Sherlock OSINT
Professional Investigation Platform
A comprehensive suite of 21+ Open Source Intelligence tools designed for cybersecurity professionals, penetration testers, and digital investigators. Gather, analyze, and visualize intelligence from publicly available sources.
OSINT Investigation Toolkit
Choose from our comprehensive collection of professional intelligence gathering and analysis tools. Each tool is designed for real-world OSINT operations.
OSINT Premium
Unlock the full potential: ad-free experience, Shodan PRO with tokens, and complete access to all investigation tools.
Username Analyzer
Find social media profiles for a specific username across hundreds of platforms using the Sherlock engine.
Email Analyzer
Analyze an email address to verify its existence, reputation, deliverability, and online presence across data sources.
Phone Analyzer
Gather intelligence on a phone number including carrier, line type, country of origin, and validity checks.
Domain Analyzer
Collect WHOIS data, DNS records, SSL certificate info, and validated subdomains for any domain name.
Port Scanner
Scan an IP address or domain to discover open ports and identify running services using Nmap engine.
Reputation Checker
Verify the reputation of IPs and domains against threat intelligence sources including VirusTotal and AbuseIPDB.
Metadata Extractor
Extract hidden EXIF data from images including GPS coordinates, camera details, timestamps, and software info.
Hash Analyzer
Identify hash types (MD5, SHA1, SHA256, bcrypt, etc.) and provide cracking resources and analysis.
Shodan Search
Discover internet-connected IoT devices, servers, and vulnerabilities using the Shodan search engine.
Google Dorking
Automated advanced Google Dork searches to discover sensitive information, exposed files, and login pages.
Bitcoin Analyzer
Complete Bitcoin address analysis with balance, transactions, privacy scoring, and risk assessment.
Email Forensics
Forensic analysis of email headers including routing path, SPF/DKIM/DMARC authentication, and spam detection.
Company Intelligence
Complete company analysis: geolocation, technologies, contact information, security posture, and risk scoring.
Intelligence Map
Interactive Maltego-style investigation map to visualize relationships between entities and connect OSINT findings.
BOE Search (Spain)
OSINT search in Spain's Official State Gazette: sanctions, appointments, insolvency proceedings, and official documents.
Data Breach Checker
Check if an email has been compromised in known data breaches and get risk assessment with recommendations.
IP Geolocation
Advanced IP address geolocation with ISP details, network info, VPN/proxy detection, and threat assessment.
MAC Address Lookup
Identify device manufacturer and type from MAC addresses with OUI database lookup and security analysis.
Subdomain Enumeration
Discover subdomains of a target domain using multiple sources with HTTP status verification and IP resolution.
Reverse Image Search
Search for matching images across the web using reverse image search engines. Upload a file or provide a URL.
Why Choose Sherlock OSINT?
Purpose-built for cybersecurity professionals who need reliable, fast, and comprehensive intelligence gathering capabilities.
Deep Intelligence Gathering
Analyze usernames across 350+ social platforms, verify email addresses, scan ports with Nmap, and query Shodan for internet-connected devices. Our tools dig deep into publicly available data sources to provide comprehensive intelligence.
Security-First Design
All investigations are conducted through secure HTTPS connections. We don't store your queries or results. Your research remains private. Built with responsible disclosure principles in mind.
Real-Time Analysis
Powered by real backend engines including Nmap for port scanning, Sherlock for username enumeration, and Shodan for device discovery. No simulated data — every result comes from live queries.
Professional Grade Tools
From email header forensics and Bitcoin address analysis to Google Dorking and company intelligence, every tool is designed to meet the demands of professional investigators and security researchers.
Comprehensive Coverage
21+ specialized OSINT tools covering identity research, network analysis, digital forensics, threat intelligence, blockchain analysis, and official document search. Everything you need in one platform.
Built for Teams
Intelligence Map feature lets you visualize relationships between entities in Maltego-style graphs. Connect findings across tools, export results as PDF, and collaborate on investigations.
What is OSINT and Why It Matters for Cybersecurity
Open Source Intelligence (OSINT) refers to the collection and analysis of information gathered from publicly available sources. In the cybersecurity landscape, OSINT has become an essential discipline for threat intelligence analysts, penetration testers, digital forensic investigators, and security researchers. Sherlock OSINT provides a professional-grade platform that combines 21+ specialized tools into a single, unified investigation suite.
Identity and Social Media Intelligence
The Username Analyzer tool leverages the Sherlock engine to search for a specific username across more than 350 social media platforms and websites simultaneously. This is invaluable for tracking digital footprints, identifying linked accounts, and building comprehensive profiles during investigations. Our Email Analyzer verifies email addresses, checks for disposable email services, evaluates deliverability, and cross-references against known data breaches. The Phone Analyzer extracts carrier information, line type identification, and geographic location data from phone numbers worldwide.
Network and Infrastructure Intelligence
For network reconnaissance, Sherlock OSINT offers a powerful Domain Analyzer that performs WHOIS lookups, DNS record enumeration, SSL certificate analysis, and subdomain discovery. The Port Scanner, powered by a real Nmap backend, identifies open ports and running services on target systems. Our Shodan Search integration queries the Shodan database for internet-connected devices, IoT systems, and potential vulnerabilities. The Subdomain Enumeration tool uses multiple sources to discover and validate subdomains, providing HTTP status codes and IP resolution for each finding.
Digital Forensics and Threat Intelligence
The Metadata Extractor reveals hidden EXIF data in images, including GPS coordinates, camera details, and software information that may be crucial for investigations. Email Forensics analyzes email headers to trace routing paths, verify SPF/DKIM/DMARC authentication, and detect potential phishing or spoofing attempts. The Reputation Checker queries multiple threat intelligence feeds including VirusTotal and AbuseIPDB to assess the risk level of IPs and domains. Our Hash Analyzer identifies hash types and provides cracking resources for security testing.
Advanced Investigation Tools
Google Dorking automates advanced search queries to discover exposed files, login pages, database interfaces, and sensitive information indexed by search engines. The Bitcoin Analyzer performs comprehensive blockchain analysis including balance verification, transaction history, privacy scoring, and risk assessment for Bitcoin addresses. Company Intelligence provides a complete profile of organizations including their technology stack, contact information, security posture, and risk scoring. The BOE Search tool enables OSINT queries against Spain's Official State Gazette for sanctions, appointments, and insolvency proceedings.
Security Assessment and Monitoring
The Data Breach Checker determines if email addresses have been compromised in known data breaches, providing risk assessments and actionable recommendations. IP Geolocation offers advanced mapping of IP addresses with ISP details, VPN/proxy detection, and threat level assessment. MAC Address Lookup identifies device manufacturers from hardware addresses using the IEEE OUI database, useful for network forensics and IoT device identification. The Reverse Image Search helps trace the origin and spread of images across the web.
Visualization and Reporting
The Intelligence Map provides a Maltego-style interactive graph visualization for connecting entities and relationships discovered during investigations. Create nodes for people, organizations, domains, and other entities, then draw connections to map out complex relationships. All investigation results can be exported for reporting and documentation purposes. Sherlock OSINT is designed to support the complete OSINT lifecycle from collection through analysis to dissemination.
Disclaimer: Sherlock OSINT is designed for legitimate cybersecurity research, penetration testing with authorization, and lawful investigations. Users are responsible for ensuring their use complies with all applicable local, national, and international laws and regulations. Unauthorized access to systems or data is illegal. Always obtain proper authorization before conducting security assessments.
Start Your Investigation
Access all 21 professional OSINT tools instantly. No registration required for core features.
Launch Tools