Circular chain connecting social media logos, camera, email, profile, username, and image icons

How to Do OSINT on Yourself (Self-Audit Guide)

spyboy's avatarPosted by

If someone wanted to learn about you using only public data… what would they find?

Running OSINT on yourself is one of the most effective ways to understand your real digital footprint. It shows what’s visible, what’s linkable, and where small details combine into a bigger picture.

This guide gives you a practical, step-by-step self-audit you can run in under an hour—and a deeper workflow if you want to go further.


What a Self-OSINT Audit Actually Does

You’re not “hacking” anything. You’re:

  • Searching what’s publicly accessible
  • Correlating small data points
  • Verifying how easily your identity connects across platforms

The goal:

See yourself the way an outsider would—without assumptions.


The Audit Framework (Simple View)

Identifiers → Discovery → Correlation → Verification → Cleanup

We’ll walk through each stage with exact actions.


Step 1: List Your Identifiers (Start Points)

Write down everything that can point to you:

  • Full name (and common variations)
  • Usernames (current + old)
  • Email addresses (personal/work/old)
  • Phone numbers
  • Profile photos

These are your entry points.


Step 2: Search Your Name (Baseline Discovery)

Start with the obvious:

Use Google Search

Try queries like:

"Your Full Name"
"Your Name" + city
"Your Name" + username

What to look for

  • Social profiles
  • Old mentions (forums, comments)
  • PDFs or documents
  • Cached pages

Tip: Check beyond the first page of results.


Step 3: Search Your Usernames

Usernames are often reused.

Search:

"yourusername"

What this reveals

  • Old accounts you forgot
  • Forum activity
  • Gaming or niche profiles

This is one of the fastest ways to map your online presence.


Step 4: Check Your Email Exposure

Your email is a central identifier.

1) Search it directly

"youremail@example.com"

2) Check breach exposure with

Have I Been Pwned

What to note

  • Which services were involved
  • Approximate timeline

This doesn’t mean compromise—it shows where your email exists publicly.


Step 5: Reverse Image Search Your Photos

Upload your profile photos to:

  • Google Images
  • Yandex Images

What to check

  • Same image on other platforms
  • Variations (cropped, filtered)
  • Old accounts using the same photo

Images often connect accounts faster than names.


Step 6: Audit Your Phone Number (If Public)

If you’ve ever shared your number:

  • Search it in quotes:
"+91XXXXXXXXXX"
  • Check how it appears in apps like
    Truecaller

Look for

  • Listings or ads
  • Labels associated with your number
  • Old posts/screenshots

Step 7: Check Your Social Media Footprint

Go platform by platform:

  • Instagram
  • Facebook
  • LinkedIn
  • X (Twitter)

Review:

  • Bio information
  • Tagged locations
  • Old posts
  • Friend lists (if public)
  • Linked accounts

Ask:

“What can someone infer from this alone?”


Step 8: Analyze Your Photos (Beyond Reverse Search)

Open your own images and look closely.

Check for:

  • Street signs
  • Shop names
  • House numbers
  • Landmarks
  • Reflections (mirrors, glass, screens)

Even small details can reveal location or habits.


Step 9: Look for Old Accounts

This is where many people get surprised.

Search:

  • Old usernames
  • Old emails
  • Platforms you used years ago

Common places:

  • Forums
  • Blogging sites
  • Comment sections
  • Gaming platforms

Old accounts often have:

  • Weak privacy settings
  • Outdated information

Step 10: Map Your Identity Connections

Now connect what you found.

Example:

Username → Instagram → Profile Photo → LinkedIn → Real Name → Company

What to look for

  • Direct links (same email, same username)
  • Indirect links (same image, same writing style)

This is how correlation works.


Step 11: Identify Your Exposure Points

By now, you should see patterns.

Common exposure points:

  • Same username everywhere
  • Public email or phone number
  • Reused profile photos
  • Linked social accounts
  • Old inactive profiles

Mark these—they’re your highest-impact risks.


Step 12: Clean Up Your Footprint

Now take action.

Quick wins:

  • Delete or deactivate old accounts
  • Remove public phone/email from profiles
  • Change usernames where possible
  • Update privacy settings
  • Replace reused profile photos

You don’t need to erase everything—just reduce linkability.


Advanced Self-Audit (Optional)

If you want to go deeper:

  • Search your name in different formats (initials, nicknames)
  • Check document/file results (PDF, DOC searches)
  • Analyze cached pages
  • Look at who tags or mentions you frequently

Real-World Example

Scenario

A person audits themselves and finds:

  • Old forum account with same username
  • Forum profile uses same photo
  • Photo links to Instagram
  • Instagram links to LinkedIn

Result

Full identity chain built in minutes:

Forum → Photo → Instagram → LinkedIn → Real Identity

After cleanup:

  • Forum account removed
  • Photos changed
  • Profiles decoupled

Exposure significantly reduced.


Self-Audit Checklist (Quick Version)

Use this:

  • Search your name
  • Search your usernames
  • Search your email
  • Check breach exposure
  • Reverse search your photos
  • Audit your social profiles
  • Look for old accounts
  • Map connections
  • Clean up key exposure points

Key Takeaways

  • Your online footprint is larger than you think
  • Small data points become powerful when combined
  • Self-OSINT shows what others can see
  • Reducing connections is more important than removing everything

FAQ

What is OSINT on yourself?

It’s the process of using publicly available information to analyze your own digital footprint.


Why should I do a self-audit?

To understand what information about you is visible and how it can be connected.


How long does it take?

A basic audit can take 30–60 minutes. A deeper one may take a few hours.


Do I need special tools?

No. Basic tools like search engines and image search are enough to start.


What is the biggest risk found in audits?

Reused usernames, public contact info, and linked profiles across platforms.


Final Thoughts

Most people don’t realize how visible they are online—until they look.

A self-OSINT audit doesn’t require advanced skills. It requires curiosity and attention to detail.

Once you see how your data connects, you gain something valuable:

The ability to control your own digital footprint.

Run this audit once. Then revisit it every few months.

Because on the internet, what’s visible today… often stays visible tomorrow.


Discover more from Spyboy blog

Subscribe to get the latest posts sent to your email.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.