PhishDestroy Research — Back to Full Investigation

xmrwallet.com is a Scam — Use These Safe Monero Wallets Instead

By PhishDestroy Research · Published February 24, 2026 · Updated February 24, 2026
WARNING: xmrwallet.com is a confirmed Monero theft service that steals private view keys and hijacks transactions. Over $2M has been stolen from 15+ documented victims. Do NOT use xmrwallet.com, xmrwallet.cc, or xmrwallet.biz.

If you found this article because you are looking for a Monero wallet, you may have come across xmrwallet.com in search results or been recommended it in a forum. Do not use it. PhishDestroy Research has confirmed through forensic code analysis that xmrwallet.com is a theft operation that steals your private view key through the session_key parameter (encoded in base64) and hijacks your transactions by returning raw_tx_and_hash.raw = "0" instead of valid transaction data.

This article lists the Monero wallets that are actually safe and explains what makes them trustworthy compared to xmrwallet.com.

Why xmrwallet.com Is Dangerous: Quick Summary

Safe Monero Wallet Alternatives

1. Official Monero GUI / CLI Wallet

getmonero.org/downloads

The official Monero wallet maintained by the Monero Project core team. This is the gold standard for Monero security. Your private keys never leave your computer. The software is fully open source, has been audited multiple times, and is built by the same team that develops the Monero protocol itself.

2. Feather Wallet

featherwallet.org

A free, open-source Monero desktop wallet focused on usability and privacy. Feather Wallet is lightweight, connects to remote nodes by default (no need to download the full blockchain), and is widely recommended by the Monero community. It is developed transparently on GitHub with regular releases.

3. Cake Wallet

cakewallet.com

A popular open-source mobile wallet that supports Monero (along with Bitcoin and other currencies). Cake Wallet is available on both iOS and Android and is one of the most widely used mobile Monero wallets. Your keys are stored locally on your phone and never sent to a server.

Comparison: xmrwallet.com vs Safe Alternatives

Feature xmrwallet.com Safe Alternatives
Keys stay on device NO — view key sent to server YES — always local
Transactions constructed Server-side (hijacked) Client-side (local signing)
Open source (verifiable) Claims to be, but live code differs Fully auditable, matches releases
Community trust Operator banned from r/Monero Recommended by Monero Project
Track record $2M+ stolen, 15+ victims Years of safe operation
Transparency Deletes evidence, threatens researchers Open development, public audits

How to Identify a Dangerous Wallet

The xmrwallet.com scam teaches several important lessons about evaluating cryptocurrency wallets:

  1. Web wallets are inherently risky. Any wallet that runs in your browser must communicate with a server. This creates a trust point that can be exploited. Desktop and mobile wallets that keep keys entirely on your device eliminate this attack surface.
  2. "Open source" claims need verification. xmrwallet.com claimed to be open source, but the code running on the live server did not match the public repository. Always verify that a wallet's published source code matches the actual deployed application.
  3. Check community reputation. The Monero subreddit (r/Monero) had banned the xmrwallet operator. Legitimate projects have positive standing in their communities. Bans, warnings, and victim reports are red flags.
  4. Examine network requests. If you have the technical knowledge, monitor what a wallet sends to its server. xmrwallet.com sent the private view key in every request. A legitimate wallet should never transmit your private keys.
  5. Use wallets listed on getmonero.org. The official Monero website maintains a curated list of trusted wallets. If a wallet is not listed there, treat it with extreme caution.

If You Previously Used xmrwallet.com

Migration steps:
  1. Download a safe wallet (Monero GUI, Feather Wallet, or Cake Wallet) from the official website
  2. Create a brand new wallet — do NOT import your xmrwallet.com seed phrase
  3. Send any remaining funds from your xmrwallet.com address to your new wallet address
  4. Never use the old seed phrase, private keys, or wallet address again
  5. Consider any key material from xmrwallet.com permanently compromised

Your old seed phrase and keys are in the hands of the xmrwallet.com operator. Even if your funds have not been stolen yet, they can be taken at any time. A clean break with completely new keys is the only safe path.

All Investigation Mirrors