Skip to main content
Osintly is used across a range of professional and personal contexts. The platform does not require a technical background, but it rewards users who know how to chain searches across input types.
Some capabilities - AI Analyst, monitoring, and part of the provider coverage - are only available on Pro and Advanced plans. Results reflect third-party sources and may be incomplete or outdated depending on the provider.

Journalist and fact-checker

A journalist verifying a source, investigating a claim, or tracing the origin of a piece of content. Typical workflow:
  • Search a pseudonym or username to verify whether an account is genuine or newly created
  • Cross-reference an email address against breach records to assess credibility
  • Trace a domain to identify who is behind an anonymous website or newsletter
  • Use AI Analyst to summarize findings and build a timeline for a story
Key features: Pseudonym search, breach records, domain lookup, AI Analyst summary, mask query (search setting)

Cyber analyst and threat intelligence researcher

A CTI analyst investigating infrastructure, tracking threat actors, or responding to an incident. Typical workflow:
  • Start from a domain or IP found in a malware sample or phishing kit
  • Pivot through DNS records, subdomains, ASN, and linked IPs (depending on available providers)
  • Check for associated usernames or email addresses in leak data
  • Set up monitoring on active domains to track infrastructure changes (Pro and Advanced plans)
Key features: Domain and IP modules, map view, monitoring, leaked results, JSON export

HR and background verification

A recruiter or HR professional running a pre-hire check or verifying a candidate’s stated identity. Typical workflow:
  • Search a name or known username to find associated social profiles
  • Check an email address for breach exposure or mismatched account activity
  • Verify that contact details provided by the candidate correspond to a consistent digital footprint
Key features: Pseudonym and email searches, registered accounts panel, profile pictures
Background checks must comply with local employment and data protection laws. Osintly data is for context only and is not a substitute for certified screening services.

Fraud investigator and financial analyst

An analyst tracking fraud, money flows, or a suspicious counterparty in a business transaction. Typical workflow:
  • Trace a cryptocurrency wallet involved in a fraud report or ransom payment
  • Run a domain search on a company to surface WHOIS history, subdomains, and infrastructure age
  • Search key personnel emails for breach exposure or linked accounts
  • Export findings as a structured report for internal review or legal counsel
Key features: Cryptocurrency module, domain overview, email breach records, export (PDF/DOCX/JSON)

Individual user

Someone running a one-off check: verifying a contact met online, checking their own exposure, or investigating a suspicious message. Typical workflow:
  • Search a username to see what accounts are linked to it
  • Check an email address to see if it appeared in known data breaches
  • Verify that a phone number or domain is what it claims to be
Key features: All input types (provider coverage varies by plan), quickstart guide, search history

Next steps