Star Computers

Username scanner (WhatsMyName)

Check where a username is registered across ~35 social, coding, gaming, and media sites. Useful for OSINT, brand-name recon, and privacy audits.

Find accounts by username

Checks a curated set of ~35 sites for a given username and reports where it's registered. Inspired by WhatsMyName. Lookups run through our Cloudflare Worker — we don't log the username you enter.

What this does

Takes a single username and sends a probe to ~35 popular sites — social networks, code-hosting platforms, creator-economy tools, gaming accounts — to determine whether an account with that username exists there. For each site we try to use a stable API endpoint; where none exists, we fall back to a known HTML marker.

The idea and site list are inspired by WhatsMyName (WebBreacher). We ship a smaller curated subset to stay within Cloudflare Workers’ free-tier subrequest limit; we can expand later with client-side batching.

Why a server-side proxy

Most of these sites either block cross-origin requests outright or require non-browser headers. A browser-only version would silently miss 90% of sites. Routing the fan-out through our Cloudflare Worker sidesteps CORS entirely and gives us one consistent place to apply safeguards.

Safeguards

  • Turnstile human-check before every scan.
  • Per-IP rate limit — 30 scans/minute.
  • Username validation — only [A-Za-z0-9_.-], 1–32 chars.
  • Per-site timeout — 6 seconds, response body capped at 200KB.
  • No logging — we do not persist the username you enter, anywhere.

Interpreting results

StatusMeaning
foundThe site confirmed an account with that username exists (matched expected code or string).
not foundThe site explicitly indicated no such account (matched missing code or string).
unknownResponse didn’t match either signature — the site may have changed or is serving a challenge.
errorNetwork timeout, DNS failure, or upstream 5xx.

A “found” result confirms the username is taken there; it does not prove it’s the same person across sites. For true attribution you’d pivot through bios, avatars, and cross-references.

Use cases

  • Brand & handle availability — before launching a new product or pseudonym, find where the handle is already claimed.
  • OSINT / threat intelligence — pivot from a known handle in a leak or forum post to other public identities.
  • Personal privacy audit — see where your own username exists and clean up accounts you’ve forgotten about.
  • Security investigations — tie a suspect username across platforms during incident response.

Ethics

Use this to investigate yourself, protect your brand, or pursue authorised investigations. Don’t use it to harass, stalk, or dox people — that’s not what this is for.