Search by mail

How to harvest the maximum information from the mail?

In this article I will tell you how to search by mail address. For example, I will use the mailing address of scammers.

Where to begin?
  • info @ – Example of regular mail. I highlighted the nickname and italicized the domain.


Usually we have a username , a domain, this is either a mail service like Gmail or, or this is the site of some organization that owns the mail itself. We can move on to examining the domain itself if it is an organization domain. About the study of sites, I will tell you later. After all, the essence of this article is the identification of the owner of an email address.

Checking mail for existence.

2ip – This is a service (Russian) that will check if an email address exists. Everything is simple. If there is no mail, the inscription “email does not exist” will appear, if the mail exists, the opposite result will come out accordingly.


Was mail used for other purposes?

To check mail for use for other purposes, we just need to google it. You can try using google dorks to improve your search performance.


By searching mail in search engines, we can find data such as phone numbers, related domains, identities and other interesting data.

View the shipping path.

All email clients have such a function as “view original”. This function may be called differently, but it will always be present. In fact, this is just viewing the path of the letter, we will see all the intermediate servers. It is worth viewing the original from the bottom to the top, since the bottom is the end point of the letter (recipient), and the top is the start point of the letter (sender).
You should pay attention to such fields as Authentication-Results, Return-Path, Return-SPF. By viewing the sending path, we can find out the address of the servers, the IP addresses of the servers, and possibly other mail addresses. I advise you to analyze the information received well, it is possible to write out the elements that are important to you.

Leaked passwords

Why do we need these leaked passwords, you ask. We are not going to brute someone, they are not even relevant.
Yes, we are not going to brute anyone and the passwords are really not relevant, but using the password you can access other accounts, possibly on social networks, or other emails. Services such as havibeenpwned, dehashed or even god’s eye are able to find leaked passwords, later using god’s eye or similar services, you can find out where else the password was used. And so go to other accounts.


I used the [email protected] mail as an example, and not the mail of our scammers, since I did not find the leaked passwords associated with it.

haveibeenemotet – This service will help us to find out if the mail has been hacked by “Emotet” malware. If the mail is compromised, we learn that the distribution is not on behalf of the owner of the email box.

Let’s convert email to phone.

email2phonenumber – This is a very interesting software that restores numbers using various services. The program uses the “Forgot password” function. She will restore the number on the maximum number of services and try to pick up the remaining digits.



In addition, you can analyze the nickname using @maigret_osint_bot and search engines, so you can go to other accounts. I also advise you to analyze the domain, if it is the domain of an organization, check the site using whois and other services, you can find all this, find all this on


If you can’t find anything, you can always use additional software like IPLogger. I will talk about such traps as IPLogger in the next article, so subscribe to our channel

  Posted by: @ESPYER


The Thrilling Adventure of Digital Sleuthing with IRBIS

In the rapidly expanding digital world, IRBIS stands out as a revolutionary online platform for gathering digital intelligence. It offers a host of powerful tools, including deep web searches, facial recognition, and social media analysis, making the process of uncovering hidden insights on the internet simple yet efficient. What sets IRBIS apart is its use of proxy server technology, exemplified by providers like This feature enhances privacy, speed, and access to geo-blocked content, making IRBIS an invaluable tool for both professionals and tech enthusiasts. Using IRBIS is akin to becoming a digital detective, equipped with a cutting-edge toolkit that makes the exploration of the online world an exhilarating experience.

Read More »

Unveiling the Power of Facial Recognition

Discover how the advanced facial recognition technology of Botodetective can revolutionize online investigations. With the ability to search for information about individuals using just their face picture, Botodetective offers a powerful tool for uncovering online presence and conducting thorough investigations. Dive into the world of AI-driven facial recognition and explore how this innovative technology is reshaping the landscape of online investigations. Unleash the potential of Botodetective and unlock a wealth of information with just a simple face picture. Stay ahead of the game and gain valuable insights into individuals’ online activities. Upgrade your investigative capabilities today with Botodetective’s facial recognition feature.

Read More »

Mystic Faces Revealed: Crack the Code of the Unknown with Facial Photo Search

Unleash the Epic Secrets: Master the Art of Discovery with

Are you curious to delve deeper into the lives of the people you encounter? With, you have the ultimate tool at your fingertips. This eye-catching article introduces the power of, an innovative platform that allows you to gather information about others based on phone numbers, names, email addresses, and even photos.

Discover the thrill of uncovering hidden truths about your date or satisfying your curiosity about someone you’ve crossed paths with on the street. Dive into the world of Irbis and witness its advanced facial recognition technology that can identify individuals and provide valuable insights.

Learn how to responsibly navigate this powerful tool and respect the privacy of others as you unlock the secrets that lie beneath the surface. Explore a world of endless possibilities, backed by a secure and encrypted environment.

Join us on this exciting journey and let become your guide in unraveling the mysteries that surround us. Unleash the epic secrets and master the art of discovery today!

Read More »

The Atypical OSINT Guide

This article explores the OffcierCia non-typical OSINT guide on GitHub, which is a library of materials for learning how to conduct open source intelligence (OSINT) investigations. The guide is intended for bored professionals and provides a wide range of unusual OSINT techniques and tools. The article covers the various sections of the guide, including immersive and gamified learning, training and practicing, external data, and more. It also includes a disclaimer that all information is for educational purposes only and based on public sources. The article aims to inform readers about this valuable resource for improving their OSINT skills.

Read More »

Revolutionize Your Instagram Game with AutoGPT-Social

Introducing AutoGPT-Social, an AI-powered tool designed to revolutionize your Instagram content strategy. By automatically generating eye-catching images, captions, and hashtags, this innovative bot optimizes posting schedules based on real-time feedback to maximize engagement. With customizable post frequency settings and automatic hashtag discovery, AutoGPT-Social simplifies content creation, helping you attract likes and followers with ease. To get started, visit the project’s GitHub page: Please use the bot responsibly and at your own risk.

#AutoGPTSocial #InstagramGrowth #AIContentGenerator #MaximizeEngagement

Read More »

Is Your Date Who They Say They Are?

This article highlights the importance of background checks not just for employers, but for individuals as well. It explains how background checks can be helpful for online dating, childcare, and renting out property. The article also mentions, a website that offers background check services with an easy-to-use platform and informative blog. The article emphasizes that conducting a background check can provide peace of mind and help make informed decisions about the people in your life.

Read More »