TLDs OBSERVER
March 2, 2026
The Record

Why Publicis Groupe Doesn't Control .publicis on Freename (March 2026 Analysis)

An onchain TLD is a top-level domain recorded on a blockchain, not in the DNS root managed through ICANN. That difference matters because .publicis exists today on Freename, yet it isn't controlled by Publicis Groupe, based on the Freename Whois and the associated public wallet trail.

Still, the public record only goes so far. Freename-style Whois and blockchain records exist in principle, but in practice they aren't always easy to retrieve, verify, or interpret through general web search alone. So this piece sticks to what can be supported, and frames the rest as analysis of likely causes, not an accusation about intent or conduct.

The basic question answers itself: Publicis Groupe hasn't secured .publicis on Freename because an independent onchain investor, or a private wallet identified via the Freename Whois, appears to hold it. The more useful question is why a global ad and communications group would leave that asset unclaimed, or at least uncontested, in a market that rewards early grabs and quiet custody.

March 2026 adds pressure. Interest in brand TLDs is rising again ahead of the next ICANN application window (April 30 to August 12, 2026), while corporate attention shifts toward AI investments and near-term returns. Those priorities can shape what gets protected, what gets ignored, and what gets noticed too late.

What we can confirm today about .publicis on Freename, and what we can't

At a high level, the evidence people point to with Freename style TLDs is simple: a lookup page ties a name to a blockchain asset, and that asset ties to a wallet. The problem is that simple does not mean easy to verify from the open web. In March 2026, public sources regularly explain how Freename ownership works, but they do not reliably publish the live Whois record for .publicis, including a wallet, chain, or token identifier.

That gap matters for readers trying to answer one narrow question: is control held by Publicis Groupe, or by a private wallet identified via the Freename Whois? Without a verifiable, time-stamped lookup result and matching onchain record, you can analyze the mechanism, but you can't lock the ownership claim to a specific corporate entity.

How Freename Whois and wallet control work in simple terms

Freename positions its TLDs as onchain assets, commonly described as NFT-like records. In practical terms, Freename's Whois style explorer (or equivalent lookup) typically resolves a human-readable string (like .publicis) into technical facts that matter for control:

  • A wallet address shown as the current holder
  • A blockchain network where the asset sits (depending on the platform's deployment)
  • An identifier tied to the asset (often shown as a token ID or contract reference)
  • Sometimes, extra fields like "controller" or "resolver" style data, depending on the naming system

Control, in this model, follows the wallet. Whoever controls the wallet's private key controls the asset. That is a different concept than corporate "ownership" in a traditional registry database, where the right contact at a company can recover access through paperwork.

A simple example of what a reader might see in a Freename lookup looks like this (illustrative only, not a real record): a TLD name, a chain label, a token or asset ID, and a 0x... wallet address shown as the holder. If that wallet moves the asset to another wallet through an onchain transfer, control changes, and the chain keeps the trail.

Bottom line: with onchain TLDs, "ownership" usually means private key control, not a corporate registration entry.

Why an onchain TLD can exist even if the matching brand never touched it

Onchain naming systems often allow permissionless minting. That means if a string is available on a given platform's ruleset, a user can mint it without an application, brand review, or an appeals process that happens before issuance. The platform can still have policies, but the core mechanic is that the chain records what gets minted and who holds it.

That stands in contrast to ICANN's approach to top-level domains. An ICANN round involves formal applications, public comment, evaluation steps, and dispute pathways. It also costs real time and money, which naturally filters who applies and what gets delegated in the DNS root.

So how can a name like .publicis exist in an onchain namespace even if the company never acted? Because the two systems do not share a gatekeeper. The string can be:

  • Unclaimed in that specific onchain platform's catalog, so a third party mints it first.
  • Claimed early as a speculative asset, because brands are predictable targets for collectors.
  • Treated as a "TLD" by the platform, even though it does not exist as a DNS root TLD.

None of that, by itself, proves intent by any holder, or knowledge by the brand. It only explains why brand matching strings can appear without brand participation.

The naming confusion that trips up casual readers (.publicis vs group.publicis)

A second, quieter issue is naming ambiguity. Readers often treat anything that ends with a dot and a brand as "the same thing," but namespaces and levels matter. .publicis is a top-level label in an onchain platform's system. group.publicis is a second-level name under .publicis, which may be created, sold, parked, or promoted separately.

In the material available from public sources, there is no confirmable, citable reference that Freename content specifically discussed group.publicis rather than .publicis as of March 2026. Still, the confusion itself is common in brand monitoring workflows, and it creates predictable failure modes inside large firms.

Here is how the mix-up usually happens in practice:

  • A monitoring alert flags group.publicis in a post, screenshot, or marketplace listing, and someone assumes it is the "main" asset.
  • Legal or security teams search for the exact string they saw, not the root TLD asset, and they end up in the wrong place.
  • Meanwhile, different systems treat labels differently, because DNS, onchain naming, and browser resolution do not share a single source of truth.

Because of that, response can slow down. A global group may need time to route the issue across brand, legal, and IT, and each team may use different tools. Even when a company moves quickly, a few weeks of internal ambiguity can be enough for an onchain asset to change hands, especially if it is listed, transferred, or bundled with other names.

The practical takeaway is narrow but important: when you assess control, you have to separate the TLD itself from names registered under it, and you have to confirm which one a screenshot or claim is actually talking about.

Onchain TLDs are not ICANN TLDs, and that changes the playbook

An ICANN TLD and an onchain TLD can look identical in a headline, but they operate under different rulebooks. ICANN runs on contracts, accredited intermediaries, and dispute systems designed for businesses. Freename-style onchain TLDs run on token custody, smart contract logic, and public transaction trails.

That difference helps explain why a global brand can wake up to .publicis existing on Freename while control sits with an independent onchain investor (as indicated by Freename Whois style records and related onchain data). It also explains why the next steps inside a corporate playbook can feel unclear.

Governance and enforcement: contracts and courts vs smart contracts and wallets

In the ICANN system, control is layered. A company interacts with a registrar, the registrar answers to a registry, and both sit inside ICANN contracts. If an employee leaves, an invoice goes unpaid, or credentials get compromised, recovery often looks boring, and that is the point. You can reset access through account controls, paper trails, and predictable escalation.

Onchain governance flips that. Control usually follows a wallet and its private keys. The smart contract sets the rules for transfers and permissions, and it does so without caring who you are. If the current holder transfers the token, the chain accepts it. If keys go missing, the chain doesn't pause and ask for a passport.

Here is the operational contrast that tends to matter in boardrooms:

  • ICANN-style recovery: you can often prove identity, show authority, and unwind mistakes through registrar processes, court orders, or UDRP-like paths (depending on the label and use).
  • Onchain-style recovery: you need the key, or you need whoever holds the key to cooperate. Otherwise, you are negotiating, not restoring.
  • Enforcement posture: ICANN policy assumes centralized enforcement, onchain naming assumes code enforcement first, with legal pressure happening around the edges.

That leads to a corporate risk question that comes up fast: if the asset matters, who inside the company can safely custody it? Many enterprises tolerate DNS risk because they can reverse it. They tolerate blockchain risk less, because one bad handoff can become permanent.

In ICANN, a brand can usually argue its way back to control. Onchain, it often has to transact its way back, assuming the current holder will sell.

User experience reality check: where onchain domains work, and where they don't

Marketing teams buy domains for reach, not novelty. That is where onchain TLDs still run into friction. Most people still type names into standard browsers and expect standard DNS resolution. They click links in mainstream apps, and those apps typically treat DNS as the default.

Onchain domains can work well in Web3-native spaces, for example wallets, certain browsers, or platforms that support blockchain name resolution. They can also work through bridges, such as gateways that translate an onchain name into a normal web request. Still, that extra layer changes behavior. A campaign that depends on a user installing something, switching a setting, or trusting a gateway will lose part of its audience.

This creates a practical split:

  • Where onchain domains can shine: wallet-to-wallet identity, token-gated communities, and Web3 communities that already understand address resolution.
  • Where they can fall flat: mass consumer campaigns, email deliverability expectations, and corporate IT environments that standardize on DNS and locked-down browsers.

So when a brand looks at .publicis on Freename, it may not see an urgent customer-facing risk in the same way it would for a DNS domain that resolves everywhere. The risk can feel indirect, more like reputation drift than an immediate outage. However, the downside can still show up as screenshots, social posts, and confusion when people assume the string equals official control.

What "buy once, own forever" really means for enterprise teams

Freename and other onchain naming systems often frame ownership as buy once, own forever. In contrast to ICANN renewals, the token does not expire on a calendar. That can sound like a dream to finance teams. No renewal invoices, no missed deadlines, no registrar negotiation.

Yet "forever" creates its own governance mess. Corporate domain programs depend on lifecycle management, renewal calendars, and standard vendor controls. They also depend on audit trails that map neatly to a business unit, an approver, and a change ticket. A token held in a wallet does not automatically fit those controls, even if the chain shows every transfer.

Resale markets also change incentives. If a third party mints .publicis early, the asset can trade like a collectible, not like a service contract. That means the price can move fast, and custody can shift in minutes, not weeks. For an enterprise, that raises uncomfortable questions inside procurement and legal: Are you buying a naming right, or are you buying an asset from a market?

A few points enterprise teams tend to trip over:

  • Budgeting: a one-time purchase might be capitalized differently than an annual service. That can slow approval.
  • Custody and access: who holds the keys, and what happens when they change roles?
  • Change control: updating resolvers, transferring tokens, or delegating subdomains can require wallet operations that don't match ITIL-style workflows.
  • Audit and compliance: the chain records transfers, but it doesn't explain intent, approvals, or internal authority.

So "own forever" can still mean "manage forever." If a global group cannot slot that management into existing controls, it often chooses a safer path, even if that means leaving a high-profile string in the hands of a private wallet identified via the Freename Whois.

Why a company like Publicis might not chase .publicis: priorities, not ignorance

From the outside, letting .publicis sit on Freename under a private wallet identified via the Freename Whois can look like a miss. Inside a public company, it can look like a choice. Large groups rank risks and projects by material impact, speed to value, and how cleanly they fit existing controls.

In 2026, Publicis Groupe has spoken in investor terms about growth, margins, and where it plans to spend. That context matters because it shapes what gets funded, what gets reviewed, and what gets parked, even when the price tag for a small experiment seems low.

AI and data budgets crowd out small experiments that don't move revenue

Publicis has put real money behind AI and data. Public reporting points to plans for about €900 million in 2026 for targeted acquisitions, mostly in AI and data, after €1 billion of similar spending in 2025. Those are not side projects. They are core bets tied to how the group wins pitches and holds margin.

That environment changes how "cheap" things feel. An onchain TLD might cost little to acquire, but it rarely stays cheap to run inside an enterprise. Someone still has to define custody, write policy, train teams, monitor abuse, and explain the accounting treatment. If a project can't show a line to revenue, it competes poorly against initiatives that can, like data identity (for example, acquisitions such as Lotame) or influencer tooling.

Investor pressure tightens the filter. Publicis posted strong 2025 growth and a record margin (18.2%), yet the stock still reacted to questions about the 2026 outlook and whether AI spending will pay off fast enough. In that kind of scrutiny, small infrastructure bets tend to need a sponsor with political capital, a clear use case, and a crisp risk memo. Without that, they wait.

A simple way to think about it is this: AI and data are the engine rebuild, while an onchain TLD is a custom license plate. The plate can matter, but the engine gets fixed first.

The constraint often isn't cost, it's attention, process, and proof of business impact.

Brand safety teams tend to defend the DNS they can control and measure

Brand protection at scale runs on repeatable workflows. Teams monitor DNS zones, watch new domain registrations, track certificate issuance, chase impersonation on social, and run takedowns through hosts, registrars, and platforms. The key feature is not perfection, it's measurable control with predictable escalation.

That model fits the traditional DNS world because enforcement routes exist and vendors know how to respond. A typical playbook looks like this:

  • Monitoring: alerts for lookalike domains, typos, and risky TLDs in the ICANN namespace.
  • Trademark enforcement: demand letters and platform complaints tied to known policy frameworks.
  • Takedown workflows: registrar or host contacts, abuse desks, and court orders when needed.
  • Reporting: dashboards that show time-to-action and closure rates.

Onchain naming systems don't always fit those lanes. Ownership can sit with an independent onchain investor, transfers can happen quickly, and "registry control" looks different when the asset functions more like token custody than a contract account. Even when offchain content exists (a website, a gateway page, a marketplace listing), the enforcement target can shift between the content host and the onchain record. That slows response because teams have to ask basic questions first: Are we trying to remove content, stop resolution, or acquire the asset? Each answer triggers a different internal owner and a different budget.

As a result, brand safety groups often de-prioritize action until there is clear harm. Not because they don't care, but because their tools and KPIs were built for DNS, not tokenized naming.

Web3 projects can be client-facing while corporate assets stay conservative

Publicis has shown it can experiment publicly when the project is a campaign. For example, Publicis Groupe Benelux launched "The Metaphone" in Decentraland in 2022, using a metaverse stunt to attract Web3 talent. Publicis leaders have also discussed metaverse platforms and the role of blockchain in digital ownership. Those efforts sit comfortably in marketing because they are time-boxed, creative, and measured like any other activation.

Corporate infrastructure is different. Owning .publicis on an onchain platform is not just a stunt, it can imply an identity layer. It can touch login, naming, reputation, and potentially payments if a wallet or partner treats the label as a trust signal. That moves it from "brand experiment" to "enterprise asset," and the standards get stricter fast.

Here's the practical split:

  • Campaign experiment: short timeline, clear owner (marketing), controlled audience, and limited downside if it flops.
  • Naming root custody: long timeline, shared ownership across legal, security, and IT, plus real downside if it gets misused.

So a group can credibly run metaverse or Web3 work for clients while keeping its own naming posture conservative. That conservatism becomes even more likely when a private wallet identified via the Freename Whois already holds the string, because the next step can look less like "registration" and more like "market negotiation," which many enterprises avoid unless the risk turns concrete.

The hidden blockers inside big organizations: who owns the decision, and who carries the risk

When an onchain TLD like .publicis exists on Freename and control appears to sit with a private wallet identified via the Freename Whois (and public blockchain data), the outside view is simple: go get it. Inside a large public company, it rarely is. The hard part is not noticing the issue, it's assigning an owner, approving a path, and accepting the risk that comes with action.

Think of it like a fire alarm in a high-rise. Everyone hears it, but response depends on who has keys, who calls the shots, and who signs off on cost. With onchain assets, that responsibility tends to split across Legal, Security, Procurement, and Marketing. Each team sees a different risk, and each team can slow the decision without meaning to.

In many enterprises, the first blocker isn't price. It's governance: who can approve an onchain purchase, and who answers if it goes wrong.

Legal's view: trademark rights are clear, but remedies can be slow or uncertain

Legal teams tend to start with a familiar premise: trademarks protect brands against confusing use in commerce. However, a trademark doesn't automatically grant control of an onchain TLD. Freename-style naming treats the label as an onchain asset controlled by a wallet, not a registry entry that a brand can reclaim through standard registrar channels.

So what can Legal do, in a careful, process-driven way? Usually, it looks like a few parallel tracks, chosen based on evidence and harm.

  • Cease and desist letters: A first step in many brand disputes, especially if the name is used to market goods, run a site, or imply affiliation. This can also clarify intent without going straight to court.
  • Platform policy requests: Some platforms maintain abuse policies or trademark reporting channels. Outcomes depend on platform terms, governance model, and what the platform can change without breaking its own rules.
  • Litigation: A brand can pursue claims such as trademark infringement or unfair competition, depending on facts and jurisdiction. Still, litigation takes time, and any remedy that tries to change control of an onchain asset can raise enforcement questions.

Even if Legal feels confident on rights, the remedy can remain uncertain. Jurisdiction varies, facts vary, and platform terms matter. Meanwhile, the chain keeps moving. If the asset transfers between wallets, Legal may face a shifting target, which can slow decisions even more.

Security's view: key custody, insider access, and what happens if the wallet is compromised

Security rarely argues against owning sensitive assets. It argues against owning them badly. With onchain TLDs, control maps to private keys, and mistakes don't behave like DNS mistakes. An unauthorized onchain transfer can be final, and that changes how security teams price the risk.

Three custody models show up most often in enterprise conversations, and each forces new process:

  • Self-custody: The company controls keys directly. This can reduce third-party exposure, but it demands strong internal controls, secure storage, access logging, and separation of duties.
  • Multi-signature wallets: Transfers require multiple approvals. This lowers single-person risk, yet it adds operational overhead and can create bottlenecks if approvers travel, leave the company, or lose access.
  • Third-party custodians: A specialized provider holds keys under contract. That can improve continuity, but it introduces vendor risk, onboarding delays, and compliance reviews.

Security also has to plan for the ugly scenario early, because it tends to be the one people remember later: If the wallet is compromised at 2 a.m., who can move the asset, freeze related operations, and communicate what happened without guessing? Traditional incident response playbooks assume recoveries and resets. Onchain incidents often assume containment and damage control.

Onchain custody forces a new question into the risk register: if a transfer can't be reversed, what controls stop a single bad click from becoming permanent?

Procurement's view: vendors, contracts, and support expectations don't match Web3 norms

Procurement teams don't block because they dislike new tech. They block because their job is to make risk legible. That means contracts, invoices, defined service levels, and clear support paths. Many Web3 purchases, including onchain naming, don't start there. They start with a wallet transaction.

In a large organization, that mismatch creates friction fast:

  • Enterprises expect SLAs, escalation paths, and accountable support. Wallet-based access often assumes self-service and community help.
  • Finance expects billing controls and documentation. Onchain purchases can look like a one-off token transfer, which raises questions about approvals, accounting treatment, and audit support.
  • Compliance asks for vendor due diligence. Smaller platforms may not have the same depth of reports, certifications, or standardized questionnaires that procurement pipelines require.

Smart contract finality also changes expectations. In a typical software purchase, procurement can negotiate refunds, credits, and termination clauses. With an onchain asset purchase, the transaction itself may be irreversible once executed. That can make procurement ask a very practical question in the middle of a review: If we pay and something goes wrong, what's the remedy we can enforce in a contract, not just hope for in a support inbox?

Marketing's view: if customers can't use it easily, it's hard to justify

Marketing's job is reach, clarity, and measurement. An onchain TLD can be brand-relevant and still fail a basic test: can most customers use it without friction? If resolution depends on special browser support, a gateway, or a Web3-native flow, it may not fit core channels.

That shows up in everyday campaign planning. A marketer may want to use .publicis for:

  • A campaign landing page
  • Short links in ads and QR codes
  • Partner co-marketing pages under subdomains
  • Email and redirects that behave predictably

If the domain can't reliably resolve across mainstream browsers and locked-down corporate networks, it becomes hard to place into high-spend media plans. Even when it resolves for some users, measurement can get messy if traffic flows through gateways or alternate resolvers.

Here's the kind of question that can stall internal buy-in: If we put .publicis on billboards and paid social, what percent of people will reach the page on the first click, and how will we measure drop-off caused by resolution issues? If no one can answer that with confidence, Marketing will often choose the path it can forecast, which usually means sticking with DNS domains it already controls.

So what would it take to secure .publicis now, and what are the realistic options

Once a brand-matching onchain TLD exists, the choice set narrows fast. Publicis Groupe can either try to acquire .publicis from the current holder, or treat it as a parallel namespace and manage the risk around it.

The key is to avoid category mistakes. This is not a DNS recovery problem, and it isn't a typical registrar transfer. Control tracks to a private wallet identified via the Freename Whois and supported by publicly available blockchain data, so every serious path starts with verification, process, and custody.

Option 1: buy it from the current holder, and do it with clear governance

Buying .publicis from an independent onchain investor is the most direct route, but it has to run like a controlled acquisition, not a quick crypto trade. Otherwise, the brand can end up paying and still not controlling the asset.

A standard approach looks like this:

  1. Outreach and intent: Open a direct line to the holder through the channel shown on the platform, or through a marketplace listing if one exists. Keep it simple, confirm they can transfer, and ask for proof of control.
  2. Verify control onchain: Before money moves, confirm the holder wallet matches what the Freename Whois shows. Then verify the token details in the relevant block explorer (contract, token ID, and holder address). If the platform uses separate roles (owner vs controller), confirm both.
  3. Agree the transfer mechanics: The safest deal structure uses an escrow or a trusted settlement agent that can coordinate funds and transfer steps. If escrow is not available, both sides still need a written sequence, with screenshots, transaction hashes, and clear timing.
  4. Execute a clean transfer: Transfer the asset to a new wallet created for corporate custody, not to an employee wallet. Confirm finality onchain, then re-check Freename records until they reflect the new holder.
  5. Lock post-transfer custody: Set up multi-signature approvals, separation of duties, and documented access. If a custodian holds keys, secure the contract, escalation path, and exit plan.

Due diligence matters here because platform rules can be as important as the chain. A buyer needs to confirm whether Freename has any policy hooks that affect transfers, renewal-like fees, or delegation rights under the TLD. The aim is boring certainty: if Publicis pays for .publicis, it should own the keys, control the settings, and document the chain of custody.

Treat the onchain TLD like a high-value bearer asset. If key control is unclear, ownership is only a story.

Option 2: don't buy it, but reduce risk with monitoring and clear user guidance

If Publicis chooses not to buy .publicis, it can still shrink the real-world harm. The practical risk is not that most users will browse onchain domains by default. The risk is confusion, screenshots, and social engineering that borrows credibility from the name.

A defensive plan usually has three parts.

First, monitor what people can see and trade. That means watching Freename listings, major onchain name markets, and social channels where names get promoted. It also means tracking lookalikes and related strings that can support scams (for example, common brand terms registered under .publicis, or similar TLD strings minted on other platforms).

Second, publish clear, repeatable guidance. A short statement on the corporate site can go a long way. It should name official domains, official email patterns, and official wallet addresses (if any exist). It should also say what Publicis does not use. People follow a signpost more than a warning label.

Third, train the humans who get targeted first. Client teams, procurement, and finance staff often see the first phishing attempt. A simple internal memo and quarterly refresh can cover the basics:

  • Don't trust a name alone: A brand string does not prove affiliation in an onchain namespace.
  • Verify through known channels: Use bookmarked corporate sites and known contacts, not links in messages.
  • Escalate fast: Route suspicious uses to a single internal mailbox or ticket queue, so reports don't scatter.

This option does not solve the underlying ownership issue. Still, it can keep a speculative asset from becoming an effective scam tool.

Option 3: pursue an ICANN .brand later, while treating onchain names as a separate layer

The next ICANN new gTLD application window is scheduled to open April 30, 2026 and close August 12, 2026, based on ICANN's published timeline. If Publicis wants a traditional dot-brand in the DNS root, that window is the formal path.

An ICANN .brand can deliver strong control and policy tools inside the DNS system. It can also reduce spoofing by giving the company a trusted naming space that works everywhere. However, it will not automatically resolve the onchain issue, because the systems do not share a root, a registry, or an enforcement stack.

That separation matters in planning. A clean strategy treats them as two parallel layers:

  • ICANN layer: DNS-root presence, corporate-grade controls, and broad user reach.
  • Onchain layer: token custody, platform rules, and a market-driven namespace where brand strings can circulate outside DNS.

In other words, getting an ICANN dot-brand can be a strong move, but it does not "take back" .publicis on Freename. If Publicis wants both, it will need two playbooks, two budgets, and one clear internal owner for each system.

Conclusion

The record on .publicis points to a basic mismatch between brand expectations and onchain custody. Freename treats a TLD as a token controlled by a wallet, so whoever holds the private keys can transfer it without a registrar style recovery path. That structure alone explains how a brand matching string can exist on an onchain platform even if the company never touched it.

At the same time, the evidence has hard limits. Public sources describe how Freename ownership works, but they do not reliably publish a time stamped, independently verifiable Whois record for .publicis or the underlying wallet trail through ordinary search. That forces any analysis to separate mechanism from attribution, even if platform lookups and blockchain explorers can, in principle, show control by a private wallet identified via the Freename Whois.

The more likely reasons Publicis Groupe hasn't secured .publicis still look practical. Capital and attention have flowed toward AI and data, where executives can link spend to client delivery and margin. Meanwhile, an onchain TLD carries unclear ROI, custody risk, and internal friction, who approves a purchase, who holds keys, and who answers if access fails or a transfer goes wrong?

As brand TLD interest rises again, onchain namespaces will keep creating parallel risks and parallel decisions, even for companies that stay focused on the DNS root.

TLD Ownership Record

.publicis is an onchain TLD identified via the Freename WHOIS Explorer. Ownership verified via onchain data. Data verified as of 27 February 2026. TLDs Observer has no financial interest in any of the assets mentioned above.

Parties with a direct interest in any TLD referenced in this publication, or wishing to submit a notable onchain TLD for coverage, are welcome to reach out via the contact page.

Latest
More Analysis
Why L'Oréal Groupe Hasn't Secured .l'oréal on Freename (Onchain TLD Analysis)
Why L'Oréal Groupe Hasn't Secured .l'oréal on Freename (Onchain TLD Analysis)
A brand name can exist in more than one naming system at the same time, and that's where the...
March 2, 2026
The Record
Monster Energy's Unclaimed Digital Territory: A TLD Valuation
Monster Energy's Unclaimed Digital Territory: A TLD Valuation
Monster Beverage Corporation reported $7.14 billion in net sales for 2024. The company has delivered
March 1, 2026
The Record
Monster Energy: Who Owns .monsterenergy and Why It Matters
Monster Energy: Who Owns .monsterenergy and Why It Matters
Monster Energy powers athletes and fans alike. Its green claw logo appears everywhere from X Games
March 1, 2026
The Record
.l'oréal TLD Valuation: Fair Price for L'Oréal Groupe
.l'oréal TLD Valuation: Fair Price for L'Oréal Groupe
For the first time in internet history, L'Oréal's exact legal name, complete with apostrophe and ...
March 1, 2026
The Record
.mrbeast TLD Valuation: Fair Market Price Analysis
.mrbeast TLD Valuation: Fair Market Price Analysis
Jimmy Donaldson, known as MrBeast, commands 469 million YouTube subscribers and 112 billion total...
March 1, 2026
The Record
.interpublic TLD Valuation: Fair Price for IPG Acquisition
.interpublic TLD Valuation: Fair Price for IPG Acquisition
Omnicom's merger with Interpublic Group closed on November 26, 2025. The deal created the world's la
March 1, 2026
The Record
The .publicis TLD: Valuation Analysis and Fair Price
The .publicis TLD: Valuation Analysis and Fair Price
Publicis Groupe commands the global advertising world. In 2025, it posted €17.4 billion in revenue,
March 1, 2026
The Record
Who Owns .mrbeast? Why It Matters for MrBeast
Who Owns .mrbeast? Why It Matters for MrBeast
Jimmy Donaldson, better known as MrBeast, commands over 469 million YouTube subscribers...
February 28, 2026
The Record