Why this matters
A single username or email address is often enough to build a comprehensive picture of a person โ accounts on dozens of platforms, where they live, who they know, what they buy, what they've publicly said. Defenders need to understand this dynamic for two reasons: to audit their own (and their organization's) footprint, and to anticipate what a social engineer would find before launching an attack.
This post focuses on defensive use cases: auditing your own digital footprint and reducing it. The same techniques can be misused; we don't cover specific stalking workflows.
Username searches
Most people reuse usernames across platforms. A handle picked once at age 15 ends up on a dozen accounts that all link back to the same person. The standard technique is to check a username against many platforms at once.
Open-source tools that do this systematically:
- Sherlock โ Python CLI that checks a username against 400+ platforms. Free, open-source, widely used.
- Maigret โ a fork/successor with broader platform coverage and richer output.
- WhatsMyName โ web-based, easier for non-developers; same underlying approach.
All three are non-intrusive โ they only check publicly accessible "does this account exist?" endpoints. They don't access accounts or content; they only confirm presence.
What to do with results: each "hit" is a public profile worth examining. Often you find dormant accounts the target forgot about โ old forums, gaming platforms, support sites โ that leak biographical details.
Email investigations
Email addresses tie together accounts even more strongly than usernames. From a single email you can typically find:
- Which breaches it appears in via haveibeenpwned.com. The breach list itself reveals platforms the target uses.
- Which platforms have an account with that address via password-reset flows. Many platforms return slightly different "user exists" vs "user doesn't exist" responses on the password reset page โ researchers exploit this for confirmation without actually logging in.
- Gravatar profile if any. Gravatar associates a profile with the MD5 hash of an email address; many forums and blogs display Gravatar avatars, leaking the email-to-image link.
- Linked social accounts via platforms that allow searching by email (most have restricted this, but historical leaks persist).
Correlating identities across platforms
The investigative jump is connecting accounts on different platforms to the same real person. Common correlation signals:
- Identical or near-identical profile photos โ reverse image search confirms.
- Same display name or username variants across platforms.
- Same bio text or specific phrasing โ people reuse their own bios.
- Same posting timezone revealed by activity patterns.
- Same writing style โ at significant content volume, stylistic markers identify authors.
- Common contacts/followers across platforms.
- Cross-references โ one profile links to another, even subtly.
Verification matters. A "match" on a single signal is suggestive; matches across three or more signals approach reliable correlation. Single-signal "matches" are how investigators get their facts wrong.
Breach data โ used defensively
When a service is breached, the leaked data is part of the OSINT corpus. Have I Been Pwned indexes breach data lawfully and exposes a simple lookup interface. It tells you:
- Whether a specific email or phone number appears in known breaches
- Which services those breaches came from
- What categories of data were exposed (passwords? credit cards? personal info?)
Use this defensively on your own accounts. If your email appears in 12 breaches, you should treat any password you used on those services as public knowledge. The "Pwned Passwords" feature lets you check whether a specific password has appeared in any breach โ without sending the password itself (it uses a k-anonymity scheme based on partial hashes).
Self-audit checklist
Run this monthly on yourself or quarterly on your organization's executives:
- Run Sherlock or Maigret against your most-used 2โ3 usernames. Make a list of platforms returning hits.
- Check Have I Been Pwned for every email address you use, including aliases.
- Search your name in Google, Bing, and DuckDuckGo. Note any results you weren't expecting.
- Reverse-image-search your main profile photo across Google Images, Yandex, and TinEye.
- Check Gravatar by visiting gravatar.com/email-hash with your email's MD5.
- Document everything with timestamps so next quarter you can see what changed.
Defensive countermeasures
- Different usernames per category โ work, personal, gaming, throwaway. Don't reuse the same handle across categories.
- Email aliases โ services like SimpleLogin, AnonAddy, or Apple's "Hide My Email" generate unique aliases per service. If one leaks, only that service is affected.
- Different password per service โ universally. Use a password manager. This isn't OSINT-related but it's the foundation that limits breach damage.
- Disable Gravatar if you don't actively need it.
- Delete dormant accounts. The account you forgot in 2014 is still part of your footprint in 2026.
- Request removal from people-search aggregators. Most have opt-out forms; using them takes hours but reduces your aggregated exposure significantly.
- Tighten platform privacy settings. Especially LinkedIn, where the default is "all professional information public."
For the methodology, see our OSINT introduction. For broader tool coverage, see the OSINT toolkit. For privacy hardening as a full discipline, see cybersecurity fundamentals.
- Have I Been Pwned โ Breach data lookup
- Sherlock โ Sherlock project repository
- WhatsMyName โ whatsmyname.app
- Gravatar โ Gravatar