Before you start
Create your account
Go to Osintly. You can sign up with email/password or via Google, Discord, GitHub, X, LinkedIn, or Facebook.
Pick a plan
Each search costs credits. Choose based on your expected volume. Full details on osint.ly/pricing:
| Plan | Credits/month | Best for |
|---|---|---|
| Standard (€9.99) | 25 | Occasional solo investigations |
| Pro (€24.99) | 100 | Regular analysts, small teams |
| Advanced (€94.99) | 200 | Power users, team workspaces |
You can upgrade at any time. Credits do not roll over month to month.
Your first search
Go to the Search page
The Search page is the default landing page when you log in. If you navigated away, click Search in the left sidebar to get back.
Select the input type
Pick the type that matches your target:
| Type | Example input |
|---|---|
| Pseudonym | johndoe42 |
| Email Address | john@example.com |
| Phone | +1 555 000 1234 |
| IP address | 192.168.1.1 |
| Domain | example.com |
| Cryptocurrency | 1A1zP1eP5Q... |
Start the search
Hit Search. Results stream in real time via SSE: module cards appear as each source responds. You don’t need to wait for everything to finish before reading results.
Read the result page
Each module card shows a data source. Click any card to expand linked records, images, and geographic context.
Module cards
Module cards
Each card represents one data source or provider. The number of cards you see depends on your plan: higher plans unlock more providers, including leak and breach sources.
Images tab
Images tab
Profile pictures and media found during the search are grouped in the Images tab for quick visual cross-referencing.
Leaked Results
Leaked Results
Aggregated data from leak databases. Each row shows the fields exposed: password hash, IP, username, and more. Availability depends on your plan.
Breached Accounts
Breached Accounts
Results from breach-specific providers (Snusbase, Breach VIP, Hudson Rock, LeakCheck, and others). Shows which breach an account appeared in, and when.
Registered Accounts (email only)
Registered Accounts (email only)
Only available on Email searches. Shows services and platforms where this email address has a registered account.
Map view
Map view
Any geolocation signals are plotted on an interactive map.
AI Analyst
AI Analyst
Available on Pro and Advanced. Open the AI chat to ask questions about the results, generate a timeline, or focus on specific signals. The AI can also run a web search for additional context.
Come back to your results anytime
You can leave the result page freely. Every search is saved automatically and accessible from your history. From there you can reopen any past result, continue reading, or attach it to a project later.
Common first searches by use case
Five quick starting points. For complete step-by-step workflows on each scenario, see the Use cases page.Find accounts linked to a username
Find accounts linked to a username
- Select Pseudonym as input type.
- Enter the handle exactly as you found it (case matters on some platforms).
- Review the social profile cards and breach results.
- If you find an email in the results, start a new Email search to expand the profile.
Check if an email appears in breaches
Check if an email appears in breaches
- Select Email Address as input type.
- Paste the target address.
- Breach results appear in cards from providers like Snusbase, LeakCheck, Hudson Rock, and others. Availability depends on your plan.
- Each breach card shows the data fields exposed (password hash, IP, username, etc.).
Breach provider access is gated by plan. Check Pricing to see what each plan includes.
Trace a suspicious IP
Trace a suspicious IP
- Select IP address as input type.
- Enter the IP (IPv4 or IPv6).
- Check geolocation, hosting provider, ASN, and threat intelligence cards.
Map a domain's infrastructure
Map a domain's infrastructure
- Select Domain as input type.
- Enter the root domain without
https://or trailing slash. - Review DNS records, subdomains, WHOIS, and linked IP addresses.
- Cross-reference any discovered IPs with a new IP search.
Trace a crypto wallet
Trace a crypto wallet
- Select Cryptocurrency as input type.
- Paste the full wallet address.
- Review transaction history, linked addresses, and risk signals.