LAGIC
Lead Audience Growth Intelligence Computing
H

Holehe Email Osint — OSINT | Lagic

Built For

Find out where an email address is registered across 120+ online platforms.

Curated by Lagic·Verified working

Configure Agent

Email address to check across 120+ platforms

Show only platforms where email is registered

Skip platforms that use password recovery detection (adobe, mail.ru, odnoklassniki, samsung)

Maximum time to wait for each platform check

Results to deliver

800 credits

This agent actively searches live listings — results may vary. You are only charged for what is delivered, up to this number.

Lagic Proxy

Country auto-rotated. Need a specific region? Contact support.

Pricing

8 credits per result
✓ 30 free credits on signup✓ Refund if 0 results✓ No card required

Sample Data Preview

A list of all platforms where the email address is registered.A list of all platforms that were checked and did not have an account with that email.A list of platforms that blocked the check due to rate limits.A summary count of accounts found, errors, and total platforms checked.The original email address provided for the search.For each platform, a detailed result including the check method and status (exists, rate-limited, etc.).
contact@...contact@...Value...390contact@...Value...
contact@...contact@...Value...578contact@...Value...
..................
Exports as:CSVXLSXJSON

Overview

Enter an email address to scan over 120 websites and services, identifying where accounts exist. Use it to map a digital footprint, conduct security research, or perform initial due diligence.

This tool systematically checks an email address against more than 120 popular online platforms to determine where it has been used to register an account. It's a common first step in open-source intelligence (OSINT), security audits, and digital footprint analysis. ### Who is this for? Investigators, security researchers, and brand safety specialists use this to get a quick overview of a person's online presence. It helps answer questions like: What platforms does this person use? Where might their personal data be exposed? Is this email address associated with unexpected or risky services? ### How it works Instead of manually visiting each site's login or password-reset page, the tool automates the process. For each service in its database, it reports whether an account with the given email exists, doesn't exist, or if the check was blocked (rate-limited). The final output is a clean summary listing the platforms where the email was found, not found, or rate-limited, giving you a clear map of that email's usage across a significant portion of the web.

Key Capabilities

  • A list of all platforms where the email address is registered.
  • A list of all platforms that were checked and did not have an account with that email.
  • A list of platforms that blocked the check due to rate limits.
  • A summary count of accounts found, errors, and total platforms checked.
  • The original email address provided for the search.
  • For each platform, a detailed result including the check method and status (exists, rate-limited, etc.).
  • Perform a personal digital footprint audit: Enter your own email address to discover forgotten accounts or services you've signed up for over the years.
  • Conduct preliminary fraud investigation: Check a suspicious email from a customer or lead to see if it has a credible online presence on expected platforms.
  • Vet sources for journalistic investigations: Get an initial sense of a source's online activity and affiliations by seeing where their email is registered.
  • Map a company's public exposure: Check corporate email addresses to find out if they have been used on non-sanctioned third-party services, creating potential security risks.
  • Accelerate security and threat intelligence: For a given email of interest, quickly identify potential attack vectors or sources of information leakage.
  • Initial due diligence in recruitment: Check a candidate's professional email to see if it's associated with expected professional networks or any public red-flag services.

Field Dictionary

How To Run This Extractor

1

Enter the email address you want to investigate into the 'Email Address' field.

2

Decide if you want a clean report of only found accounts by leaving 'Only Show Used Accounts' enabled.

3

Optionally, enable 'Skip Password Recovery Methods' to avoid certain types of checks.

4

Run the tool to begin the scan across all 120+ platforms.

5

Review your results, which are categorized into lists of where the email was found, not found, or rate-limited.

6

Download the complete dataset as a JSON or CSV file for your records.

Frequently Asked Questions

Do I need any technical skills to use this?
No. You just need to provide an email address in the input field and run the tool.
In what format can I export the results?
Is it legal to check someone's email like this?
Can I check a list of emails at once?
What does 'rate-limited' mean in the results?
Why would I want to skip password recovery methods?
How fresh is the data?
Is this suitable for client work at my agency?
How accurate are the results?
Can I schedule this to run automatically?