.interpublic is already live as an onchain top-level domain on Freename, yet Interpublic Group (IPG) doesn't appear to control it. Public searches don't show a confirmed, independently verifiable record tying the string to IPG, and there's no public announcement from the company claiming it.
That gap matters because .interpublic reads like a brand asset, even when it sits outside the ICANN root. Freename's onchain TLDs run on blockchain rails and don't function like ICANN dotBrand domains, so the usual corporate playbook for domain governance doesn't always apply. Still, if a consumer sees an .interpublic name in a wallet app or a Web3 browser, would they assume it's official, and would they notice the difference?
From what can be checked today, Freename's own tools may show a private wallet associated with the TLD, and blockchain data can point to transactions around it. However, open web results don't reliably confirm holder details for .interpublic, so any attribution beyond what a platform lookup shows stays hard to validate from public sources alone. In other words, the best available signal is internal to the naming system, not broadly published like traditional Whois.
So why hasn't IPG secured it? The likely answers aren't dramatic. They're structural (onchain naming sits outside ICANN), knowledge-based (many brand teams still prioritize DNS they can enforce in courts and registries), and strategic (buying an onchain string can legitimize a space a company isn't ready to support). Meanwhile, the longer a lookalike namespace stays in private hands, the higher the stakes for brand control, phishing risk, and future naming rights.
When people hear "own a domain," they usually picture a DNS registration managed through ICANN. On Freename, "ownership" means something else: control of an onchain asset that behaves more like a token than a lease.
That difference matters for any brand assessment. If .interpublic sits in a private wallet identified via the Freename Whois, it can still look official to users in certain crypto contexts, even if it has no standing in the DNS root.
DNS domains run through a familiar chain of custody. ICANN delegates a TLD to a registry, registries work with registrars, and registrants control names through accounts and contracts. That system comes with built-in pressure points, including renewals, disputes, registrar locks, and, in some cases, suspension.
Freename's onchain TLDs shift those control points. Once minted, control typically sits with whoever holds the token in their wallet, with rules enforced by smart contracts and platform policies, not by ICANN.
Here's the practical contrast a brand team needs to internalize:
Resolution also works differently. A DNS domain points to internet infrastructure, such as IP addresses, mail servers, and web hosting. An onchain name often maps to wallet addresses and app-readable records. It may show up inside wallet apps, token-gated services, or Web3 browsers. Some systems offer optional "bridges" to DNS, but that is not the default and it does not make the name part of the ICANN root.
The risk for brands is simple: a team can monitor DNS, trademarks, and new gTLD filings, yet still miss onchain namespaces because they live outside the usual watching tools.
That's how a string like .interpublic can exist in plain sight while staying off most corporate dashboards.
Freename registration feels closer to buying an asset than renting a domain. At a high level, the flow is straightforward and fast:
From there, transfers can happen quickly. A holder can move the asset to another wallet in minutes, sometimes faster than a corporate team can even open a ticket. Because the record lives on a blockchain, the transaction history can be public, but the identity behind a wallet often is not.
Reversing control can also be difficult. In DNS, a registrar can intervene, lock, or recover access under certain policies. With an onchain TLD, once a token leaves a wallet, getting it back usually depends on platform rules, voluntary cooperation, or legal action. Even then, the practical outcome can vary based on where the token sits and how the platform structures enforcement.
So when an independent onchain investor acquires a brand-like TLD, the "ownership" is not symbolic. It is operational control within that naming system.
Freename offers its own lookup tools, often described as a platform-level Whois, which can show details tied to the onchain naming record. Separately, blockchains expose public transaction records that can confirm minting, transfers, and current token location.
In principle, these sources can answer a few key questions:
However, limits show up quickly. As of March 2026, the available search results provided here did not surface specific, independently verifiable holder details for .interpublic, such as a contract address, token ID, or traceable transaction hashes that a third party could reproduce from open web sources alone. That means reporting often stops at what can be observed directly on the platform and on the chain, rather than what can be proven through broader public documentation.
When reporters do verify onchain naming claims, they typically try to corroborate across several artifacts, not just a single screenshot:
Even with all that, one boundary stays firm: blockchain data can show where an asset is, but it often cannot prove who controls it. That gap is why an onchain TLD can be "owned" in a technical sense, while attribution remains uncertain in a real-world sense.
At this point, the .interpublic question splits into two tracks. On one track, Freename's public positioning and product claims are clear enough to summarize. On the other, the specific chain and holder facts around .interpublic remain hard to verify from the open web, which forces careful language.
That asymmetry matters. If a brand team can't quickly confirm who controls a lookalike TLD and how it moved, they also can't easily judge risk, response options, or timing.
Freename presents itself as a major onchain naming marketplace, with users minting and operating top-level domains across multiple blockchains. Based on the available public reporting and platform descriptions in the provided results, Freename says users have registered 20,000 onchain TLDs across networks including Solana, Base, Aurora, Polygon, BNB Chain, and SEI.
The company also markets onchain TLDs as an asset with permanent ownership, rather than a renewable lease. In addition, Freename advertises a resale and monetization model where TLD holders can sell second-level domains and earn royalties (marketed as up to 50%). In plain terms, the pitch looks closer to holding intellectual property, or a collectible, than renting a DNS name.
One traditional marker also stands out. Freename is listed in the tool results as an ICANN-accredited registrar (first earned in July 2024, maintained as of March 2026). That accreditation doesn't place Freename's onchain TLDs into the ICANN root, but it does mean the company participates in the conventional registrar system for DNS domains.
What's missing in the same set of sources is also important: there are few broad, well-documented corporate adoption examples cited in the results. That limitation makes it harder to compare the .interpublic situation to a long list of brand precedents.
The current source set does not provide reproducible, third-party details for .interpublic such as a contract address, token ID, mint transaction hash, or a public-facing explorer link that an outside reader can follow without using Freename's own tools. That absence changes how the story should be written.
A safe approach is to separate what you can verify directly from what you infer. When the only clear signals sit inside platform lookups or wallet views, avoid turning them into claims about real-world identity.
Here are the guardrails that keep the reporting clean:
In this space, overconfident attribution is the easiest way to get the story wrong. If you can't reproduce the trail, you can't publish it as fact.
This is also why screenshots are weak evidence. A reader can't independently re-check them, and small UI changes can rewrite the "record" overnight.
Brand protection teams built their monitoring around DNS and trademark workflows. They watch zone files, new gTLD notices, registrar feeds, and trademark alert services because those are the pipes where risk usually travels. When an abusive registration happens in DNS, there are established response paths, from registrar complaints to UDRP filings, and the evidence chain is familiar.
Onchain naming breaks that visibility model. There often isn't a zone file to monitor in the same way, and there may be no standardized notice system that tells a brand, "A new TLD that matches your mark just got minted." Even when data exists on a public chain, it doesn't automatically map to a corporate monitoring stack. It also doesn't come with built-in identity.
That gap creates a practical delay. A major firm can do everything "right" in the DNS world and still miss a brand-string TLD minted elsewhere. The result is simple and frustrating: by the time someone notices .interpublic on Freename, control may already sit with an independent onchain investor, and the next step becomes a negotiation problem, not a routine enforcement process.
From the outside, securing .interpublic on Freename can look like a quick brand-protection task. In practice, big companies rarely move quickly when a new naming system sits outside their normal controls. The friction often has less to do with price and more to do with governance, risk ownership, and timing.
This is especially true when an asset is held by a private wallet identified via the Freename Whois, with supporting signals in publicly available blockchain data. Even if a brand team spots it, the path to action can run through several internal gates, each with its own incentives and concerns.
Inside most large enterprises, no single team "owns" emerging domain categories by default. That matters because onchain TLDs don't fit cleanly into the usual buckets. Is .interpublic a trademark issue, an IT asset, a security control, or a marketing channel? Depending on who answers, the next step changes.
Trademark counsel may see the world through enforcement and precedent. Their first question is often whether the name is used in commerce in a way that confuses customers, and whether there's a forum with predictable remedies. In DNS, that can mean registrar escalation or established dispute tracks. With an onchain TLD on Freename, the enforcement path can feel less familiar, so legal may slow down until they can map options and evidence standards.
Security teams, on the other hand, tend to focus on abuse cases, not symbolic ownership. They'll ask practical questions: Could .interpublic become a phishing lure inside wallet apps or Web3 browsers? Does it create a new place where employees might be tricked into sharing credentials? If the risk looks theoretical today, security may rank it below known problems like email compromise and vendor fraud.
Marketing and comms teams often view domains as campaign tools. If they don't plan to use onchain naming, they may resist buying assets that create expectations. A purchase can be interpreted as a signal, especially if customers later see the brand string and assume it's "official."
The result is predictable: meetings, memos, and stalled decisions. Even when everyone agrees there's some risk, unclear accountability delays action because each group waits for another to take the first step.
A simple way to frame the internal split looks like this:
When nobody has a clean mandate, "do nothing for now" becomes the default, even if the risk keeps compounding.
Corporate timing matters. If leadership is already managing major change, small, unfamiliar purchases often drop to the bottom of the queue, even when the cost is modest. For IPG, the timeline is not abstract. The Omnicom acquisition of Interpublic Group is complete, with Omnicom finishing the purchase on November 26, 2025, for $9 billion, after the deal was announced in December 2024 and cleared by regulators in the United States, United Kingdom, Australia, and the European union shortly before closing.
In that environment, teams tend to avoid "new categories" unless they are required. Integration work eats attention: combining systems, aligning policies, consolidating vendors, and reducing overlap. Procurement controls often tighten during a merger, and approvals that once took days can take weeks. Even a low-dollar purchase can trigger reviews when the asset type is unusual and the ownership model involves wallet custody.
There's also headline risk. During a merger, companies avoid actions that can be misunderstood by clients, investors, or employees. If a combined Omnicom-IPG organization buys an onchain TLD that matches a legacy brand string, what story does it create? Does it look like an endorsement of a platform the company doesn't actively support? Does it create questions about Web3 strategy when the real priority is integration stability?
Then there's the operational follow-through. Buying .interpublic would not end the work. Someone would still need to define how names under that TLD get issued, what gets blocked, how abuse gets handled, and who controls the keys. During a post-merger period, those questions can feel like distractions from core business needs.
None of this proves intent, but it does explain how an onchain string can remain outside corporate control while bigger issues take priority. The simplest explanation is often the most boring one: reorganizations freeze decisions, especially decisions that create ongoing obligations.
Most brand defense budgets chase the highest risk reduction for mainstream audiences. That usually means the places where consumers already look for official presence, and where criminals already operate at scale. For a global marketing services group, the familiar battlegrounds stay consistent: DNS domains, app stores, and social media handles.
DNS remains central because it underpins email and corporate websites. If attackers register lookalike domains, they can run credential phishing, business email compromise, or invoice scams. Those attacks hit real users today, and security teams can measure the impact. As a result, companies invest in defensive registrations, monitoring services, and takedown workflows where roles are already defined.
App stores and social platforms also deliver immediate value because they match how people behave. Many customers won't type a domain at all. They will search an app store or look for a verified social profile. That makes impersonation in those channels a direct brand and fraud risk, with well-worn reporting paths.
By contrast, an onchain TLD like .interpublic can sit outside the standard playbook. It may not resolve in mainstream browsers, and many corporate monitoring tools don't track mints, transfers, or wallet-level control. Even when brand teams learn about it, they may struggle to answer a basic question: where would a customer even encounter it, and how often?
Still, the gap matters because naming patterns travel. What starts inside crypto tools can spill into broader visibility as wallets, browsers, and identity layers mature. Onchain domains also introduce a different kind of threat surface, one tied to wallet UX and token transfers, not registrar accounts and renewals.
So if IPG has not secured .interpublic, the explanation may be less about missing the string and more about defending where the audience is today. Onchain naming sits just far enough outside normal channels that it can be seen as optional, until it isn't.
For a large services group, buying an onchain top-level domain can look simple from the outside. Inside, the pitch usually runs into one hard question: what changes after we own it?
With .interpublic already registered on Freename and held by a private wallet identified via the Freename Whois, IPG could treat it as a brand-protection task. Still, if there is no clear user demand, no proven channel value, and no internal owner for the asset, the business case stays thin. In that scenario, the most rational outcome is delay.
Network effects decide whether a new naming system matters. DNS won because browsers supported it by default and users learned the habit. Onchain TLDs have a different adoption path. Freename says its domains work in standard web browsers without extra plugins, although it also promotes a browser extension for added features. In wallets, support varies. MetaMask can resolve Freename domains through a Snap, and some wallets integrate more directly.
Even so, the real hurdle is behavior. Most people still copy and paste links, search in Google, or tap verified social profiles. Many don't type domains at all. So a corporate onchain TLD often becomes like an unused office lobby sign, polished and correct, but rarely seen.
That weakens ROI because the upside depends on usage, not ownership. Teams end up with a defensive asset that answers only one question: What if someone else uses it against us? Defensive buys can make sense, but they compete with other defenses that stop known harm today (phishing domains in DNS, fake social accounts, lookalike apps).
The evidence base also stays thin. In the available sources, well-documented corporate examples of major brands securing onchain TLDs on Freename (or similar systems) don't show up. That absence matters because enterprise teams rely on peer precedent. Without it, the internal memo reads like theory.
A cautious brand team will ask for basics that are hard to prove right now:
If those answers stay fuzzy, buying the string starts to resemble paying for insurance without a clear policy.
Without routine user behavior and strong corporate precedent, an onchain TLD can look like an asset in search of a job.
An onchain TLD pulls a company closer to crypto workflows, even if the goal is only defense. That proximity can trigger concerns that don't exist with normal DNS domains, especially in regulated client work.
Fraud is the obvious issue. A brand-like namespace can support impersonation and payment confusion, particularly if a user sees a name in a wallet context and assumes it is verified. Even if IPG never promotes an onchain identity, others can still mint second-level names under a lookalike TLD and try to route payments or messages through it. The abuse pattern is familiar, but the tooling and takedown norms can be less familiar.
Compliance and governance can also block action. Many enterprises restrict how employees interact with wallets and tokens. Custody creates new questions: Who holds the keys, legal or IT? What happens if the wallet is lost? Which internal controls apply? A DNS domain fits into existing procurement and access systems. A wallet-based asset often does not.
Then there is jurisdictional messiness. Onchain assets move across borders by default. That can complicate internal reviews around:
None of this is legal advice. It is simply the kind of friction that can make a low-cost purchase feel high-effort. In that light, opting out can look like risk control, not neglect.
Strategy is mostly subtraction. Even if an onchain TLD feels worth owning, it still has to beat other priorities in the budget and calendar. For marketing services firms, the attention right now tends to cluster around areas with clear client demand, measurable spend, and immediate competitive pressure. That often means AI, commerce data, and retail media, not experimental naming systems.
Here, the public record creates another limitation. The available sources provided for this piece don't confirm the combined Omnicom-IPG company's current roadmap around AI platforms, retail media, commerce data, or any Web3 domain strategy. So it would be wrong to claim inside knowledge.
Still, the prioritization logic is straightforward. AI and commerce infrastructure directly affect how campaigns are planned, targeted, bought, and measured. Those are revenue-adjacent decisions. By contrast, an onchain TLD is easier to park in the "monitor" bucket, especially if:
So the most likely explanation may be the least dramatic one. IPG may see .interpublic as a future-facing edge case, while the core business fights for advantage in channels that already move billions of dollars.
If IPG never controls .interpublic on Freename, the risk is not theoretical. The string looks like a corporate namespace, and some users will treat it that way. In practice, harm comes from distribution (who can issue names under it) and context (where the name is shown, wallets, Web3 browsers, link previews, and chat apps).
The key point is simple: a top-level domain holder can often create, sell, or grant second-level names under that TLD. Even if the wider web ignores those names, a small slice of users may still trust them because the ending matches the brand.
A Freename-style TLD can operate like a landlord with a lot of spare keys. If a private wallet identified via the Freename Whois controls the TLD, that holder can typically decide what gets issued under it. That can mean selling names to third parties, handing them out for partnerships, or keeping the best names for later. The brand has no default veto.
From a fraud perspective, the most dangerous names are boring ones. Attackers do not need clever spelling when the ending itself signals authority. Names like careers.interpublic, payroll.interpublic, or vendors.interpublic can do the job, especially when shown in a wallet UI or a Web3-enabled browser.
Several scenarios show up repeatedly in corporate fraud, and an "official-looking" namespace can make them easier:
careers.interpublic for "applications" or "ID checks." The page collects passports, bank details, or SSNs. If the victim asks why the link is strange, the scammer leans on the brand-like ending.okta.interpublic or sso.interpublic imitates a real SSO page. The goal is credentials, then MFA fatigue, then payroll diversion.ap.interpublic. Even if email does not run through DNS, the web page can carry the persuasion load.pay.interpublic can be set up to resolve to a crypto address or payment page. One scan of a QR code later, funds are gone, with no chargeback.The subtle risk is internal. Employees and contractors are trained to trust corporate naming patterns. If a name looks like it belongs, someone will click before they think.
In a crisis, brand harm often starts with one person asking, "Is this an official link?" and getting it wrong.
Just as important, subdomains can be marketed as "official" without saying it out loud. A landing page can carry IPG logos, leadership names, and client lists, then hide behind the credibility of the ending.
IPG does not need to buy or custody anything to reduce exposure. The practical first step is to treat .interpublic as a monitored threat surface, the same way teams watch app stores, social handles, and lookalike DNS domains.
Monitoring can be lightweight at first, then tightened if signals appear. Options include:
.interpublic.Next comes messaging discipline, because silence creates ambiguity. If employees do not know what to trust, they will make up rules. Clear internal guidance can help, for example:
Takedown paths exist, but they are not uniform. A response plan usually involves several lanes at once: the naming platform's abuse process, hosting providers, phishing-report pipelines, app or wallet vendors (if the name appears in a product UI), and legal escalation when identity and jurisdiction become clear enough to act. Coordinating with a security vendor can help collect evidence, preserve screenshots, and keep timelines straight. Still, outcomes vary by platform rules, speed of review, and whether the abusive content sits on infrastructure outside the naming system.
The goal is not perfection. It is shorter exposure time when something malicious appears.
If IPG ever chooses to acquire .interpublic, the hard part is not the transfer. Onchain transfers can happen quickly. The hard part is making sure the organization does not lose control the day after it "wins."
Any acquisition starts with negotiation basics. A buyer needs to confirm what is being sold (the TLD token, control rights, and any attached configuration), and to confirm the seller can transfer it. That usually means verifying, to the extent possible, that the asset sits with an independent onchain investor (or the wallet shown by platform tools), and that the token points to the correct contract and network.
Then come the safety rails. Even without "touching crypto" in a speculative sense, a company can use escrow-like precautions:
Custody is where governance either holds or breaks. Enterprises generally avoid single-person wallets for high-value assets. Common patterns include:
Finally, the company needs rules for the namespace itself. Who can issue names, which names are blocked, what gets reserved, and how abuse reports are handled. Without that, ownership turns into a new attack surface.
Because onchain transfers are fast, the process has to be slow in the right places, approvals, verification, and custody design.
.interpublic exists today as an onchain top-level domain on Freename, but the public record still does not tie it to Interpublic Group. What can be checked sits mostly inside the system itself, for example a Freename Whois view that may point to a private wallet, plus blockchain activity that can suggest minting and transfers. What remains missing in open, reproducible sources are the anchors that would let outside readers confirm the trail without relying on platform screens, such as a contract address, token ID, and transaction hashes linked to .interpublic, along with any statement from IPG or Omnicom.
That gap helps explain the standoff. Onchain TLDs sit outside normal corporate domain routines, they raise custody and governance questions, and they offer uncertain payoff if clients and customers never use them. Add major corporate change, including post-deal integration work, and it is easy to see why a brand team would keep this in the monitor pile instead of making a purchase that creates new obligations.
The quickest way to close the story is straightforward: confirm the current status with a Freename Whois check, then match it to chain history that any third party can verify, and document any outreach or response from the company or platform. Until those pieces line up, the safest read is that .interpublic remains controlled by an independent onchain investor, not the brand.
Thanks for reading, if you track brand protection, what other non-DNS naming systems are on your watchlist right now? Brand owners will likely need broader monitoring as onchain naming keeps growing.
TLD Ownership Record
.interpublic is an onchain TLD identified via the Freename WHOIS Explorer. Ownership verified via onchain data. Data verified as of 27 February 2026. TLDs Observer has no financial interest in any of the assets mentioned above.
Parties with a direct interest in any TLD referenced in this publication, or wishing to submit a notable onchain TLD for coverage, are welcome to reach out via the contact page.



