Bellingcat's Online Investigation Toolkit
  • About
  • Most Used
  • New Tools
  • ⚒️Categories
    • Maps & Satellites
      • Maps
      • Satellite Imagery
      • Street View
    • Geolocation
    • Image/Video
      • Reverse Image Search
      • Facial Recognition
      • Metadata
      • Misc
    • Social Media
      • Discord
      • Facebook
      • Instagram
      • LinkedIn
      • Reddit
      • Telegram
      • Tiktok
      • Twitter/X
      • Vkontakte
      • Youtube
      • Other Networks
      • Multiple Networks
      • International
    • People
    • Websites
    • Companies & Finance
    • Conflict
    • Transport
    • Environment & Wildlife
    • Archiving
    • Data Organization & Analysis
  • 📖Resources
    • Guides & Handbooks
    • Education
    • Newsletters & Toolkits
    • Stay Safe
  • More
    • All Tools
      • 4plebs
      • 527 Explorer
      • About Maps and Satellites
      • ACLED
      • AllTrails
      • Apollo Mapping
      • Apple Maps
      • Archive.today
      • Atlos
      • Auto Archiver
      • AutoStitch
      • Azure AI Video Indexer
      • Baidu Maps
      • Bellingcat OpenStreetMap Search
      • Bing Maps
      • Blackbird
      • Blender
      • Bluesky Insights
      • BskyFollowFinder/Bluesky network analyzer
      • BskyThreadReader
      • Bulletpicker.com
      • CAT UXO
      • China-related resources
      • Chronotrains
      • CITES Trade Database
      • Companies House
      • Convert Geographic Units
      • Datawrapper
      • DeHashed
      • DiscordLeaks
      • Distill.io
      • DomainTools Whois Lookup
      • Earth Explorer
      • Earth Online
      • EDGAR Suite
      • EDGAR
      • Equasis
      • Etherscan
      • EU consolidated corporate registers
      • ExifTool
      • F4Map
      • FaceCheck.ID
      • FlightAware
      • Flightradar24
      • Forensically
      • GeoHints
      • Gephi
      • Ghunt
      • Global Fishing Watch Map
      • Global Forest Watch
      • Global Monitoring System - ECOSOLVE
      • Global Suppliers Online
      • Google Earth Engine
      • Google Earth Pro
      • Google Flood Hub
      • Google Lens
      • Google Maps
      • GovMap
      • GPSJam
      • Have I Been Pwned
      • Hitta.se
      • Hoaxy
      • Hugin
      • Hunchly
      • ICANN Lookup
      • ICIJ Offshore Leaks Database
      • ImportGenius
      • ImportYeti
      • Index Database
      • Instagram Location Search
      • Instant Data Scraper
      • Intelx.io
      • InVID
      • KartaView
      • Leak-Lookup
      • License Plate Maps
      • LittleSis
      • Liveuamap
      • Logseq
      • Lumen
      • Maigret
      • Maltego Graph
      • MapChecking
      • Mapillary
      • MapSwitcher
      • MarineTraffic
      • Meta Content Library
      • MW Geofind
      • Name Variant Search
      • Namechk
      • NASA Firms
      • NASA Worldview
      • NeutrOSINT
      • North Data
      • Obsidian
      • OCCRP Aleph
      • Open Measures
      • Open Ownership
      • Open Source Munitions Portal
      • OpenCorporates
      • OpenSanctions
      • OpenSecrets
      • OrbTrack
      • Osint Tools Map
      • Overpass Turbo
      • PeakVisor
      • Picuki
      • PimEyes
      • Pinpoint
      • PixPlot
      • Planet Labs
      • QGIS
      • Quick geolocation search
      • Radar Interference Tracker
      • RAWGraphs
      • RootAbout
      • RuPEP
      • SanctionsExplorer
      • satellites.pro
      • Search by Image
      • Sentinel Hub Playground
      • ShadeMap
      • Shadow Finder
      • ShadowMap
      • Sherlock
      • Skopenow
      • SkyFi
      • Snap Map
      • Strava
      • Suncalc
      • Telegago
      • Telegram Group Joiner
      • Telegram Phone Number Checker
      • TelegramDB
      • Telemetrio
      • Telemetry
      • Telepathy
      • Tencent Maps
      • TGStat
      • The Information Laundromat
      • TinEye
      • TrueCaller
      • TruffleHog
      • Twitter Advanced Search
      • Twitter Location Search
      • Twitter Video Downloader
      • Umbra Space
      • UN Comtrade Database
      • UNOSAT Analyses
      • Uwazi
      • VesselFinder
      • Wayback Machine
      • Web Archives
      • What CMS
      • WhatsMyName
      • Who posted what?
      • Whoxy
      • Wikimapia
      • Wikipedia list of registers
      • WildEye
      • Wildlife Trade Portal
      • xIFr
      • Yandex Maps
      • Zotero
Powered by GitBook
On this page
  • Description
  • Using Search for Open Source Investigations
  • Using WHOIS for Open Source Investigations
  • Cost
  • Level of difficulty
  • Requirements
  • Limitations
  • Ethical Considerations
  • Guides and articles
  • Tool provider
  • Advertising Trackers

Was this helpful?

Edit on GitHub
Export as PDF
  1. More
  2. All Tools

DeHashed

A platform that maintains a database of compromised credentials, with a newly-launched web domain registration search tool.

Last updated 25 days ago

Was this helpful?

URL

Description

DeHashed has compiled a searchable database of leaked personal information and sensitive data, and launched its web domain registration search tool in April 2025.

The platform now operates across four service lines:

  • Search: DeHashed's original offering, Search allows users to search through billions of records, including names, email addresses, usernames, IP addresses, physical addresses, phone numbers, vehicle identification numbers, and web domains.

  • Monitoring: Its new Monitor function alerts users in the event that their personal data, such as email addresses, is leaked. The free subscription allows for 10 monitor tasks.

  • API: Users can integrate the Dehashed API into their own applications.

  • WHOIS: The newly-launched WHOIS database allows users to search through web domain registration information, including historical data.

DeHashed is ostensibly designed for individuals and companies to detect and monitor data breaches in real time, but its Search and WHOIS offerings also be effectively used for open source research.

You can search by domain or field, increase or decrease the number of results displayed, use wildcard characters, run regex searches (a form of advanced searching that looks for specific patterns) and mix operators (e.g. email and username together).

DeHashed publishes a detailed search guide , explaining how to search by field, use wildcard characters, or search a specific data origin. The platform also published a list of its data sources , and has a FAQ page .

Using Search for Open Source Investigations

For example, you can use DeHashed to help search for someone who is trying to conceal their identity.

You can start by running an email address through DeHashed to identify accounts your subject maintains, along with the passwords associated with those accounts (do not try to log in to any person's account, this is unethical!). You can then go back to the DeHashed search engine and run a new search for that password, which may identify a whole new set of accounts and email addresses that use the same password. That way, you might be able to find out whether your subject is operating under an alias name or email address, all the while using and recycling the same passwords.

You might also find IP addresses and location-specific accounts that can help you start spotting patterns and clues as to your subject's location or activities.

Pay attention to their usernames and passwords. Do they contain numbers that could represent dates of birth? Or the name of the city they live in?

Record any relevant results and data points as you go to map out a subject's online footprint. How many usernames, email addresses, IP addresses are they linked to? What do these tell us about their online activities, interestes, location etc.?

Step-by-step guide on how to use Search

The search engine is extremely simple to use and user-friendly. You can run a keyword search either by field or across all fields:

If you search by, say, email address, you will get a list of various data points associated with that email, including names and passwords. You can then run more searches against, for example, the names and passwords you identified during your original search with a view to finding more accounts and generating fresh research leads.

It is free to search if you set up an account with just an email and password, but you need a paid subscription to actually view the results. See below for pricing information.

Using WHOIS for Open Source Investigations

WHOIS databases can help you understand who is behind a website. There are two main contexts/ways you can approach this:

  1. Run a search against a domain name to find out more information about the identities of the individuals or companies that have registered a website.

  2. Run a search against an individual or organisation to find out if they run any websites.

Step-by-step guide on how to use WHOIS

Search by domain name, keyword, IP address or other domain-related information. The different categories are in the screenshot below, and the search engine will prompt you with the type of information you need to enter for each category.

There are two main ways you can search:

  • The name of the domain (website) by using the WHOIS tab to find out current registration information, or the WHOIS History tab to retrieve information regarding previous owners or changes in ownership over the past ten years;

  • Any information you might have about the owner, ranging from name and physical address to their email address and phone number, by using Reverse WHOIS.

You will need to purchase credits to run a search.

Cost

You can use Search for free, but you need to purchase a subscription to view the results.

To use WHOIS, you need to buy credits.

Level of difficulty

Requirements

You have to create an account to run searches. This is relatively easy and requires only an email address and password.

Limitations

DeHashed aggregates leaked data and is not a comprehensive repository of every email address, username etc. in existence. If you can't find a data point in DeHashed, it doesn't mean that it doesn't exist.

Ethical Considerations

Consider the ethical and legal implications of analysing and using leaked user data in your research. Carefully consider and decide whether to use this data in keeping with the nature and purpose of your work. Does the end justify the means? Also consider potential legal regulations in your country and industry.

Guides and articles

Tool provider

Not so clear. The website's privacy policy suggests that DeHashed is registered to an address in Las Vegas, Nevada.

Advertising Trackers

Page maintainer

Ana

The current pricing information for each one of its four offerings can be found (click 'Purchase').

This YouTube provides a great demonstration of how to use DeHashed creatively to generate new research leads. NB: it uses the old version of the platform, but the research tips are still valid.

https://dehashed.com/
here
here
here
here
video
Screenshot 1. Search interface.
Screenshot 2. You need a paid subscription to view results.
Screenshot 3. WHOIS interface.
Screenshot 4. Search pricing.
Screenshot 5. WHOIS pricing.