Investigation Tutorials

How to Trace an Anonymous Troll or Scammer (IP Tracking Links)

You keep getting harassing messages on Instagram from a blank profile. Or a scammer is texting your phone, pretending to be the IRS. You cannot...

How to Investigate Cash App & Venmo Accounts (Financial OSINT)

You are trying to buy concert tickets or a piece of furniture on Facebook Marketplace. The seller seems friendly, but when it is time...

How to Find Hidden Data in PDFs & Word Docs (Free Document OSINT)

You just received an email with a PDF attached. It looks like an official invoice from "PayPal" or "Geek Squad" saying you owe $499....

How to Track a Crypto Wallet (Free Blockchain OSINT)

"Crypto is anonymous."That is the biggest lie in finance. In reality, Bitcoin and Ethereum are pseudonymous. The user's name is hidden, but their transaction...

How to Track a Ship or Yacht in Real-Time (Free Marine OSINT)

You are standing on the coast, watching a massive cargo ship disappear over the horizon. Or perhaps you are waiting for an international delivery...

How to Track a Plane in Real-Time (The “Uncensored” Guide)

You hear a low-flying helicopter hovering over your neighborhood. Or maybe you see a private jet landing at a small airport and wonder who...

How to View Deleted Websites & Tweets (Free OSINT Tools)

You are investigating a scam, and suddenly-poof. The website goes offline. The Twitter account is suspended. The incriminating Facebook post is deleted.Most people think...

How to Find Who Owns a Website (Even If It’s “Private”)

You found a suspicious website. Maybe it's a crypto investment platform, a fake news blog, or an online store with "too good to be...

Don't miss

Hardware Security Keys vs. Authenticator Apps (The Ultimate 2FA Defense)

If you read our breakdown on Why SMS 2FA...

Why SMS Two-Factor Authentication (2FA) is Dangerously Insecure (SIM Swapping Explained)

You finally took your digital security seriously. You stopped...

The Best Password Managers for OPSEC (Local vs. Cloud Storage)

As we covered in our breakdown of how credential...

Stop Reusing Passwords: How Credential Stuffing Actually Works

When the average person pictures a cyberattack, they imagine...