The intelligence platform
built for the questions
you can’t un-ask.
Reveal what the public web already knows.
ShadowTrace orchestrates a fleet of OSINT engines into a single cinematic investigation — built for casual curiosity and operational rigor alike.
LON 73.9587° W
EDGES · 32 ACTIVE
Pick a thread. We pull on the rest.
Each channel is its own orchestrated worker fleet. The correlation engine stitches their output into a single identity graph — every finding traceable back to a public source.
Email Intelligence
Every email leaves a shadow.
Cross-reference an address against public breach datasets, platform registrations, and historical traces. Discover where an identity lives.
- Breach Exposure
- Linked Platforms
- Username Reuse
- Historical Traces
- Public References
Phone Intelligence
A number is an address with coordinates.
Carrier intelligence, geographic origin signals, and platform-presence correlation across messaging services.
- Carrier Intelligence
- Geographic Origin
- Messenger Presence
- Linked Identities
- Exposure Indicators
Username Intelligence
A handle is a fingerprint.
Sweep 200+ platforms for username reuse, account discovery, forum activity, and archived references.
- Platform Sweep
- Reused Aliases
- Forum Activity
- Archived References
- Profile Confidence
Identity Intelligence
A name is a network.
Build an identity graph from full-name + location signals. Surface aliases, related individuals, and professional footprint.
- Identity Graph
- Alias Discovery
- Relations Mapping
- Professional Footprint
- Social Surface
Image Intelligence
Every photograph remembers.
Extract EXIF metadata, reverse-image-match across the open web, and decode geolocation signals embedded in the frame.
- EXIF Metadata
- Reverse Match
- Geolocation Signals
- Platform Matches
- Camera Fingerprint
Social Profile Intelligence
A timeline is a confession.
Behavioral analysis across a public social profile — engagement patterns, posting cadence, identity correlations.
- Behavior Analysis
- Engagement Patterns
- Identity Correlation
- Timeline Activity
- Network Resolution
Domain Intelligence
Every domain has a paper trail.
WHOIS history, certificate transparency, subdomain enumeration, mail-auth posture, and Wayback footprints — the full operational intel on any internet-facing host.
- WHOIS / RDAP
- Certificate Transparency
- Subdomain Enum
- Mail-Auth Posture
- Wayback History
- Reputation
IP Intelligence
An address is a fingerprint at the wire level.
Geolocation, ASN ownership, abuse history, exposed services, and blacklist posture for any IPv4/IPv6 address.
- Geolocation
- ASN / Owner
- Reverse DNS
- Abuse History
- Threat Reputation
Company Intelligence
Every company is a mosaic of public filings.
Corporate filings, beneficial ownership, sanctions exposure, jurisdictional registrations, and digital footprint of any company by name.
- Corporate Filings
- Officers / Directors
- Sanctions Screening
- Wikipedia / News
- Domain Footprint
Crypto Wallet Intelligence
Every chain is a glass house.
On-chain analysis of a Bitcoin or Ethereum address: balance, transaction velocity, cluster attribution, sanctions match, and exchange exposure.
- Balance & Velocity
- Cluster Attribution
- Sanctions Match
- Exchange Exposure
- First / Last Activity
URL Intelligence
A link is the shortest path to a story.
Live security scan, screenshot capture, tech-stack identification, archive history, and threat reputation of any URL.
- Live Scan
- Screenshot
- Tech Stack
- Wayback History
- Threat Reputation
From input to dossier in under a minute.
- 01INTAKE
Choose a channel
Email, phone, username, identity, image, or social profile. One signal is enough to begin.
- 02ORCHESTRATE
The fleet wakes up
Isolated workers fan out across 200+ public-source endpoints in parallel.
- 03CORRELATE
Findings stitch together
The graph engine resolves aliases, scores confidence, and reconstructs identity.
- 04NARRATE
AI assembles the dossier
A premium intelligence narrative — executive summary, exposure score, full evidence trail.
Methodology you can stand behind.
ShadowTrace operates exclusively on public sources — open breach corpora, indexed social platforms, archived web, and registries that are publicly queryable. We do not bypass authentication, scrape behind paywalls, or use purchased private datasets.
Every finding is traceable back to its source. Every investigation is sealed to your account. We honor GDPR deletion requests within 72 hours.
Public-source only
Open datasets, indexed social platforms, archived web, public registries. No purchased private data.
No authentication bypass
We never scrape behind paywalls or login walls — even when technically possible.
Every finding is traceable
Each entry in the dossier links back to its public source. Audit trail end-to-end.
GDPR-aware by default
Subject deletion requests honored within 72 hours. Investigations encrypted at rest.
Use is logged
Misuse — harassment, stalking, unauthorized surveillance — terminates the account and is reported.
Pay per dossier. Or unlock the engine.
Single Dossier
One investigation. Full report. Yours forever.
- One full intelligence dossier
- Cinematic interactive view
- PDF export
- AI executive summary
- 90-day archive
Operative
The platform without limits, for active investigators.
- Unlimited investigations
- Continuous re-scan & alerts
- Cross-investigation graph
- Priority worker queue
- API access (10k req / mo)
Directorate
White-label intelligence at agency scale.
- White-label deployment
- Team collaboration & RBAC
- Audit logs · SSO · SCIM
- Dedicated worker pool
- Custom data sources & SLA