Brand teams keep asking the same thing after they spot an impersonator in Web3, can we just file a UDRP and get the name back. On the traditional internet, that instinct makes sense. The Uniform Domain-Name Dispute-Resolution Policy is an ICANN policy that lets trademark owners challenge bad-faith cybersquatting on standard DNS domains like .com, because registrars and registries must follow ICANN contracts.
Web3 naming doesn't run on those rails. ENS-style names, plus Web3 TLDs registered on Freename (valid non-ICANN TLDs), sit outside the ICANN system that UDRP depends on. That's why the answer is usually no, UDRP can't protect your brand in Web3, at least not in the way brand owners expect.
The practical problem isn't whether your trademark is real, it's where the control points live. UDRP works because a panel decision can force a registrar or registry to transfer or cancel a name. With Freename-registered Web3 TLDs and blockchain-based naming systems, those familiar hooks, registrar lock, registry transfer, and ICANN compliance, often aren't there.
So what happens instead. Enforcement can take longer, cost more, and end with less certain outcomes, because you may need platform-level policies, wallet-level tracing, marketplace takedowns, or court action aimed at people, not registries. This article explains the gap, why it keeps surprising smart teams, and what to do when UDRP isn't an option.
UDRP is built for a particular problem in the ICANN DNS system, clear-cut trademark abuse on domains like .com and .net. It's not a general brand protection tool, and it's not meant to untangle every messy dispute over names. Think of it like a fire extinguisher, it works well on small, obvious fires, but it won't rebuild the house.
Just as important, UDRP's power comes from ICANN's contract chain. That's the part Web3 naming systems and Freename-registered Web3 TLDs don't share, which is why the same playbook often fails outside ICANN.
Cybersquatting is when someone registers a domain that trades on your brand, usually to confuse people, steal info, or pressure you into paying. The classic examples are simple:
brand-support.com that pretends to be your help desk.brnad.com that catches people who mistype.In practice, cybersquatters tend to do one of three things: imitate, monetize, or extort. They imitate your site to capture passwords, monetize traffic with ads or affiliate links, or extort you by offering to "sell it back."
Brands like UDRP because it's usually much faster than a lawsuit. Instead of months of court motions and jurisdiction fights, UDRP runs on a set schedule with written filings and a specialist panel. Many cases wrap up in a few months, which matters when customers are getting tricked today, not next quarter.
UDRP is designed for obvious abuse. If the story is complicated, UDRP often isn't the right tool.
To win a UDRP case, a trademark owner has to prove all three elements. Miss one, and you lose, even if the domain feels unfair.
yourbrand.com or yourbrand-shop.com will often qualify. Panels focus on how the name looks and reads, not on fine-print disclaimers on the site.A key point gets missed a lot: UDRP generally expects both bad-faith registration and bad-faith use. So evidence matters. Screenshots, ad archives, sale listings, email demands, and phishing reports can make the difference.
UDRP works because it doesn't depend on the domain holder playing nice. The enforcement hook sits with the companies that control the domain in the ICANN system: the registrar (where the name is registered) and the registry (the operator of the TLD, like .com).
Once a complaint is filed, the domain typically gets a lock. That lock helps prevent quick transfers to a new registrar or registrant while the case runs. If the panel rules for the brand, the remedy is simple and practical: transfer the domain to the brand, or cancel it.
The important part is what happens next. The registrar implements the decision because ICANN-linked agreements require compliance. In other words, the panel doesn't need the registrant's signature, password, or cooperation to move the asset. There's usually a short waiting period for court challenges, but absent that, the transfer steps forward because the registrar must act.
This is the core reason UDRP feels "real" in the DNS world. It's not just a decision on paper, it triggers a change at the control point. Outside ICANN, that control point often isn't a registrar bound to ICANN policy, which is exactly where brand owners start to feel the limits.
UDRP works in the DNS world because there's a built-in chain of control. ICANN sets the rules, registries and registrars agree to follow them, and a UDRP decision triggers a transfer or cancellation through that system. Take those contracts away, and UDRP turns into paperwork with no default way to make the result happen.
Web3 domains and Freename-registered Web3 TLDs don't sit inside ICANN's contract framework. Control shifts away from registrars and toward blockchain ownership and private keys. So when a brand asks, "Can we just UDRP it?", the hard answer is that the usual enforcement hooks aren't there.
With most Web3 naming, ownership looks less like renting a domain and more like holding a digital asset. In plain language, if you control the private keys, you control the name. The "owner" is the wallet address that holds the name on-chain, and the person with the private key can move it, sell it, or point it somewhere else.
That's a big contrast with standard DNS domains. In the ICANN system, you typically pay a registrar every year. Miss a renewal and you can lose the domain through expiration, grace periods, and redemption rules. The registrar also has account controls, support workflows, and sometimes recovery options.
On-chain Web3 ownership flips the mental model:
So if a squatter holds a Freename Web3 domain in their wallet, there may be no registrar with the practical power to "take it back" the way DNS brands expect.
In Web3, the control point isn't a registrar login, it's the private key. That's why the usual domain recovery playbook breaks.
A UDRP decision is a legal or quasi-legal outcome, but enforcement depends on someone having the ability and the duty to carry it out. In DNS, that "someone" is the registrar or registry bound to ICANN rules. Once a panel orders a transfer, the registrar can implement it without the registrant's cooperation.
With Web3 domains, a panel can still "decide" something, but the ruling doesn't magically move an on-chain asset. Blockchains don't recognize UDRP panel orders as a native command, and there often isn't an ICANN-contracted registry-registrar stack to compel action.
Think of it like this: a judge (or panel) can say a car should be returned, but if the keys are in someone else's pocket and there's no tow company under a contract to act, the order doesn't move the car by itself.
In practice, without a registry or registrar obligated to UDRP:
That's why Web3 enforcement often shifts toward identifying the person behind the wallet, pressuring marketplaces, or using court orders aimed at intermediaries. It's a different fight than UDRP was built for.
When people hear "domain," they picture a website you can take down. Web3 names don't always work that way. A Web3 domain might resolve to a wallet address for payments, a dApp, or content referenced through gateways. The name can function like a readable label for blockchain activity, not just a web page.
That difference matters, because "take down the website" isn't the same as "take the name." Even if you manage to remove a phishing page hosted on a traditional server, the Web3 name can still point to a wallet that collects funds, or it can be re-pointed to new content quickly.
Blocking one front end also doesn't solve the root issue:
So enforcement becomes whack-a-mole unless you can change ownership or control resolution at a meaningful choke point. That's exactly where UDRP usually helps in DNS, and exactly where Web3 naming systems and Freename-registered Web3 TLDs often don't offer the same pressure points.
Brand abuse in Web3 doesn't always look like a fake website on a look-alike domain. More often, the "destination" is a wallet address, a signing request, or a name that resolves inside wallets and dApps. That shift changes the risk, because victims can lose funds in seconds, even if the scam page disappears later.
With ENS-style naming and Freename-registered Web3 TLDs (valid Web3 TLDs outside ICANN), enforcement also plays out differently. Instead of one registrar and one hosting provider, you're dealing with many user entry points. The same name can show up across apps, gateways, and browsers, even after a takedown somewhere else.
In Web3, a look-alike name often acts like a payment label, not a web address. If someone sends assets to the wrong place, there's usually no chargeback. That's why scammers focus on confusion, not content.
A common pattern is simple: a bad actor registers a name that resembles your brand, then points it to their wallet. Victims see a familiar-looking name, assume it's official, and hit send. Uniswap founder Hayden Adams publicly warned about scams that copied real wallet addresses while pairing them with deceptive ENS names, which led to reported losses.
The other high-risk move is tricking users into signing something they don't understand. You'll see fake "renewal," "verification," or "airdrop claim" prompts that lead to wallet popups. ENS Labs has warned about phishing emails and fake sites that try to push wallet actions (for example, messages claiming an ENS name is expiring or that users must act for an ENS update). People click because the message feels urgent, and the signing screen looks routine.
What gets signed can vary, but the impact is consistent:
If a scammer can get a signature once, they may not need you again. The damage can happen later, quietly, after you've moved on.
Even careful users slip because wallet prompts are dense. When the choice looks like "Approve" or "Cancel," who stops to parse contract details mid-task?
With traditional domains, a takedown can remove a page, and a UDRP can transfer the domain. With Web3 naming, the "name" often lives on-chain, and many different tools can resolve it. That means you can win a battle on one platform while the underlying problem stays intact.
Here's what that looks like in practice. A scammer registers a Freename Web3 TLD name or an ENS-style name, then uses it in multiple places at once:
So what happens when you report it? You might get a listing removed from a marketplace, a warning label added in one wallet, or a blocked page on one gateway. Those steps help, but they don't "delete" the name or stop other resolvers from reading it.
The result is a frustrating loop: the same abusive name can keep working wherever resolution still exists. If one app blocks it today, another app may still show it tomorrow. Meanwhile, the bad actor can also re-point the name's records (for example, change where it resolves) without changing the name itself.
This is why brand abuse in Web3 often feels like whack-a-mole. A single enforcement request rarely reaches every place users might encounter the name. And because UDRP depends on ICANN-linked registrar and registry obligations, it doesn't provide the universal control point brand teams expect for Freename-registered Web3 TLDs.
In DNS disputes, many bad actors look like bad actors. They park a page, run ads, impersonate support, or demand money. In Web3, squatters often use a cleaner story: "I'm just investing in digital property."
That narrative matters because Web3 names often behave like assets. They can be bought, held in a wallet, traded, and sometimes promoted like collectibles. When someone claims they are building a portfolio, the situation can sound less like classic cybersquatting, at least on the surface. Even if your team feels targeted, the other side may frame it as speculation.
This muddies the "bad faith" storyline in a few ways:
It's also common to see squatters claim they plan to "build later," or that they are holding names like real estate. When that claim appears, the dispute can slow down because decision-makers may want deeper proof of targeting: scam reports, impersonation screenshots, fake support outreach, or a pattern of similar registrations.
A brand can still be right, and still face delays. The core problem is structural: UDRP was made for an ICANN system with clear registrant controls and clear remedies. With Freename Web3 TLDs and other Web3 naming, ownership looks more like possession, and that changes how quickly you can turn "obvious abuse" into an outcome.
When UDRP is off the table for Freename-registered Web3 TLDs, you still have options. The catch is that Web3 disputes rarely have a single, universal "court for names." Instead, outcomes depend on where users encounter the name and who controls that touchpoint.
Think of it like trying to stop a counterfeit product. Taking down one storefront helps, but it doesn't shut down every seller, every marketplace, or every shipment route. Web3 naming works the same way. You can often reduce harm quickly, but a clean transfer of the on-chain name is harder.
Each Web3 naming ecosystem can write its own dispute rules, and those rules can change. Some systems use a foundation or company process, others push decisions to token governance, and some have no formal dispute track at all. As a result, you should expect different timelines, different evidence standards, and different remedies depending on where the name lives.
For example, ENS disputes can route through an ENS DAO governance process, where claims and proposals get discussed publicly and then put to a vote. In practice, that means your "case" looks less like a UDRP filing and more like a governance campaign. You will need crisp evidence, clear harm, and a story token holders can quickly understand. What plays well in a courtroom brief may fall flat in a forum thread.
Here's what to expect from platform dispute paths, in plain terms:
The biggest limitation is structural. A win in one system doesn't automatically carry over to others. Even if one platform flags a name as abusive, another wallet, gateway, or marketplace may still show it with no warning. That's why brand teams should treat platform disputes as one lane in a larger plan, not as a one-and-done replacement for UDRP.
If your strategy assumes one ruling will "fix the name everywhere," you'll stay stuck in whack-a-mole mode.
Even when an on-chain name stays in the same wallet, most real-world harm happens off-chain, where users actually see and trust the name. That gives you practical pressure points, especially when an abusive Freename-registered Web3 TLD shows up in consumer-facing products.
Off-chain controls typically can't seize the asset, but they can reduce damage fast. If you're trying to stop phishing today, speed matters more than philosophical purity.
Common off-chain actions include:
This is where expectations matter. Off-chain action usually delivers harm reduction, not ownership change. The abusive name can still exist on-chain, and the holder can point it somewhere else.
So why do brands still use these routes? Because they often work quickly, and they target what scammers need: distribution and trust.
Pros you can realistically expect
Cons you should plan around
A useful mental model is crowd control. Off-chain blocks are like closing doors at busy entrances. People can still find side doors, but you stop a lot of foot traffic fast. If your brand is dealing with an active scam, that tradeoff is often worth it.
When the stakes are high, brands still turn to courts. Trademark law, unfair competition claims, and fraud theories can unlock remedies that platform processes cannot. Courts can also issue orders that reach real-world intermediaries, which matters when the on-chain owner won't cooperate.
Brands tend to consider litigation when one or more of these conditions apply:
Still, you should go in with clear expectations. Courts move slower than takedown workflows, and enforcement can get messy when the domain holder hides behind a wallet.
Here are the main tradeoffs, without the legal fog:
What courts can do well
Why enforcement gets harder in Web3
So, what's the practical outcome you should aim for? Many brand teams use courts to combine two wins: first, stop ongoing deception through injunctions and intermediary compliance, then work toward attribution so the case can bite. If you treat litigation as an instant transfer mechanism, you'll feel disappointed. If you treat it as a way to force real-world behavior change, it becomes much more useful.
With Freename-registered Web3 TLDs, you can't count on UDRP to act like a reset button. Ownership and resolution don't sit inside the ICANN system, so the best plan focuses on prevention, fast detection, and clear verification. That way, even when you can't quickly reclaim a name, you can still limit confusion, slow copycats, and protect users from loss.
The goal isn't perfection. It's to reduce the number of places scammers can stand, and to give your community an easy way to spot the real thing.
Start by listing how real users refer to you. What do they type into a wallet, a marketplace search bar, or a chat message when they want to find you fast? Brand protection works better when it mirrors human behavior, because scammers copy what people already do.
Pick a small set of high-value names first, then expand. Focus on variants that are most likely to be used for impersonation, support scams, and payment diversion.
Here's a practical set to prioritize:
Because Freename supports many Web3 TLDs, also decide which TLDs you will treat as "official." If your community mostly shares one or two Freename-registered Web3 TLDs in Telegram and X, those should come first. A wide strategy sounds safer, but it often wastes budget on names your users never touch.
If you want broader coverage without buying everything, consider trademark blocking designed for Freename's ecosystem. Freename partners with NameBlock, which can block trademarks across many existing and future TLDs on the platform. That helps reduce the "infinite whack-a-mole" problem where bad actors simply move to the next extension.
Finally, set internal naming rules so your own teams don't create confusion that scammers can exploit. You're not just defending against attackers, you're also defending against mixed messages.
A simple policy that works in practice:
official in one place, not across random launches).If your internal teams can't explain what's official in one sentence, users won't get it either, and scammers will fill the gap.
Defensive registrations reduce risk, but they don't remove it. Monitoring matters because Web3 scams can move from "new registration" to "stolen funds" quickly, especially when a fake name spreads through social posts and wallet-to-wallet messages.
Monitor where the abuse actually shows up, not just where names get registered. For Freename-registered Web3 TLDs, that usually means watching both naming activity and the places people trade, promote, and use those names.
At minimum, monitor:
Don't wait for a perfect signal. Many teams lose time debating whether something is "really harmful" while the scam gains reach. Instead, use a simple escalation path with clear owners and tight time windows.
A practical escalation flow:
The key is speed and consistency. When someone on your team asks, "Do we really need to post a warning yet," the better question is, how many users will see the scam before your next meeting.
Also, plan for the reality that public registration data may be limited. With Freename-registered Web3 TLDs and wallet-held assets, absence of WHOIS-style details doesn't mean the name isn't registered. Treat missing registrant data as normal, and focus your response on what you can prove: the look-alike name, where it's promoted, and what it does.
You can't stop every fake name from appearing. However, you can make it painfully obvious which brand touchpoints are real, so fewer people fall for look-alikes.
Start with a single source of truth page that you control. This page should live on a stable, well-known web domain and be linked everywhere you already have trust (X profile, Discord, GitHub, app settings, help center). When users ask, "Which Web3 name is yours," they should find the answer in seconds.
What to publish on that page:
To tighten trust, add cryptographic proof users can verify. Two simple methods work well:
Then, announce updates in a consistent pattern. If you post official names on the verification page, confirm them on your main social account, and repeat the same wording in community channels, users learn the "shape" of real announcements. Scams often fail when they can't match your habits.
Why does this matter when you can't quickly reclaim a name? Because verification reduces harm at the decision point. Users don't need to know the legal backstory; they just need a clear way to answer, "Is this really you," before they send funds or sign a message.
In Web3, brand protection isn't only about owning names. It's about reducing the odds that a user trusts the wrong one in a high-stakes moment.
UDRP works because ICANN's contracts give panels a real control point, registrars and registries can lock, transfer, or cancel a name without the registrant's consent. Freename-registered Web3 TLDs sit outside that chain, so a UDRP filing can't force an on-chain transfer, freeze a wallet-held asset, or guarantee a clean remedy across resolvers, wallets, and marketplaces. That's the key takeaway for brand teams, UDRP isn't "weaker" here, it's often inapplicable because the enforcement hooks aren't present.
So what should you do when an impersonator appears on a valid Freename Web3 TLD and there's no WHOIS trail to chase (which is normal)? First, reset expectations and focus on harm reduction, use platform policies, marketplace delistings, wallet warnings, gateway blocks, and fast public advisories to stop users from sending funds or signing prompts. Next, invest in prevention that matches how your community searches, targeted defensive registrations, tight monitoring for look-alikes, and a single verification page that publishes official names and addresses.
If you cover those basics, you can move faster than most attackers and keep incidents contained. Thanks for reading, how are you tracking and verifying your official Web3 names today, and where are the gaps you want to close first?
TLD Ownership Record
This TLD is an onchain asset identified via the Freename WHOIS Explorer. Ownership verified via onchain data. Data verified at time of publication. TLDs Observer has no financial interest in any of the assets mentioned in this publication.
Parties with a direct interest in any TLD referenced in this publication, or wishing to submit a notable onchain TLD for coverage, are welcome to reach out via the contact page.



