🕵️ OSINT Guide: How to Find Anything About Anyone Online

:magnifying_glass_tilted_left: OSINT: How to Find Anything About Anyone (Without Being a Hacker)

Source: telegraph.co.uk/world-news/2025/11/13/spot-difference-putin-replica-offices-exposed/

You know that feeling when someone finds your address from a selfie? Or tracks down a scammer using just their username? That’s OSINT. And no, you don’t need to be some basement-dwelling genius to do it.

OSINT stands for Open Source Intelligence. Fancy words for: finding shit that’s technically public but nobody knows how to find.

This isn’t hacking. This isn’t illegal. This is just… knowing where to look.

And holy shit, once you learn this stuff, the internet will never feel the same again.


🤔 Why Should You Even Care? (Click This First)

Because knowledge is power. And right now, most people are walking around blind while their entire life is scattered across the internet like digital breadcrumbs.

Real uses for normal people:

  • Checking if that “crypto investor” sliding into your DMs is actually a Nigerian scam farm
  • Finding out if your landlord has 47 lawsuits against them
  • Tracking down the asshole who stole your bike (yes, really)
  • Verifying if that “news” your uncle shared is complete bullshit
  • Finding out where a photo was actually taken
  • Checking if your email got leaked in a data breach
  • Reverse searching that “too good to be true” profile pic

This isn’t about being creepy. It’s about not being a victim in a world where everyone else already knows how to find this stuff.


Part 1: Image Investigation

📸 Why Your Selfies Betray You

Every Photo Tells a Story (Whether You Want It To)

That innocent photo you posted? It might contain:

  • GPS coordinates of exactly where you were standing
  • The exact time and date
  • What camera/phone you used
  • Sometimes even your name if you edited it in certain apps

How to check what your photos are leaking:

Go to https://exif.tools or https://jimpl.com — drag any image in and watch in horror as it spills all its secrets.

Want to see this in action? Download any photo from your phone, upload it there, and prepare to feel very uncomfortable.

🔎 Reverse Image Search — The Right Way

Finding Where a Photo Was Taken

Someone sent you a sketchy photo? Or you’re trying to verify if that “beachfront property” is actually real?

The lazy way (works 70% of the time):

  1. Go to https://images.google.com (click the camera icon)
  2. Upload the image
  3. See where else it appears

The better way:

Google’s reverse search sucks now. Use these instead:

Tool URL What It’s Good For
TinEye https://tineye.com Finding the OLDEST version of an image (catches catfish fast)
Yandex https://yandex.com/images Scary good at faces. Like, too good.
Bing Visual https://www.bing.com/visualsearch Sometimes finds stuff Google misses
Sogou https://pic.sogou.com Chinese internet - whole different world

Pro tip: Run the same image through ALL of them. Seriously. Each one searches different corners of the internet.

🤖 AI Geolocation — This Is Getting Scary

AI Can Now Guess Where Photos Were Taken

This is new and terrifying.

GeoSpy (https://geospy.ai) and Picarta (https://picarta.ai) use AI to look at a photo and guess the location. No GPS needed. It analyzes the architecture, vegetation, road signs, everything.

It’s not perfect, but it’s scary accurate sometimes. Try it on a random street photo and watch it pinpoint the country, sometimes even the city.

🌅 Shadow Analysis — Yes, This Is Real

That Shadow in Your Photo? It’s a Timestamp.

Not a joke. Investigators use shadow length and direction to figure out what TIME a photo was taken.

SunCalc (https://suncalc.org) lets you:

  1. Pick a location
  2. Pick a date
  3. See exactly where the sun would be at any time

Match that with the shadows in a photo = you know when it was taken.

This is how journalists caught world leaders lying about their whereabouts. Shadow angles don’t lie.

🎭 Detecting Fake/Edited Photos

Someone swears a photo is real? Test it.

FotoForensics (https://fotoforensics.com) — Upload any image and it runs something called “Error Level Analysis.” Basically, edited areas show up different than original areas.

Forensically (https://29a.ch/photo-forensics/) — Browser-based. Does the same thing plus clone detection (finds copy-pasted areas).

Not foolproof, but catches 80% of lazy Photoshop jobs.


Part 2: Finding People Online

👤 The Username Game — One Name, Many Accounts

Here’s a fun fact: Most people use the same username everywhere.

That means if you find someone’s Reddit username, you might also find their:

  • Twitter
  • Instagram
  • Gaming profiles
  • Old forum accounts from 2009 where they said embarrassing shit

Tools that check hundreds of sites at once:

Just type in a username and watch accounts appear that the person probably forgot existed.

📧 Email Lookup — More Powerful Than You Think

Got someone’s email? You can check:

Have I Been Pwned (https://haveibeenpwned.com) — See which data breaches their email was in. Also tells you what info was leaked (passwords, addresses, phone numbers, etc.)

Epieos (https://epieos.com) — Shows which websites an email is registered on. Completely passive. They don’t get notified.

Hunter.io (https://hunter.io) — Find email patterns for any company. Like [email protected]

📱 Phone Number Lookup

Phone numbers are surprisingly traceable.

What you can do for free:

  • Just Google the number in quotes: “555-123-4567”
  • Search it on Facebook (people forget they linked it)
  • Try it on WhatsApp/Telegram (shows profile pic if registered)

Dedicated tools:

  • PhoneInfoga — Open source phone number investigation
  • NumLookup — Basic carrier info

Part 3: Social Media Deep Dives

🐦 Twitter/X Secrets

Finding old tweets: Twitter’s search sucks on purpose. Use this instead:

from:username since:2020-01-01 until:2020-12-31

That searches only that user’s tweets from 2020. Works in Twitter’s search bar.

Getting someone’s account creation date from just a tweet ID:
Go to https://oduwsdl.github.io/tweetedat/ — paste any tweet URL and it tells you the exact timestamp.

Finding deleted tweets:

📷 Instagram Investigation

Instagram is a goldmine if you know where to look.

Viewing without an account:
Add /embed to any profile URL: instagram.com/username/embed

Downloading posts:
Tons of sites do this. ImgInn and Picuki work without login.

Finding tagged photos:
Search instagram.com/explore/tags/locationname — People tag locations constantly

🎵 TikTok & Reddit

TikTok

Extract timestamp from any TikTok:
https://bellingcat.github.io/tiktok-timestamp/ — Paste URL, get exact upload time

Download TikToks without watermark:
SnapTik, SSSTik, or just google “tiktok downloader no watermark” — there’s a million of them

Reddit

Reddit is an OSINT paradise because people think it’s anonymous. It’s not.

Search deleted comments:
Reveddit (https://reveddit.com) — Shows posts/comments that mods removed

Deep search a user’s history:
RedditMetis analyzes posting patterns, active times, and can estimate location based on activity times


Part 4: Finding Deleted Stuff

⏰ The Wayback Machine — Time Travel for the Internet

https://web.archive.org saves snapshots of websites going back to the 90s.

That company that scrubbed their embarrassing “About Us” page? Probably still archived.

That person who deleted their blog? Might be there.

How to use it:

  1. Go to web.archive.org
  2. Paste any URL
  3. See every saved version over time

Pro tip: Add a * to search entire domains:
https://web.archive.org/web/*/example.com/*

📦 Other Archives Nobody Talks About

Archive.today (The One That Doesn’t Play Nice)

https://archive.today (also .is, .ph, .md — same site, different domains)

This one:

  • Ignores robots.txt (saves stuff sites don’t want saved)
  • Keeps the page as a screenshot too
  • Can’t be deleted by the original site owner

This is where researchers archive evidence before it disappears.

Google Cache (RIP but Sometimes Works)

Google used to keep cached versions of every page. They killed it in 2024, but sometimes it still works:

Just search: cache:example.com/page

Other Archives Most People Don’t Know About

  • Perma.cc — Used by lawyers and journalists, very permanent
  • Archive.is — Same as archive.today
  • CachedView (https://cachedview.com) — Searches multiple cache sources at once

Part 5: Domain and Website Investigation

🌐 Who Actually Owns That Website?

WHOIS Lookup

WHOIS Lookup tells you who registered a domain. Sometimes.

Since GDPR, most registrations are now private. But old domains still have public info.

Finding Every Website on a Server

Sometimes one website leads to others. Same owner, different domains.

SSL Certificates Leak Subdomains

Every HTTPS site needs a certificate. And certificates are public record.

crt.sh (https://crt.sh) — Search any domain and see ALL certificates ever issued. Including subdomains.

That dev.company.com or staging.company.com that isn’t linked anywhere? Shows up here.


Part 6: Finding Devices and Servers

💀 Shodan — The Search Engine for Everything Connected

https://www.shodan.io — This searches the internet for devices, not websites.

Webcams. Routers. Industrial systems. Smart fridges. Anything with an IP address.

Free searches you can do:

  • webcam — Find exposed webcams
  • port:3389 country:US — Find exposed remote desktops in the US
  • default password — …yeah

This is legal to search. Actually exploiting what you find? That’s where it gets illegal.

Alternatives to Shodan

Tool URL Specialty
Censys https://search.censys.io Better for SSL cert searching
ZoomEye https://zoomeye.ai Chinese version, different results
FOFA https://fofa.info Another Chinese one
Criminal IP https://www.criminalip.io Threat intelligence angle

Part 7: Geolocation

📍 Where the Fuck Is This? — Location From Photos

Identifying Locations From Photos

This is where OSINT gets fun. People post photos and accidentally reveal exactly where they are.

What to look for:

  • Street signs (even partial)
  • Store names
  • Architecture style
  • Language on signs
  • License plates
  • Sun position and shadows
  • Vegetation (palm trees vs pine trees)
  • Road markings (every country does them different)
🗺️ Street View Beyond Google

Google isn’t the only one with street-level imagery.

The GeoGuessr Community Has Documented Everything

Competitive GeoGuessr players have identified which countries have which:

  • Bollard styles
  • Road marking patterns
  • Google car types (specific cars = specific countries)
  • License plate colors
  • Traffic light designs

GeoTips (https://geotips.net) — The wiki of location identification tricks

This is insanely detailed. You can identify a country from just the style of a highway marker.


Part 8: Telegram and Discord

✈️ Telegram — Not As Private As You Think

Search engines for Telegram:

  • Lyzem (https://lyzem.com) — Dedicated Telegram search
  • TGStat — Database of 37+ billion public posts
  • Google dork: site:t.me "search term"

Finding groups:
t.me/joinchat/ + keywords in Google

Check if a phone number has Telegram:
Just add the number to your contacts. If they have Telegram, you’ll see their profile.

🎮 Discord Investigation

Discord IDs contain the account creation date. Seriously.

How to get any Discord user’s ID:
Enable Developer Mode (Settings → Appearance → Developer Mode)
Right-click any user → Copy ID

Convert ID to timestamp:
https://discordapp.com/developers/docs/reference — Or just use a converter like Unfurl

Finding Discord servers:


Part 9: Data Breaches

💔 Checking If You're Compromised

Have I Been Pwned (https://haveibeenpwned.com) — The OG. Enter email, see if you’re fucked.

Firefox Monitor — Same database, different interface

DeHashed — More comprehensive but paid

What Gets Leaked

Most breaches include:

  • Email addresses
  • Passwords (often hashed, sometimes not)
  • Names
  • Phone numbers
  • Physical addresses
  • IP addresses
  • Security questions

The really bad ones include:

  • Full credit card numbers
  • SSN/National ID numbers
  • Medical records
  • Private messages
🕳️ Underground Leak Sites

There are sites that index breach data and let you search it. I’m not linking them because some are legally questionable, but they exist.

Intelligence X (https://intelx.io) — The semi-legit version

LeakCheck (https://leakcheck.io) — Shows what data was leaked for any email


Part 10: Public Records

⚖️ Court Records — The Legal Goldmine

Want to know if someone has lawsuits? Arrests? Bankruptcies?

🏢 Company & Property Records

Company Information

OpenCorporates (https://opencorporates.com) — 230+ million companies across 145+ countries. Free.

Want to know who owns a company? Who the directors are? Whether they have other companies?

Start there.

Property Records

Most counties have property records online. Search “[county name] property records” and you’ll usually find:

  • Owner names
  • Purchase prices
  • Property taxes
  • Sometimes mortgage information

Part 11: The Underground Tools

🔥 The 1% Stuff — What Actual Investigators Use

For Finding ANYTHING About ANYONE

  • OSINT.SH (https://osint.sh) — All-in-one toolkit. Reverse email, domain research, the works.
  • Maltego — The industry standard for mapping connections between people, companies, domains. Has a free version.
  • SpiderFoot — Automated OSINT collection. Point it at a target and it does everything.

The GitHub Repositories That Are Too Good

These are collections of tools maintained by actual practitioners:

  • awesome-osint (https://github.com/jivoi/awesome-osint) — THE master list
  • The-Osint-Toolbox — Multiple repositories for different platforms
  • OSINT-for-countries — Country-specific techniques

Country-Specific Tools

Different countries have different public databases. Russia has different tools than the US.

These are invaluable if you’re investigating anything international.


Part 12: Browser Extensions

🧩 Extensions That Turn Your Browser Into a Weapon

Install these and your browser becomes an investigation machine:

Extension What It Does
RevEye Right-click any image → reverse search on 5+ engines at once
SingleFile Save complete webpages as one HTML file (evidence preservation)
Wayback Machine One-click check if page is archived
Hunchly Automatically captures everything you browse (investigation mode)
Fake News Debunker Video analysis, reverse image search, InVID integration

Part 13: Operational Security

🛡️ Don't Be an Idiot — Stay Anonymous

If You’re Investigating Someone, Don’t Let Them Know

  • Don’t use your real accounts. They can see who viewed their LinkedIn.
  • Use a VPN. Basic.
  • Different browser. Firefox with containers, or just Brave.
  • Sock puppet accounts. Fake accounts for viewing private stuff. Age them before using.

For Anything Serious

  • Virtual machine. Keep investigation stuff separate from personal stuff.
  • Public WiFi. Some platforms flag VPN IPs.
  • Screenshot EVERYTHING. Evidence disappears. Archive before engaging.

The Mental Framework

🧠 How to Actually Think Like an Investigator

This is the part most guides skip. Tools are just tools. The skill is knowing how to think.

The Rules:

  1. If it feels easy, you’re wrong. The good stuff isn’t on page 1 of Google.

  2. If answers look polished, you’re late. By the time something is SEO-optimized, it’s old news.

  3. If you see arguments and confusion, you’re close. Real information lives in messy discussions, not clean tutorials.

  4. If someone says “don’t ask this here,” you found gold. That’s the sensitive stuff.

  5. Follow the breadcrumbs. One username leads to an email. That email leads to another account. That account has a linked phone number. Keep going.

  6. Check multiple sources. People lie. Records lie. Cross-reference everything.

  7. Think about what’s NOT there. Why is this company website missing an About page? Why is there a 3-year gap in this person’s LinkedIn?

The Search Methodology:

Normal people search for answers.
Good researchers search for leaks.
Great researchers search for where things broke.


Quick Reference Cheat Sheets

👤 Person Investigation Cheat Sheet
Step Tool URL
Username search WhatsMyName https://whatsmyname.app
Email check Have I Been Pwned https://haveibeenpwned.com
Email accounts Epieos https://epieos.com
People search Multiple Just Google “[name]” + city
🖼️ Image Investigation Cheat Sheet
Step Tool URL
Reverse image TinEye https://tineye.com
Reverse image Yandex https://yandex.com/images
Face search PimEyes https://pimeyes.com
Metadata Exif.tools https://exif.tools
AI geolocation GeoSpy https://geospy.ai
Forensics FotoForensics https://fotoforensics.com
🌐 Website Investigation Cheat Sheet
Step Tool URL
WHOIS DomainTools https://whois.domaintools.com
Archive Wayback Machine https://web.archive.org
SSL certs crt.sh https://crt.sh
Technology BuiltWith https://builtwith.com
📱 Social Media Cheat Sheet
Platform Tool URL
Twitter Advanced Search https://twitter.com/search-advanced
Reddit Reveddit https://reveddit.com
Telegram Lyzem https://lyzem.com
TikTok Timestamp Tool https://bellingcat.github.io/tiktok-timestamp
🖥️ Device Search Cheat Sheet

Final Thoughts

None of this is magic.

Once you see how it works, it’s obvious. Embarrassingly simple.

The people who are good at this aren’t geniuses. They just learned where to look — and then they looked.

Now you know too. The only question left is: what will you find?

  • Here’s the real reason to learn this:

  • If you can find this stuff about other people, they can find it about you.

  • Know what’s out there. Know your own exposure. Know what you’re leaking without realizing it.

  • The best defense isn’t hiding. It’s understanding exactly how the game works.


Stay curious. Stay skeptical. And always check your sources.

Where curiosity meets creation — and every idea finds its hack. :comet:

15 Likes