Mapping online identities
Connect aliases, breached data, and behavioural markers across platforms.
Identity mapping is the process of connecting disparate pieces of information to build a comprehensive profile of an individual or entity online. This involves correlating usernames, email addresses, phone numbers, and behavioral patterns across multiple platforms.
This tutorial will teach you how to pivot from a single data point (like a username or email) to discover associated accounts, leaked credentials, and patterns of behavior that reveal a person's digital footprint.
You'll learn privacy-respecting investigative techniques used by journalists, researchers, and security professionals to understand online identities.
Sherlock
Hunt down social media accounts by username across 300+ platforms
Find in directory →Holehe
Check if an email is used on different sites like Twitter, Instagram, etc.
Find in directory →Have I Been Pwned
Check if email addresses appear in known data breaches
Find in directory →Maltego
Map relationships between identities, domains, and infrastructure
Find in directory →- 1
Start with a single identifier (username, email, phone number, or name)
- 2
Search for the username across social media platforms using automated tools
- 3
Check if the email appears in data breaches or on compromised credentials databases
- 4
Identify connected email addresses through password reset flows (ethically)
- 5
Look for username reuse patterns and variations across platforms
- 6
Analyze profile pictures using reverse image search
- 7
Document behavioral patterns (writing style, interests, timezone activity)
- 8
Map all findings in a visual graph to identify connections and overlaps
- 9
Cross-reference information to verify accuracy and avoid false positives
Start broad with username searches, then narrow down to confirmed accounts
Look for consistent patterns: same profile picture, bio format, or interests
Check for numbered variations of usernames (e.g., john_doe, john_doe1, john_doe23)
Use Wayback Machine to see historical profile information
Pay attention to unique identifiers like custom URLs or specific phrases
Always verify connections through multiple data points
Respect privacy laws and ethical boundaries in your investigations
Document your methodology and sources for transparency
Be aware of false positives - common usernames may belong to different people
Use data breach information responsibly and ethically
Share your own tips or learn from the community's experience
Share Your Tip
I've found that combining multiple reverse image search engines in parallel significantly improves results. Don't rely on just one!
Always document your methodology step-by-step. This helps with reproducibility and explaining your findings to others.