Username OSINT
Overview
Username hunting involves finding all online accounts associated with a specific username. This is valuable when:
- You only have a username (no email)
- Investigating harassment cases
- Tracking online personas
- Discovering forgotten accounts
Namechk
URL: namechk.com
Features:
- Checks username availability across 100+ platforms
- Shows where username is taken (meaning account exists)
- Categorizes by type (social, professional, etc.)
How to Use:
- Enter username (e.g., “cybermentor”)
- View results: Green = available, Red = taken
- Red results indicate existing accounts
- Click to visit those platforms
Example Results:
- YouTube: Taken (red) โ Check the channel
- Twitter: Taken (red) โ Visit profile
- Pinterest: Taken (red) โ Potential new discovery
- Reddit: Taken (red) โ Check post history
NameCheckup
URL: namecheckup.com
Similar to Namechk with slight differences in platform coverage.
KnowEm
URL: knowem.com
Features:
- 500+ social networks checked
- Shows availability
- Can register available names (service)
Social Media:
- Twitter/X
- Facebook
- Instagram
- TikTok
- Snapchat
- Reddit
- Pinterest
Professional:
Messaging:
- Telegram
- Discord
- Kick
- WhatsApp
Content:
- YouTube
- Twitch
- TikTok
- Patreon
Forums:
- Reddit
- Hacker News
- Various niche forums
X-Rated Sites:
- Many adult platforms
- Warning: Enable “safe mode” if not relevant to investigation
Benefits
- Find forgotten accounts - What you signed up for years ago
- Discover target’s platforms - Where they’re active
- Cross-reference information - Consistent usernames = same person
- Expand investigation - New platforms to investigate
Mobile Apps Investigation
Most username checkers focus on web platforms, but miss mobile-only apps.
Manual checking required:
- TikTok
- Snapchat
- Kick
- WhatsApp
- Telegram (sometimes web, sometimes mobile-only)
- WeChat
- Signal
- Various dating apps
How to Check
Method 1: Direct Search
- Download app
- Create temporary account
- Search for username
- View profile if exists
Method 2: Web Interfaces
- Some apps have web versions (tiktok.com/@username)
- Try direct URL patterns
Example Patterns:
tiktok.com/@username
kick.com/username
t.me/username (Telegram)
Deep Investigation Techniques
Profile Analysis
Once you find an account:
What to look for:
- Profile information - Bio, location, links
- Connections - Who they follow/are followed by
- Content - Posts, photos, videos
- Timestamps - When active, patterns
- Cross-posts - Same content across platforms
Same username doesn’t always mean same person.
Verification methods:
- Profile photos - Same photo = likely same person
- Bio information - Matching details
- Content style - Writing patterns, interests
- Connections - Same followers across platforms
- Timing - Account creation dates
Linking Accounts
Example Chain:
- Find: @johndoe on Twitter
- Link: Same photo on Instagram @johndoe
- Link: Instagram bio links to LinkedIn
- Find: LinkedIn reveals real name and company
- Result: Anonymous Twitter linked to real identity
Special Considerations
X-Rated/Adult Content
Why it matters:
- Criminal investigations (predators, traffickers)
- Harassment cases
- Extortion/blackmail
- Reputation analysis
How to handle:
- Most tools have “safe mode” (default)
- Can enable adult content search if investigation requires
- Document carefully if part of official case
- Be aware of legal implications
False Positives
Common issues:
- Tools report “taken” but account doesn’t exist (error)
- Username taken but abandoned/inactive
- Same username, different person
- Platform redirects causing false availability
Solution:
- Always verify by visiting the platform directly
- Don’t rely solely on tool results
- Cross-check multiple indicators
Advanced: Manual Username Enumeration
Try direct URLs:
facebook.com/username
twitter.com/username
instagram.com/username
reddit.com/u/username
github.com/username
tiktok.com/@username
linkedin.com/in/username
youtube.com/c/username
Google Dorking for Usernames
Search patterns:
site:twitter.com "username"
"username" inurl:profile
intitle:"username" site:instagram.com
Data Export
Useful for:
- Documentation
- Reporting
- Further analysis
Integration with Full OSINT Workflow
Complete Investigation Chain
Phase 1: Email Discovery
- Use Hunter.io, etc.
- Find company email pattern
Phase 2: Breach Search
- Search email in DeHashed
- Find associated usernames
Phase 3: Username Hunt
- Check username across platforms (Namechk)
- Find all social media accounts
Phase 4: Profile Analysis
- Examine each discovered account
- Extract photos, locations, connections
Phase 5: Location/Image OSINT
- Reverse image search photos
- Analyze location data
- Verify identity
Phase 6: Reporting
- Compile all findings
- Show connections between accounts
- Document methodology
Best Practices
For Self-Assessment
- Search your own usernames
- Find forgotten accounts
- Clean up old profiles
- Understand your digital footprint
For Investigations
- Start with most unique usernames
- Document all findings immediately
- Screenshot profiles (they may change)
- Note timestamps
- Verify before concluding
For Corporate Security
- Check company usernames
- Monitor brand impersonation
- Find unauthorized accounts
- Assess exposure
Summary
Username hunting is a critical OSINT skill that:
- Expands investigation scope
- Reveals platform preferences
- Links anonymous to real identities
- Uncovers hidden connections
Key principle: One username can lead to dozens of accounts, each providing more information about the target.