Skip to content
  • There are no suggestions because the search field is empty.

Threat Monitoring - X(Twitter) Profile Takedown Guide

Use this guide to get an impersonating or IP-infringing X profile removed. It covers the evidence to gather, where to file reports, and how to follow up and escalate

1) Gather Evidence (before you file)

  • Profile URL (copy from the browser address bar).
  • Screenshots showing misuse of name, handle, bio, images, or posts implying official status.

  • Screenshots of replies or reposts reinforcing impersonation.

  • Official proof of brand identity, website, verified accounts.

  • Trademark or copyright documentation if asserting IP claims.

  • Contact & authority: a business email at your domain and a statement that you are authorized to act for the rights holder.

2) Choose the Right Reporting Path

A. Report Impersonation inside X (fastest for “fake account”)

  1. Open the offending profile → click the  menu (or More).
  2. Click Report → choose Impersonation (or the closest option).
  3. Submit with your screenshots and official URLs.

This built-in route is X’s preferred channel for fake/impersonation accounts and can be used even without a registered IP.

B. File an IP Complaint (Trademark or Copyright)

Use X’s legal forms if the profile misuses your protected IP (logo, brand name, copyrighted images/text):

Tip: If the profile links to a phishing/cloned domain (e.g., a look-alike of your site), include that URL and any customer harm you can document.
 

3) How to Fill the Forms (what to say)

  • Describe the violation plainly: “This profile falsely claims to represent [Brand] and uses our registered trademark/logo without permission.”
  • Identify the official channels: “Our official website is [URL], and our verified X page is [URL].”
  • Map evidence to the misuse: “Screenshot 1 shows our logo used as their profile picture; Screenshot 2 shows bio text stating ‘Official [Brand] Support’.”
  • Attest authority & contact: provide a reachable business email at your domain and acknowledge accuracy under penalty of perjury (required for IP forms).

4) After You Report: Track, Follow Up, Escalate

  1. Track status: Monitor for X Safety emails for responses and any requests for more info.
  2. Respond promptly if X asks for clarifications (e.g., better screenshots or registry links).
  3. If action stalls: Re-submit with clearer evidence tying the profile to brand deception (explicit language, logo misuse, phishing link), and escalate via X Business Support if available.

5) Internal Next Steps (recommended)

  • Publish a short “official accounts” page on your site and link it in reports to prove authenticity.
  • Warn support/sales teams to watch for confused customers and collect examples (messages, screenshots) as additional evidence.
  • Record the timeline (report date, report ID, action taken) for future escalations or repeat offenders.

Sources & References

Note: X’s menu labels and forms change from time to time. If a link looks different, search the Help Center for the same topic title and include the same evidence described above.