharing? Volume commitment?
06Subpoena the abuse ticket system. How many xmrwallet reports filed 2018-2026? Compare to "no reports received."
07Who authorized the VirusTotal delisting offer? Routine practice or one-time?
08Has NameSilo filed SARs with FinCEN? 585K anonymous domains/year = textbook suspicious activity.
09What % of C$65.5M revenue comes from never-activated domains? Why wasn't this disclosed?
10Trace the Bitcoin payments. Chainalysis/Elliptic can answer this. One subpoena. Do it.

Every question can be answered with a single subpoena.
The only reason they haven't been answered is that nobody has asked.

Inflation Pattern — Every Documented Lie
_
X
Their ClaimRealityMethodInflate
"5.8M active domains"~958K activeCount phantoms6.1x
"150+ payment options"12 methodsCount card brands12.5x
GoDaddy "$23.98"$5.19Use renewal price4.6x
Name.com "$17.99"$11.24Use inflated price1.6x
"No abuse reports"100+ receivedDelete and deny
"Domain compromised"Code never changedFabricate narrativeFiction
"Low cost leader"#96 of 130Show inflated competitorsFraud
"Fastest growing"615% dead spikeCount phantoms as growthPhantom

Lying is not their cover-up strategy. It's their business model.

Pre-Emptive FAQ — NameSilo's Response Playbook
_
X

We've dealt with enough registrars to know exactly what they'll say.

"We are an ICANN-accredited registrar."

Yes. You mentioned it in your abuse responses, Twitter, Wikipedia, and Q3 2025 SEDAR+ filing. Trustname.com (IANA #4318) is also accredited — with €120 in revenue and a deletion notice. ICANN accreditation is a commercial license, not a character reference.

"The domain was compromised."

We have SHA-256 hashes from before and after. The code never changed. The IP never changed. The operator himself never claimed compromise. You invented this story.

"We had received no abuse reports."

20+ from us alone with delivery receipts. Public posts on BitcoinTalk (2021) and Reddit (2018) mention filing reports. Real total likely 100+. Would you like us to publish the receipts?

"Dead domains are normal."

Correct. 15-21% is baseline. You're at 32.2% — 2x baseline. With a 615% spike. And 10K-17K/day bulk runs. Namecheap is at 32.6%. Explain the gap.

"njal.la is an independent reseller."

WHOIS says NameSilo, LLC. Not njal.la. Your internal arrangements don't override public registry data, ICANN rules, or the law.

"We will pursue legal action."

The operator threatened the same in February. It's May. We're on IPFS. Truth is an absolute defense. Sue us — this archive becomes court exhibit A through Z. Discovery will be fun.

[Silence]

Also an option. Every day of silence is another day the evidence sits on IPFS, indexed by search engines, read by investigators. Silence is not a strategy. It's a countdown.

NameSilo Technologies Corp. — Investor Data
_
X
Corporate Structure
ParentNameSilo Technologies Corp.British Columbia, CanadaCSE: URL / OTC: URLOF
SubsidiaryNameSilo, LLCPhoenix, Arizona, USAIANA #1479
CEO (Parent)Paul Andreola
CEO (LLC)Kristaps Ronka (18.5% owner, ~17M shares)
Q3 2025 Financials
RevenueC$16.9M (+17.9%)Market capC$133M
Net incomeC$1.15M (+135%)Shares92.6M
CashC$2.4MP/E143.8x (industry: 21x)
Deferred revC$33MAcquisitionsSewerVUE ($2.45M)
If you own shares: 81.5% of domains have never been a real website. "5.18M domains" is really ~958K active. Revenue growth may be phantom domain purchases. This is a securities fraud problem. CSE, OSC, and SEC should be asking questions.
Why Self-Buy Domains?
1. Money launderingStolen crypto → domains → "revenue." $3.2M/year.
2. Ranking inflationMore domains = "top 10 registrar" = more trust.
3. Revenue inflationPhantom revenue → stock price → insiders sell.
4. Scam ratio dilution5% abuse looks bad. Buy 2M dead → now it's 0.5%.

One move, four wins. Who's checking?

📊 View Full Investor Presentation (10 slides)

Evidence & Downloads
_
X
Key Downloads
FileSizeDescription
namesilo-domains-5.1M.csv.gz54 MBComplete NameSilo domain dataset (5,179,405 rows)
ALL_EVIDENCE_HASHES.txtTXTSHA-256 hashes for all 61 evidence files
cached-evidence SHA256SUMSTXT270+ cached evidence files manifest
ANOMALY_REPORT.mdMD130M+ domain analysis report
Court-Ready PDFsPDFICANN complaint, evidence report, victim advisory
Operator FarewellHTMLThe operator's own admission (May 2026)
Evidence Categories
16 primary screenshotsOperator emails, NameSilo tweet (4 lies), X Support, VT delisting
11 additional screenshotsVictim reports, deleted GitHub issues, DNS maps, Trustpilot
26 tweet screenshotsComplete @Phish_Destroy archive before Gold Checkmark lock
270+ cached pagesReddit, Wayback, VirusTotal, URLscan, SecurityTrails, victims
Verification: sha256sum -c SHA256SUMS.txt — every file's integrity is independently verifiable. If a hash doesn't match = tampering.

📷 Full Evidence Gallery 🤖 Bot Farm Analysis 🌐 Main Archive (Cyberpunk)

Contact PhishDestroy
_
X
Main sitephishdestroy.io
IPFSphishdestroy.eth.limo (ENS)
Email[email protected]
GitHubgithub.com/phishdestroy
Twitter/X@Phish_Destroy (locked by Gold Checkmark)
Telegramt.me/phishdestroy
$0 received. Ever. Zero income. No sponsors. Funded by parents. Donations forwarded. If anyone claims PhishDestroy is financially motivated — good luck proving that.
About This Page
X

PhishDestroy Evidence Archive — Windows 98 Edition

Same evidence as the main archive. Same SHA-256 hashes. Same facts. Different aesthetics.

This page is our tribute to NameSilo's actual admin panel design, which their CEO Kristaps Ronka admitted needs a "complete UX overhaul" after seven years. We recreated the experience they give their customers — and applied it to the evidence they tried to suppress.

phishdestroy.eth — Permanent IPFS Archive — 2026

💡 Start
PhishDestroy Evidence
Main Archive
NameSilo Panel
12:00