Username scanner (WhatsMyName)
Check where a username is registered across ~35 social, coding, gaming, and media sites. Useful for OSINT, brand-name recon, and privacy audits.
Find accounts by username
Checks a curated set of ~35 sites for a given username and reports where it's registered. Inspired by WhatsMyName. Lookups run through our Cloudflare Worker — we don't log the username you enter.
What this does
Takes a single username and sends a probe to ~35 popular sites — social networks, code-hosting platforms, creator-economy tools, gaming accounts — to determine whether an account with that username exists there. For each site we try to use a stable API endpoint; where none exists, we fall back to a known HTML marker.
The idea and site list are inspired by WhatsMyName (WebBreacher). We ship a smaller curated subset to stay within Cloudflare Workers’ free-tier subrequest limit; we can expand later with client-side batching.
Why a server-side proxy
Most of these sites either block cross-origin requests outright or require non-browser headers. A browser-only version would silently miss 90% of sites. Routing the fan-out through our Cloudflare Worker sidesteps CORS entirely and gives us one consistent place to apply safeguards.
Safeguards
- Turnstile human-check before every scan.
- Per-IP rate limit — 30 scans/minute.
- Username validation — only
[A-Za-z0-9_.-], 1–32 chars. - Per-site timeout — 6 seconds, response body capped at 200KB.
- No logging — we do not persist the username you enter, anywhere.
Interpreting results
| Status | Meaning |
|---|---|
found | The site confirmed an account with that username exists (matched expected code or string). |
not found | The site explicitly indicated no such account (matched missing code or string). |
unknown | Response didn’t match either signature — the site may have changed or is serving a challenge. |
error | Network timeout, DNS failure, or upstream 5xx. |
A “found” result confirms the username is taken there; it does not prove it’s the same person across sites. For true attribution you’d pivot through bios, avatars, and cross-references.
Use cases
- Brand & handle availability — before launching a new product or pseudonym, find where the handle is already claimed.
- OSINT / threat intelligence — pivot from a known handle in a leak or forum post to other public identities.
- Personal privacy audit — see where your own username exists and clean up accounts you’ve forgotten about.
- Security investigations — tie a suspect username across platforms during incident response.
Ethics
Use this to investigate yourself, protect your brand, or pursue authorised investigations. Don’t use it to harass, stalk, or dox people — that’s not what this is for.