How to Find Who Owns a Website (Even If It’s “Private”)

You found a suspicious website. Maybe it’s a crypto investment platform, a fake news blog, or an online store with “too good to be true” prices.

You want to know who is running it.

You probably already tried a standard “Whois” lookup and saw the dreaded message: “Redacted for Privacy” or “GDPR Masked.” Most people give up there.

Professional investigators don’t. Just because the owner is hidden today doesn’t mean they were hidden yesterday. Here is how to bypass the privacy shield and find the real owner of a website.

Method 1: Whoxy (The Time Machine)

Most scammers buy a domain and immediately turn on “Privacy Protection.” But sometimes, they forget to turn it on for the first few days, or they owned the domain for years before deciding to use it for a scam.

Whoxy lets you see the History of the domain.

How to use it:

  1. Go to Whoxy.com.
  2. Enter the domain name (e.g., suspicious-site.com).
  3. Scroll down to “Whois History.”

The Trick: Look for records from 1 or 2 years ago.

  • Current Record: “Data Redacted, Iceland.”
  • 2022 Record: “Registered to: John Smith, Ohio.”
  • Gotcha: The owner is likely the same person; they just turned on privacy later.

Method 2: BuiltWith (The “Fingerprint” Search)

If the name is hidden, look at the code.

Scammers often run networks of 50+ websites. They use the same templates, the same ad accounts, and the same analytics codes on all of them.

How to use it:

  1. Go to BuiltWith.com.
  2. Enter the domain.
  3. Look for the “Relationship Profile” or “Connected Websites” tab.

What it reveals: It will show you every other website that uses the same Google AdSense ID or Google Analytics ID.

  • Example: You search FakeCrypto.com. BuiltWith tells you it shares an ID with JohnsPersonalBlog.com.
  • Now you have a name.

Method 3: ICANN Lookup (The Official Check)

Before you do the deep dives, always run a quick official check. Sometimes scammers are lazy and leave their real phone number in the registration data.

How to use it:

  1. Go to lookup.icann.org.
  2. Enter the domain.
  3. Scroll down to “Contact Information.”

What to look for: Ignore the “Registrant Name” (it will likely say “Privacy Inc”). Look at the Tech Contact or Admin Contact. Sometimes the owner hides their personal name but leaves their real email address in the “Tech” field for billing purposes.

Summary: The “Privacy Bypass” Checklist

Step Tool Goal
1. The Quick Check ICANN Lookup See if they were lazy and left data public.
2. The Time Machine Whoxy See who owned it before privacy was turned on.
3. The Tech Map BuiltWith Find other websites connected to the same owner.

The Bottom Line

“Privacy Protection” is not a magic shield. It only hides the current data. By looking at the History (Whoxy) and the Code (BuiltWith), you can usually find the person behind the screen.

Once you have a name or email, use our Reverse Email Guide to finish the investigation.

Also Read

Editorial Team
Editorial Teamhttps://theintelhub.com
The Intel Hub Editorial Team is a collective of cybersecurity analysts, tech researchers, and privacy advocates. We are dedicated to providing clear, fact-checked intelligence on the latest digital threats, OSINT techniques, and personal security tools. Our mission is to make the internet safer for everyone.

Related

How Dark Web Criminals Get Caught (OPSEC Failures & OSINT)

The Dark Web promises ultimate anonymity. By using the...

How to Track Ransomware Gangs on the Dark Web (Threat Intelligence OSINT)

You see the headlines every week: A major hospital...

The Best Dark Web Search Engines (Top 5 Onion Tools)

You successfully installed the Tor Browser. You see the...

How to Trace an Anonymous Troll or Scammer (IP Tracking Links)

You keep getting harassing messages on Instagram from a...

How to Investigate Cash App & Venmo Accounts (Financial OSINT)

You are trying to buy concert tickets or a...