6 input types
From usernames to crypto wallets. One input, all relevant providers.
Streaming results
Results appear as providers respond. No waiting for a full page load.
Search history
Every search is saved. Re-open past results at any time at no credit cost.
Input types
Each input type maps to a dedicated set of providers. Select the one that matches your identifier.- Pseudonym
- Email Address
- Phone Number
- IP Address
- Domain
- Cryptocurrency
What to enter: A username or handle, exactly as it appears on the platform.What it looks up: Social profiles, forum accounts, registered services, leak databases.Tips:
- Capitalization may matter. Enter the handle as you found it.
- Do not include
@unless it is part of the handle itself. - If the username appears in breaches, linked emails are often surfaced in the results - use them to pivot to an Email Address search.
Input type detection
Osintly auto-detects the input type as you type. The type chip updates based on the format of the identifier - email pattern, IP format, domain structure, wallet prefix, and so on. You can override the detected type by clicking a different chip at any time. This is useful when the identifier is ambiguous - for example, forcing a Domain search on a string that looks like an email domain.Running a search
Go to the Search page
Navigate to osint.ly/search. It is the default landing page after login.
Enter the identifier
Type or paste the value into the input field. The input type chip updates automatically as you type.
Adjust search options if needed
Click the options icon next to the search input to configure leak sources, dorking, and display preferences before launching.
Search options
Configure search behavior before launching from the options panel next to the input field.Leak sources
Leak sources
Toggle which leak and breach provider categories are included in the search. Disabling a category means those providers are not queried and their cards do not appear in results.Options that exceed your plan are shown but disabled.
Dorking engine
Dorking engine
Enable OSINT dorking to surface results from indexed public sources using structured search queries. Useful for pseudonym and domain searches where surface-level indexed data may add context.
Open in new tab
Open in new tab
Opens the result page in a new browser tab instead of navigating away from the Search page. Useful when running multiple searches in quick succession.
Mask query
Mask query
Hides the search term from the browser tab title and page heading. The search runs normally - only the visible label is masked. Useful when working in environments where screen visibility is a concern.
Plan limits
Provider coverage depends on your plan. Standard queries a base set of providers. Pro and Advanced unlock additional sources, including premium breach databases and extra leak providers. For full pricing details, see osint.ly/pricing.| Capability | Standard | Pro | Advanced |
|---|---|---|---|
| Monthly credits included | 25 | 100 | 200 |
| Pseudonym search | Yes | Yes | Yes |
| Email Address search | Yes | Yes | Yes |
| IP Address search | Yes | Yes | Yes |
| Phone Number search | No | No | Yes |
| Domain Name search | No | Yes | Yes |
| Cryptocurrency search | No | Yes | Yes |
| Leak sources | No | Yes | Yes |
| AI Analyst | No | Yes | Yes |
| Monitoring | No | Yes (up to 5 monitors) | Yes (up to 15 monitors) |
| Team members | 0 | 5 | 25 |
| Result sharing | No | No | Yes |
| Export (PDF / JSON / DOCX) | Yes | Yes | Yes |
| Priority support | No | No | Yes |
Search history
Every search is saved automatically. Access your full history at osint.ly/history. From the history page you can:- Re-open any past result at no credit cost
- Delete individual entries
- Select and delete multiple entries at once