> [!info] > Input: [[Username|username]] > Output: [[Social Media Account|personal accounts]] > > Types: [[Behavioural Weakness|behavioural]], [[Technical Weakness|technical]] > Weakness: [[SOWEL-8. Using Nicknames]] > Functionality: [[SOFL-11. Links and Personal Pages]] ### Explanation People tend to choose memorable nicknames and reuse them — for personal branding, habit, or simply because remembering one handle is easier than juggling many. As a result, the same or a clearly derived nickname often appears across many unrelated platforms, and this becomes a powerful pivot for an investigator: a single known username can unlock a person's broader online footprint. How **namecheckers** work, on the fingers: 1. The investigator feeds a username (taken from one already-known account) into a tool such as Maigret, Sherlock or WhatsMyName. 2. The tool sends an HTTP request to each platform's personal-page URL or user-lookup endpoint — `https://github.com/<username>`, `https://twitter.com/<username>`, `https://reddit.com/user/<username>` and so on — and inspects the response. 3. If the platform returns a valid profile rather than a 404 / "user not found", the username is reported as registered there. Some tools additionally extract bio, avatar URL, registration date or location from the response. 4. The output is a list of platforms where the username exists — ready for manual verification, since an identical nickname does not guarantee the same person behind it. When the technique works best: - Long, distinctive nicknames — low chance of namesake collisions. - Targets with weak OPSEC who never deliberately varied their handles. - Old or early-career accounts created before the user became privacy-aware (these often survive on forgotten platforms). Limitations: - Common handles ("alex", "john123") yield mostly noise; collisions need to be pruned manually with secondary signals — avatar, bio, friends, posting times. - Privacy-aware targets vary their handles per platform or generate them randomly. - A hit only proves the username exists, not that it belongs to the same person; cross-checks are still required. Don't forget that **email addresses are also accounts** — in email systems — and they tend to follow the same reuse patterns (with the exception of work mail). The same logic feeds neatly into [[SOTL-6.1. Check Logins Reuse to Find Another Account]] with tools like holehe and mailcat. ### Examples - [The Google Search That Took Down Ross Ulbricht](https://www.vice.com/en/article/3dkjny/the-google-search-that-took-down-ross-ulbricht) — IRS agent Gary Alford traced the username "altoid", used in early Silk Road promotional posts on bitcointalk.org, back to a forum post where Ulbricht reused the same handle and listed a Gmail address containing his real name. A canonical case of identity recovery via a single reused nickname. - [If You're Running an Illicit Drug Site, Maybe Don't Use Your Real Email](https://www.vice.com/en/article/irs-found-accused-silk-road-masterminds-email-by-googling-silk-road/) — additional reporting on the "altoid" trail and the OPSEC failures it exposed - [How Unique and Traceable are Usernames?](https://arxiv.org/pdf/1101.5578.pdf) — research on the entropy of usernames and how often the same handle reappears across services - [OSINT Username Generation Guide](https://github.com/soxoj/username-generation-guide) — patterns and rules people follow when picking and varying usernames ### Tools - [Maigret](https://github.com/soxoj/maigret) — CLI application searching accounts by username across ~3000 sites and extracting additional account information - [Sherlock](https://github.com/sherlock-project/sherlock) — well-known CLI application searching accounts by username across ~400 sites - [WhatsMyName](https://whatsmyname.app/) — web application searching accounts by username across ~600 sites - [OSINT Namecheckers List](https://github.com/soxoj/osint-namecheckers-list) — curated list of namecheckers and related username-lookup tools ### See also - [[SOTL-6.1. Check Logins Reuse to Find Another Account]] - [[SOTL-8.2. Use Names Permutations]] - [[SOTL-8.3. Use Personal-Info-Based Identifiers]]