How to Find Who Owns a Website (Even If It’s “Private”)

Disclosure: We may earn a small affiliate commission if you purchase through our links, at absolutely no extra cost to you.
💡 Pro Tip for Investigators: When conducting OSINT research or clicking on potentially malicious links, never expose your real IP address. Threat actors can log your IP to find your general location and target your network.

Always route your traffic through a verified, no-log VPN. Our top-tested recommendations for serious OPSEC are NordVPN or ProtonVPN

You found a suspicious website. Maybe it’s a crypto investment platform, a fake news blog, or an online store with “too good to be true” prices.

You want to know who is running it.

You probably already tried a standard “Whois” lookup and saw the dreaded message: “Redacted for Privacy” or “GDPR Masked.” Most people give up there.

Professional investigators don’t. Just because the owner is hidden today doesn’t mean they were hidden yesterday. Here is how to bypass the privacy shield and find the real owner of a website.

Method 1: Whoxy (The Time Machine)

Most scammers buy a domain and immediately turn on “Privacy Protection.” But sometimes, they forget to turn it on for the first few days, or they owned the domain for years before deciding to use it for a scam.

Whoxy lets you see the History of the domain.

How to use it:

  1. Go to Whoxy.com.
  2. Enter the domain name (e.g., suspicious-site.com).
  3. Scroll down to “Whois History.”

The Trick: Look for records from 1 or 2 years ago.

  • Current Record: “Data Redacted, Iceland.”
  • 2022 Record: “Registered to: John Smith, Ohio.”
  • Gotcha: The owner is likely the same person; they just turned on privacy later.

If the name is hidden, look at the code.

Scammers often run networks of 50+ websites. They use the same templates, the same ad accounts, and the same analytics codes on all of them.

How to use it:

  1. Go to BuiltWith.com.
  2. Enter the domain.
  3. Look for the “Relationship Profile” or “Connected Websites” tab.

What it reveals: It will show you every other website that uses the same Google AdSense ID or Google Analytics ID.

  • Example: You search FakeCrypto.com. BuiltWith tells you it shares an ID with JohnsPersonalBlog.com.
  • Now you have a name.

Method 3: ICANN Lookup (The Official Check)

Before you do the deep dives, always run a quick official check. Sometimes scammers are lazy and leave their real phone number in the registration data.

How to use it:

  1. Go to lookup.icann.org.
  2. Enter the domain.
  3. Scroll down to “Contact Information.”

What to look for: Ignore the “Registrant Name” (it will likely say “Privacy Inc”). Look at the Tech Contact or Admin Contact. Sometimes the owner hides their personal name but leaves their real email address in the “Tech” field for billing purposes.

Summary: The “Privacy Bypass” Checklist

Step Tool Goal
1. The Quick Check ICANN Lookup See if they were lazy and left data public.
2. The Time Machine Whoxy See who owned it before privacy was turned on.
3. The Tech Map BuiltWith Find other websites connected to the same owner.

The Bottom Line

“Privacy Protection” is not a magic shield. It only hides the current data. By looking at the History (Whoxy) and the Code (BuiltWith), you can usually find the person behind the screen.

Once you have a name or email, use our Reverse Email Guide to finish the investigation.

Also Read

Editorial Team
Editorial Teamhttps://theintelhub.com
The Intel Hub Editorial Team is a collective of cybersecurity analysts, tech researchers, and privacy advocates. We are dedicated to providing clear, fact-checked intelligence on the latest digital threats, OSINT techniques, and personal security tools. Our mission is to make the internet safer for everyone.

Related

Why SMS Two-Factor Authentication (2FA) is Dangerously Insecure (SIM Swapping Explained)

You finally took your digital security seriously. You stopped...

The Best Password Managers for OPSEC (Local vs. Cloud Storage)

As we covered in our breakdown of how credential...

Stop Reusing Passwords: How Credential Stuffing Actually Works

When the average person pictures a cyberattack, they imagine...

The 5 Biggest OPSEC Failures on the Dark Web (How Users Get Tracked)

If you have followed our guides on using the...