Some capabilities - AI Analyst, monitoring, and part of the provider coverage - are only available on Pro and Advanced plans. Results reflect third-party sources and may be incomplete or outdated depending on the provider.
Journalist and fact-checker
A journalist verifying a source, investigating a claim, or tracing the origin of a piece of content. Typical workflow:- Search a pseudonym or username to verify whether an account is genuine or newly created
- Cross-reference an email address against breach records to assess credibility
- Trace a domain to identify who is behind an anonymous website or newsletter
- Use AI Analyst to summarize findings and build a timeline for a story
Cyber analyst and threat intelligence researcher
A CTI analyst investigating infrastructure, tracking threat actors, or responding to an incident. Typical workflow:- Start from a domain or IP found in a malware sample or phishing kit
- Pivot through DNS records, subdomains, ASN, and linked IPs (depending on available providers)
- Check for associated usernames or email addresses in leak data
- Set up monitoring on active domains to track infrastructure changes (Pro and Advanced plans)
HR and background verification
A recruiter or HR professional running a pre-hire check or verifying a candidate’s stated identity. Typical workflow:- Search a name or known username to find associated social profiles
- Check an email address for breach exposure or mismatched account activity
- Verify that contact details provided by the candidate correspond to a consistent digital footprint
Fraud investigator and financial analyst
An analyst tracking fraud, money flows, or a suspicious counterparty in a business transaction. Typical workflow:- Trace a cryptocurrency wallet involved in a fraud report or ransom payment
- Run a domain search on a company to surface WHOIS history, subdomains, and infrastructure age
- Search key personnel emails for breach exposure or linked accounts
- Export findings as a structured report for internal review or legal counsel
Individual user
Someone running a one-off check: verifying a contact met online, checking their own exposure, or investigating a suspicious message. Typical workflow:- Search a username to see what accounts are linked to it
- Check an email address to see if it appeared in known data breaches
- Verify that a phone number or domain is what it claims to be