How to Find Accounts by Email in 2026 (8 Methods)

Find accounts by email using 8 free and paid methods. Holehe, Google dorks, HIBP, and more - step-by-step guide to uncover linked profiles.

9 min readProspeo Team

How to Find Accounts by Email: 8 Methods That Work

A long-time internet user typically has 100-200+ online accounts. Power users push past 400. And every "free lookup" site promising to find accounts by email follows the same script: animated progress bar, fake suspense, paywall. That experience is garbage.

What actually works is combining multiple free methods - each one catches accounts the others miss. We've tested these extensively, and combining 3-4 methods gets you around 60-80% coverage. No single tool finds everything. Anyone claiming otherwise is selling you something.

If you're here because you received a threatening email with your real name and home address: that's almost certainly a sextortion scam built from recycled data-broker records and old breach data. Don't pay. But do audit your exposure using the methods below.

What You Need (Quick Version)

  • Best free automated tool: Holehe - 120+ sites - 120+ sites, open-source, runs from your terminal
  • Best free breach check: HaveIBeenPwned - 962 breached sites - 962 breached sites, 17.5B+ pwned accounts as of early 2026
  • Best free manual method: Google dorks (copy-paste templates below)
  • Best paid OSINT tool: Epieos - 140+ services, EUR29.99/mo
  • Honest expectation: no single method finds everything. Combining 3-4 methods gets you to roughly 60-80% coverage.
Overview of 8 methods to find accounts by email with coverage and cost
Overview of 8 methods to find accounts by email with coverage and cost

Free Methods to Discover Linked Accounts

These eight methods cost nothing and, used together, will uncover the majority of accounts tied to any email address.

1. Holehe - Automated Enumeration

Holehe is open-source, runs in your terminal, and checks 120+ sites by analyzing password reset behavior. Two commands and you're running:

How Holehe checks password reset flows to detect accounts
How Holehe checks password reset flows to detect accounts
pip3 install holehe
holehe email@domain.com

The output is clean: each site gets a [+] (account exists), [-] (no account), or [x] (rate-limited/unknown). Scans finish fast and often surface forgotten accounts you didn't know existed.

Holehe only catches sites with exploitable password reset flows, and some platforms have patched this enumeration vector. For Gmail addresses specifically, GHunt is worth running alongside it - it pulls Google-account signals like reviews and Maps contributions that Holehe can't access. If you need a deeper walkthrough of existence checks, see check if an email exists.

2. Google Dorks - Search the Public Web

Google indexes more than you think. These exact-match searches find forum posts, leaked spreadsheets, cached profiles, and PDF documents where an email appears in the wild.

Copy these and replace with your target email:

  • "email@domain.com" - any public page mentioning the exact address
  • "email@domain.com" filetype:pdf OR filetype:xlsx - documents where the email was embedded (conference attendee lists, invoices, org charts)
  • site:github.com "email@domain.com" - Git commits, README files, and config files with the email hardcoded
  • site:pastebin.com "email@domain.com" - paste sites for leaked credentials or data dumps

The document search is the one most people skip, and it's often the most revealing.

Don't stop at live results. Plug any discovered usernames or profile URLs into the Wayback Machine to recover deleted or changed content. For Reddit specifically, pullpush.io can surface historical posts and comments, including content that's no longer visible. These archive tools are how OSINT professionals reconstruct digital footprints that someone tried to erase.

3. Password Recovery Confirmation

This is the manual version of what Holehe automates. Go to any platform's "Forgot Password" page, enter the email, and read the response. "We've sent a reset link" means the account exists. "No account found" means it doesn't.

It works on platforms Holehe can't reach - especially smaller or newer services. Important ethical boundary: don't automate this process, don't click any reset links that arrive, and don't attempt to access the account. You're confirming existence, nothing more. If you're doing this specifically for Gmail, use this guide to check if a Gmail account exists.

4. Username Pivoting

Your email's local-part - the bit before the @ - is often a username the person reuses everywhere.

For example, alex.photo@gmail.com gives you alex.photo. Run that through IDCrawl (idcrawl.com/u/alex.photo), which checks many major platforms in one pass: Instagram, TikTok, YouTube, Reddit, and more. Also try variations like alexphoto, alex_photo, and alex-photo. Namechk and InstantUsername check hundreds of platforms simultaneously for broader coverage.

The hit rate depends on how unique the username is. john.smith produces noise. Anything distinctive tends to find real matches quickly.

5. Contact Syncing Trick

Here's the thing - I'd argue this is the most underrated method on the entire list. Add the target email to your phone's contacts. Then open apps that sync your contact list: VSCO, BeReal, Snapchat, TikTok, Venmo, Telegram, and Duolingo all do this.

Apps that reveal accounts through contact syncing
Apps that reveal accounts through contact syncing

If the email is registered on any of these platforms, the associated profile shows up in your "People You May Know" or "Find Friends" section. Venmo is particularly revealing because many profiles and transactions are public by default. This method catches accounts that no automated tool will find, because it relies on the platform's own contact-matching infrastructure rather than password reset flows.

6. Gravatar Discovery

Gravatar ties a profile to the MD5 hash of an email address. Many WordPress-based sites automatically pull Gravatar images, which means the email owner's photo, display name, website, and bio can be publicly accessible without them realizing it.

Generate the MD5 hash of the email and query Gravatar via the hash-based URL. If a profile exists, you'll get a photo, a display name, and often a personal website link. Run a reverse image search on the Gravatar photo - it can uncover profiles the person never linked to that email.

7. HaveIBeenPwned - Breach Discovery

HaveIBeenPwned indexes 962 breached websites and over 17.5 billion compromised accounts as of early 2026. Enter any email and you'll see which breaches it appeared in - which effectively tells you which services that email was registered on.

This isn't just a security tool. It's an account discovery tool. That Canva breach from 2019? Now you know the email had a Canva account. The LinkedIn breach? Account confirmed. HIBP won't tell you about services that haven't been breached, but it fills in a massive chunk of the picture.

Set up "Notify Me" alerts for the email address. Future breaches will automatically reveal accounts you didn't know existed.

8. Email Header Analysis (Advanced)

This method is for investigating suspicious emails rather than general account discovery. In Gmail, open the email, click the three dots, and select "Show Original." Look for Received: lines showing the email's routing path and X-Originating-IP headers that can reveal the sender's approximate location.

Use MXToolbox to parse headers if you don't want to read raw SMTP data. This is most useful for verifying whether a threatening email actually came from who it claims - spoofed emails show mismatches between the From: address and the Return-Path or SPF/DKIM results. If you want to go deeper on authentication checks, see How to Verify DKIM Is Working and these SPF Record Examples.

How to Audit Your Own Email

If you're auditing your own digital footprint, the platforms themselves will tell you what's connected.

Step-by-step checklist to audit your own email accounts
Step-by-step checklist to audit your own email accounts

Google: Go to your Google Account > Security > "See all connections" under "Your connections to third-party apps & services." This shows every app you've authorized via "Sign in with Google" - and you can revoke access on the spot.

Microsoft: My Profile > Privacy > App Access. Same concept - see what's connected and cut what you don't recognize.

Yahoo: Account Info > Recent Activity > "View all connected apps."

Social logins: Check connected apps in Facebook (Settings > Apps and Websites), Instagram (Settings > Apps and Websites), and X/Twitter (Settings > Security and Account Access > Apps and Sessions).

Saved passwords: Open Chrome > Settings > Passwords and search for your email address. Every saved login is a confirmed account. If you've been using a password manager or browser autofill for years, this is essentially a complete registry of your accounts.

A warning about "automated" audit services: Tools like Mine (SayMine) promise to scan your inbox and find every account. They require full inbox access to work. If you're trying to reduce risk, handing a third party read access to your entire email history is a tradeoff worth thinking hard about. Stick with the manual methods above.

Even combining all of these, you'll miss accounts where you used a different email, signed up without a social login, or registered years ago on a service that's since been acquired. The 60-80% coverage estimate holds even for self-audits.

Prospeo

These OSINT methods find accounts linked to an email. But when you need the reverse - verified emails for decision-makers - Prospeo delivers 143M+ emails at 98% accuracy. No fake progress bars, no paywalls for garbage data.

Find any professional's verified email for $0.01. No guesswork.

Free methods get you far, but paid tools add breadth and speed.

Paid vs free tools comparison for finding accounts by email
Paid vs free tools comparison for finding accounts by email
Tool Best For Price Coverage Key Limitation
Epieos Broad OSINT lookup EUR29.99/mo (30 requests) 140+ services Weak on phone lookups
Prospeo B2B email ID Free (75/mo); ~$0.01/email 300M+ pro profiles Built for work emails
SEON Fraud/risk teams Enterprise pricing 300+ platforms No individual pricing
Social Catfish People search Not transparent Broad but vague Paywall funnel
Lampyre Power OSINT users $89/mo Deep Steep learning curve
Mailmeteor Quick free check Free, no sign-up Limited Shallow results
Orbitly One-off lookups First lookup free Moderate Thin coverage beyond basics

Let's be honest: most people reading this don't need a paid tool at all. Holehe + HIBP + Google dorks will find 80% of what any paid service returns. The paid tools earn their keep only if you're doing this at scale or need results in under five minutes.

The elephant in the room: Social Catfish ranks well for "free reverse email lookup" queries, but the "free" part funnels you into a paywall after the scan animation. Skip it.

Epieos is the most practical paid option for personal OSINT. Free access is limited to a couple of modules, but the EUR29.99/mo Osinter plan gives you 30 full-access requests per month across 140+ services. It doesn't log your queries and doesn't notify the target. The consensus on r/OSINT is that the results can be thin for some emails - which tracks with our experience - so treat it as a supplement to free tools, not a replacement.

SEON is trusted by over 5,000 organizations and is built for fraud prevention teams running email risk scoring at scale. If you're an individual auditing your own accounts, it's overkill.

Identifying the Person Behind a Work Email

Everything above works for personal email investigation. But if you've got a work email - say, j.smith@acme.com from a lead form or a conference badge - and need to identify the person for sales or recruiting, OSINT tools are the wrong approach entirely.

The free tier gives you 75 lookups per month with no credit card required. Paid plans run about $0.01 per email. If you're in sales or recruiting and you're trying to identify the human behind a work email, this is the fastest path. For more options, compare email ID finder tools and broader email search tools.

Prospeo

You just learned 8 ways to map an email to its linked accounts. Sales teams use Prospeo to go the other direction - mapping target companies to verified contact data across 300M+ profiles with 30+ filters like buyer intent, tech stack, and job changes.

Stop searching manually. Pull verified emails and direct dials in seconds.

How to Reduce Your Email Footprint

Once you've mapped your exposure, shrink it.

Delete unused accounts. If you haven't logged into a service in two years, delete the account entirely - don't just uninstall the app. Use email aliases going forward. Apple's Hide My Email, Firefox Relay, and SimpleLogin generate unique addresses that forward to your real inbox. One alias per service means a breach on one platform doesn't expose your primary email.

Unique passwords everywhere. A password manager like 1Password or Bitwarden makes this painless. Reusing passwords is how a single breach cascades across dozens of accounts. Enable 2FA on everything that matters. Authenticator apps over SMS. Hardware keys if you're serious.

Opt out of data brokers. Services like DeleteMe submit removal requests to Spokeo, WhitePages, BeenVerified, and similar aggregators. This is where sextortion scammers get your home address. And check HIBP periodically - set up the "Notify Me" alert and actually read the emails when they arrive.

FAQ

Can I find every account linked to my email?

No. Combining Holehe, Google dorks, HaveIBeenPwned, and platform self-audits typically uncovers 60-80% of accounts. The rest sit on platforms that don't expose registration status through any publicly accessible method - no tool can reach them.

Using publicly available tools like Google, HIBP, and Gravatar is generally legal in most jurisdictions. Password recovery enumeration and contact syncing exist in a gray area - use them only for authorized purposes. Automated probing can violate the CFAA or GDPR depending on your location and intent.

Will the person know I searched their email?

Most methods - Google dorks, HIBP, Holehe, Epieos - don't notify the target. Password recovery attempts are the exception: some platforms send a notification email to the account holder when a reset is requested, even if you never click the link.

What's the best free reverse email lookup tool?

Holehe checks 120+ sites from your terminal in seconds and is completely open-source. Pair it with HaveIBeenPwned for breach-based discovery and Google dorks for public web mentions. That three-tool combo covers more ground than most paid services charging $30+/month.

B2B Data Platform

Verified data. Real conversations.Predictable pipeline.

Build targeted lead lists, find verified emails & direct dials, and export to your outreach tools. Self-serve, no contracts.

  • Build targeted lists with 30+ search filters
  • Find verified emails & mobile numbers instantly
  • Export straight to your CRM or outreach tool
  • Free trial — 100 credits/mo, no credit card
Create Free Account100 free credits/mo · No credit card
300M+
Profiles
98%
Email Accuracy
125M+
Mobiles
~$0.01
Per Email