Email Composer

One of the most common challenges in OSINT investigations is piecing together email information from fragmented digital traces. You find usernames, partial emails in data breaches, masked addresses, and various clues scattered across multiple platforms — but connecting these dots to find the actual email address can be time‑consuming and frustrating.
Introducing Email Composer: From Pseudonym to Email — automatically reconstruct email addresses from scattered OSINT data.

When It Appears

Email Composer activates automatically during Pseudonym searches only — ensuring it remains relevant and targeted to investigations where email discovery makes the most sense. This focused approach prevents information overload while maximizing utility for actual email research.

How Email Composer Works

Intelligent Aggregation

Performs a global merge of all email‑related data found across:
  • Profile cards from various platforms
  • Data breach sections (leaks)
  • Any email indicators discovered during the search

Smart Prioritization

When multiple sources contain the same email information, card data always takes priority over leak data. This ensures the most current and contextually relevant information surfaces first.

Advanced Reconstruction

Goes beyond collection to intelligently rebuild masked or partial emails:
  • Provider inference (e.g., Gmail, Outlook)
  • Local‑part consolidation from username/handle/name
  • Domain matching using platform patterns

Smart Suggestions System

Immediate Validation

If a complete, unmasked email address is found, it’s immediately flagged as high‑confidence and prioritized in results.

Ranked Results

Email Composer limits suggestions to the 5 most probable candidates, ranked by:
  1. Complete emails (highest priority)
  2. Card‑sourced matches
  3. Domain matching accuracy
  4. Overall data presence

AI‑Powered Analysis

For Advanced and Pro subscribers, an “Advanced AI Analysis” button sends the complete investigation data to our AI model, which:
  • Validates the most likely email address
  • Provides alternatives with confidence scoring
  • Explains reasoning behind selections
  • Suggests additional possibilities based on behavioral patterns
Advanced AI Analysis requires Pro or Advanced subscription.

User Experience Design

Email Inputs Banner

A clean banner displays up to 4 detected email inputs with a “+N” indicator if more exist. Card‑sourced emails are always shown first.

Composer Modal Interface

Detected Inputs Section:
  • Maximum 4 entries displayed
  • Complete emails feature a “Full email” tooltip and visual highlighting
  • Card data prioritized over leak data
Possible Results Section:
  • Up to 5 suggestions ranked by probability
  • One‑click copying for immediate use
  • Clear confidence indicators
AI Analysis Section (Pro/Advanced):
  • “Best” email with confidence score
  • Alternative candidates
  • Reasoning explanation for transparency

Quick Access Icons

Profile cards with email‑related data display a small email icon for instant Composer access — streamlining your workflow without interface clutter.

Privacy and Accuracy Controls

Strict Output Policy: Email Composer never suggests masked or partially hidden emails (no * patterns). Only complete, actionable addresses are shown.
Cross‑Reference Validation: The AI analysis prioritizes usernames and handles while scanning bios and descriptions for professional email addresses, ensuring comprehensive coverage. User Control: Email Composer can be disabled in settings if you prefer manual discovery.

Technical Implementation

  • Label recognition across diverse data sources
  • Intelligent deduplication to prevent redundant suggestions
  • Confidence scoring via machine learning models
  • Real‑time processing as search results populate

Availability and Scope

Search Type Compatibility

Email Composer is exclusively available for Pseudonym searches.

Subscription Tiers

Why Email Composer Matters for OSINT

  • Investigation efficiency: turn hours of manual hunting into seconds of automated discovery
  • Higher success rates by combining sources and intelligent reconstruction
  • Professional email research for outreach, background checks, and fraud investigations
  • Reduced false positives through ranking and AI validation

Getting Started

1

Perform a Pseudonym search

Run your investigation as usual.
2

Watch the email banner

Detected inputs appear in a compact banner; click it to open Email Composer.
3

Review suggestions

Inspect the ranked suggestions and copy any candidate with one click.
4

Run AI analysis (optional)

If you’re on Pro/Advanced, use Advanced AI Analysis for validation and alternatives.
5

Refine and proceed

Leverage the best candidate(s) for email or further verification.
Email Composer transforms scattered digital traces into actionable email information — scoped to pseudonym investigations where email discovery matters most.