15 Best OSINT Tools for Investigations in 2026

The global OSINT market reached $12.7 billion in 2025, with projections hitting $133.6 billion by 2035 (Global Market Insights, 2025). That growth reflects a simple reality: investigators, journalists, and security teams need better tools to sift through an ever-expanding volume of public data. Picking the right open source intelligence tools can cut investigation time from days to minutes.

For more details, see automate your tooling.

See also: dark web OSINT tools.

Reverse IP lookup is essential for IP investigation tools.

If you're short on time, here's the quick answer. The five best OSINT tools in 2026 are Espectro (best all-in-one platform, 200+ correlated sources), Maltego (best for link analysis), SpiderFoot (best open source OSINT framework), Shodan (best for infrastructure reconnaissance), and theHarvester (best free CLI tool for email and domain intelligence). Each one serves a different investigation type. The full ranked list below covers 15 tools with pricing, pros, cons, and a side-by-side comparison table.

Key Takeaways

  • Espectro, Maltego, SpiderFoot, Shodan, and theHarvester lead the 2026 rankings across different investigation types.
  • The OSINT market is growing at 26.7% CAGR through 2035 (GMI, 2025).
  • Free tools like Sherlock, Maigret, and Google Dorks remain effective for focused tasks.
  • Cross-source correlation, not raw source count, separates professional OSINT from basic lookups.

What Makes a Good OSINT Tool?

Organizations using AI-augmented security tools shortened the average breach lifecycle by 108 days compared to those without automation (IBM Cost of a Data Breach Report, 2024). The same principle applies to OSINT: the best tools automate collection and correlation so investigators can focus on analysis. But not all OSINT software is built equal.

We've evaluated dozens of OSINT tools over the years for different investigation workflows. Five criteria consistently separate strong tools from weak ones. Source coverage matters, obviously, but it's not the whole story.

Source coverage and data types

A useful OSINT tool should handle multiple input types: email, username, phone, domain, and IP address. Single-purpose tools work well for quick checks, but investigations rarely involve just one data point. The tools that rank highest on this list support at least three input types from a diverse range of sources.

Correlation and enrichment

Raw data is noise. Correlation is signal. The best open source intelligence tools don't just tell you "this email exists on 12 platforms." They connect those platforms to associated usernames, phone numbers, breach records, and social profiles. That cross-referencing is what transforms a list of hits into actionable intelligence.

Accuracy and false positive handling

A tool that returns 500 results with 60% false positives wastes more time than it saves. Strong OSINT software includes verification layers, confidence scoring, or content-based filtering to reduce noise. This is especially critical for username and email searches, where common strings generate massive false positive rates.

Usability and output formats

Can a non-technical investigator use it without training? Does it export to formats your team actually needs, like CSV, JSON, or PDF reports? Some of the most powerful OSINT frameworks have steep learning curves that limit adoption. We've weighted usability in our rankings because a tool nobody on your team uses is worthless.

Pricing and access model

The OSINT tools landscape spans from completely free and open source to enterprise platforms costing $10,000+ per year. We've included tools across this entire spectrum. Price doesn't always reflect quality, and several free tools outperform paid alternatives in specific use cases.

How we ranked these tools: Each tool was evaluated on source coverage (25%), correlation capability (25%), accuracy (20%), usability (15%), and value for money (15%). We tested all 15 tools between January and April 2026. Rankings reflect real investigation performance, not marketing claims.

The 15 Best OSINT Tools (2026)

With 5.56 billion internet users worldwide as of early 2026 (DataReportal, 2026) and billions of data points scattered across social media, breach databases, DNS records, and public registries, the right OSINT tool is the difference between finding a needle in a haystack and finding nothing. Here are the 15 best OSINT tools, ranked.

1 Espectro

Best for: All-in-one investigations Price: Free tier / Pro from $29/mo Sources: 200+

Espectro searches over 200 open sources from a single query, accepting email, username, phone, CPF, CNPJ, and domain inputs. What sets it apart from most OSINT software is automatic cross-source correlation. Instead of returning a flat list of "found" or "not found," it maps connections between accounts, breach records, and public registries. The free tier provides full functionality with limited monthly searches.

Pros

  • 200+ correlated sources in one search
  • No installation required (web-based)
  • Supports email, username, phone, domain, CPF/CNPJ
  • Automatic cross-referencing of results

Cons

  • Newer platform, smaller community than Maltego
  • Advanced features require paid plan
  • No visual graph analysis (yet)

2 Maltego

Best for: Link analysis and visual graphing Price: Free CE / Pro from $999/yr Sources: 80+ transforms

Maltego is the industry standard for OSINT link analysis. Its visual graph interface maps relationships between people, organizations, domains, IPs, and documents. With over 80 data transforms from providers like Shodan, VirusTotal, and Have I Been Pwned, it's the go-to OSINT framework for complex network investigations. The Community Edition is free but limits graph size and transform access.

Pros

  • Industry-leading visual link analysis
  • 80+ data transforms from third-party APIs
  • Used by law enforcement and intelligence agencies

Cons

  • Steep learning curve
  • Pro version is expensive ($999+/yr)
  • Requires Java, can be resource-heavy

3 SpiderFoot

Best for: Automated reconnaissance Price: Free (open source) / HX from $500/yr Sources: 200+ modules

SpiderFoot automates the collection of OSINT data from over 200 modules, covering everything from DNS and WHOIS records to social media profiles and dark web mentions. The open source version runs locally via a web interface. SpiderFoot HX is the hosted commercial version with additional features. It's one of the most comprehensive free OSINT frameworks available.

Pros

  • 200+ modules, fully open source
  • Web-based UI, no CLI required
  • Strong domain and infrastructure scanning

Cons

  • Setup requires technical knowledge
  • Can be slow with all modules enabled
  • Less effective for person-focused investigations

4 Shodan

Best for: Internet-connected device scanning Price: Free tier / Membership $49 / Enterprise custom Sources: Global internet scans

Shodan indexes every internet-connected device it can find, from servers and webcams to industrial control systems. It's not a people-search tool. It's the search engine for the Internet of Things. Security researchers use it to find exposed databases, open ports, and vulnerable infrastructure. Shodan scans over 1,500 ports across the entire IPv4 address space weekly.

Pros

  • Unmatched infrastructure reconnaissance
  • API access for automation
  • Real-time monitoring and alerts

Cons

  • No person or social media searches
  • Free tier is very limited (no filters)
  • Can expose sensitive infrastructure if misused

5 theHarvester

Best for: Email and domain enumeration Price: Free (open source) Sources: 20+ (search engines, DNS, APIs)

theHarvester is a Python-based tool that collects email addresses, subdomains, IPs, and URLs from public sources like Google, Bing, LinkedIn, and DNS servers. It's been a staple of OSINT and penetration testing for over a decade. Simple to run, fast, and effective for domain reconnaissance. It won't build a person profile, but for domain and email enumeration, few free tools match it.

Pros

  • Fast and lightweight
  • Excellent for domain recon and email harvesting
  • Active open source development

Cons

  • CLI only, no graphical interface
  • Limited to email/domain data types
  • Results depend on search engine API limits

6 Recon-ng

Best for: Modular web reconnaissance Price: Free (open source) Sources: 50+ marketplace modules

Recon-ng brings a Metasploit-style modular framework to OSINT. Investigators load modules from a marketplace, configure API keys, and run automated reconnaissance workflows. It handles contact harvesting, domain enumeration, credential exposure checks, and geolocation lookups. The modular design means you install only what you need.

Pros

  • Highly modular and extensible
  • Built-in database for storing results
  • Familiar interface for penetration testers

Cons

  • Requires API keys for most useful modules
  • No GUI, terminal-only
  • Documentation could be more thorough

7 OSINT Framework

Best for: Curated OSINT resource directory Price: Free (web-based) Sources: 500+ linked tools and resources

OSINT Framework isn't a tool in the traditional sense. It's a curated, interactive directory of OSINT resources organized by category: usernames, email addresses, domain names, IP addresses, social networks, geolocation, and more. Think of it as a bookmarks library built by the OSINT community. It links to over 500 individual tools and websites, making it an excellent starting point for any investigation.

Pros

  • 500+ categorized OSINT resources
  • No installation, runs in browser
  • Excellent for discovering new tools

Cons

  • Directory only, doesn't run searches itself
  • Some links outdated or broken
  • No automation or correlation features
Why does tool selection matter? According to the SANS Institute (2024), 93% of digital forensics and incident response professionals report using OSINT tools in their investigations. Yet 47% say they spend more time switching between tools than actually analyzing data. Choosing an integrated OSINT platform, or building a focused toolkit, eliminates that friction.

8 Sherlock

Best for: Username enumeration Price: Free (open source) Sources: 400+ social platforms

Sherlock checks whether a username exists across 400+ social media platforms and websites. Run sherlock username and it tests each platform via HTTP requests, returning direct links to discovered profiles. It's fast, widely used, and the most popular username enumeration tool in the OSINT community. Results export to CSV, JSON, and XLSX.

Pros

  • 400+ platforms, fast scanning
  • Simple one-command usage
  • Large community, frequent updates

Cons

  • No false positive filtering
  • Username only, no email or phone
  • No correlation with other data types

9 Maigret

Best for: Deep username analysis Price: Free (open source) Sources: 2,500+ platforms

Maigret started as a Sherlock fork and evolved into a substantially more powerful tool. It scans 2,500+ platforms, includes built-in false positive detection via content analysis, and generates HTML reports with profile screenshots. It also extracts metadata like account creation dates and last activity timestamps where available. Coverage is unmatched for username searches.

Pros

  • 2,500+ platforms, widest coverage
  • Built-in false positive detection
  • Detailed HTML reports with screenshots

Cons

  • Full scans take 3-10 minutes
  • Resource-intensive
  • CLI only, less beginner-friendly

10 Intelligence X (IntelX)

Best for: Historical and dark web data Price: Free tier / Pro from $2,000/yr Sources: Billions of archived records

IntelX archives data from the surface web, dark web, and leaked datasets. It indexes paste sites, court records, WHOIS history, public documents, and breach data. The search API accepts emails, domains, URLs, Bitcoin addresses, and more. Its historical data coverage makes it valuable for tracing digital footprints that have been deleted elsewhere.

Pros

  • Historical and dark web data access
  • Powerful search API
  • Unique archived content not found elsewhere

Cons

  • Expensive for full access ($2,000+/yr)
  • Free tier has strict daily limits
  • Can surface ethically sensitive data
OSINT Tool Source/Module Coverage (2026) 0 500 1,000 1,500 2,000 2,500 Maigret 2,500+ OSINT Frmwk 500+ Sherlock 400+ SpiderFoot 200+ Espectro 200+ corr. Maltego 80+ transforms Recon-ng 50+ modules theHarvester 20+ sources Source: Official documentation for each tool, 2025-2026. "corr." = correlated sources (cross-referenced, not just checked).
Maigret leads in raw platform coverage, while Espectro and SpiderFoot prioritize correlated and modular intelligence.

11 Social Links

Best for: Enterprise social media analysis Price: Custom (enterprise pricing) Sources: 500+ social and web platforms

Social Links is an enterprise-grade OSINT platform that integrates with Maltego and offers its own SL Professional interface. It specializes in deep social media analysis, including facial recognition, geolocation extraction, and network mapping across 500+ platforms. Law enforcement and intelligence agencies are its primary customers. It's powerful but priced beyond most individual investigators.

Pros

  • Deep social media analysis capabilities
  • Maltego integration
  • Facial recognition and geolocation

Cons

  • Enterprise pricing (not public)
  • Overkill for individual investigators
  • Requires dedicated training

12 Holehe

Best for: Email-to-account enumeration Price: Free (open source) Sources: 120+ platforms

Holehe checks whether an email address is registered on 120+ platforms, including Twitter, Instagram, Spotify, Adobe, and dozens more. It works by attempting password reset or login flows without actually accessing accounts. It's a focused, single-purpose tool that does one thing exceptionally well. Perfect for determining where an email address has been used to create accounts.

Pros

  • 120+ platforms checked per email
  • Fast and lightweight
  • Non-intrusive detection method

Cons

  • Email input only
  • Platforms patch detection methods over time
  • No account detail extraction

13 Dehashed

Best for: Breach data searches Price: From $5.49/mo Sources: 14+ billion records

Dehashed provides access to over 14 billion records from publicly known data breaches. Search by email, username, IP, name, phone, address, or VIN. Unlike Have I Been Pwned, which tells you if an email was breached, Dehashed shows the actual data associated with those breaches. It's a critical tool for understanding what's already exposed about a target.

Pros

  • 14+ billion searchable breach records
  • Multiple input types (email, phone, name, IP)
  • Affordable starting price

Cons

  • Ethical considerations around breach data
  • Data freshness varies by breach
  • API rate limits on lower plans

14 Google Dorks

Best for: Targeted search engine queries Price: Free Sources: Google's entire index

Google Dorks aren't a tool but a technique: using advanced search operators to find information Google indexes but doesn't surface in normal searches. Operators like site:, filetype:, inurl:, and intitle: can reveal exposed documents, login portals, configuration files, and directory listings. It's the oldest OSINT method and still one of the most effective.

Pros

  • Completely free, no tools needed
  • Access to Google's massive index
  • Surprisingly effective for finding exposed data

Cons

  • Requires knowledge of operators
  • Manual process, no automation
  • Google rate-limits aggressive queries

15 Censys

Best for: Certificate and host discovery Price: Free tier / Teams from $300/mo Sources: Global internet scans, certificate transparency logs

Censys scans the entire internet to map hosts, certificates, and software across IPv4 and cloud environments. Born from the same academic research (University of Michigan) that produced ZMap, it indexes TLS certificates, HTTP responses, and network protocols. It's particularly strong for discovering subdomains, expired certificates, and shadow IT assets. Censys and Shodan are complementary rather than competing tools.

Pros

  • Strong certificate transparency analysis
  • Clean, modern interface
  • Academic-grade scanning methodology

Cons

  • Teams plan is expensive ($300+/mo)
  • Infrastructure-only, no person searches
  • Free tier limits daily queries

OSINT Tools Comparison Table

With 3,158 publicly disclosed data breaches in the US alone during 2024 (Identity Theft Resource Center, 2025), investigators need tools that cover the widest possible range of data types. This comparison table shows which OSINT tools handle which input types, along with pricing and source coverage.

Tool Price Sources Email Username Phone Domain
Espectro Free / $29+ 200+ correlated Yes Yes Yes Yes
Maltego Free CE / $999+ 80+ transforms Yes Yes Yes Yes
SpiderFoot Free / $500+ 200+ modules Yes Yes Yes Yes
Shodan Free / $49+ Global scans No No No Yes
theHarvester Free 20+ sources Yes No No Yes
Recon-ng Free 50+ modules Yes Yes Yes Yes
OSINT Framework Free 500+ links Yes* Yes* Yes* Yes*
Sherlock Free 400+ platforms No Yes No No
Maigret Free 2,500+ platforms No Yes No No
IntelX Free / $2,000+ Billions archived Yes Yes Yes Yes
Social Links Enterprise 500+ platforms Yes Yes Yes Yes
Holehe Free 120+ platforms Yes No No No
Dehashed $5.49+/mo 14B+ records Yes Yes Yes Yes
Google Dorks Free Google index Yes Yes Yes Yes
Censys Free / $300+ Global scans No No No Yes

*OSINT Framework links to external tools rather than running searches directly. "Yes" indicates the tool category is covered by linked resources.

Free vs Paid OSINT Tools: Which Should You Choose?

Over 60% of OSINT professionals use a combination of free and commercial tools in their workflow, according to a 2024 survey by the SANS Institute (SANS, 2024). The "best" choice depends entirely on your investigation scope, technical skill level, and budget. Neither free nor paid tools are categorically better.

When free OSINT tools are enough

Free tools work well for focused, single-variable searches. Need to check where a username is registered? Sherlock handles that. Want to enumerate subdomains for a domain? theHarvester does it. Building a quick profile from an email address? Holehe plus a Google Dorks session covers the basics. For students, independent researchers, and journalists with limited budgets, the free toolkit described in this article provides genuine investigative capability.

The trade-off is time. Free tools don't correlate data between searches. You run Sherlock for usernames, Holehe for emails, theHarvester for domains, and then manually cross-reference the outputs. For a single investigation, that's manageable. For recurring casework, it becomes a bottleneck.

When paid OSINT software justifies the cost

Paid tools earn their price through three things: automation, correlation, and coverage. Maltego connects data points visually and pulls from 80+ sources in a single graph. Espectro cross-references 200+ sources automatically. IntelX provides access to historical and dark web data you simply can't get from free tools. If investigations are part of your job rather than an occasional task, the time savings from paid tools typically outweigh the subscription cost.

A practical approach: Start with free tools. Learn what each one does well. Identify which manual steps consume the most time in your workflow. Then invest in paid tools that automate specifically those steps. Don't buy a $999/year Maltego license if you only need username enumeration. Don't rely solely on Sherlock if your cases require multi-source correlation.

How Do You Choose the Right OSINT Tool?

The average cost of a data breach reached $4.88 million globally in 2024 (IBM, 2024). For security teams and investigators, choosing the wrong OSINT tools isn't just an inconvenience. It's a risk. The right tool depends on three factors: what you're investigating, your technical proficiency, and how often you run investigations.

Match the tool to the investigation type

Investigations fall into distinct categories, and each demands different tools. Person investigations (finding who's behind a username, email, or phone number) need platforms like Espectro, Sherlock, or Holehe. Infrastructure investigations (mapping a company's digital footprint, finding exposed servers) need Shodan, Censys, or SpiderFoot. Network analysis (tracing relationships between entities) needs Maltego or Social Links.

Ask yourself: what's your primary input? If it's usually an email address, prioritize tools with strong email-to-account enumeration. If it's a domain name, focus on infrastructure reconnaissance tools. If your inputs vary from case to case, an all-in-one platform like Espectro or a framework like SpiderFoot will serve you better than a collection of single-purpose tools.

Consider your team's technical level

Some of the best OSINT tools require command-line proficiency. Sherlock, Maigret, theHarvester, and Recon-ng all run from a terminal. If your team includes non-technical investigators, web-based tools (Espectro, Maltego, SpiderFoot HX) reduce the training burden. Don't underestimate this. A powerful tool that nobody on your team uses provides zero value.

Think about investigation frequency

Running one investigation per month? Free tools plus manual correlation work fine. Running five per week? The time you spend switching between tools and cross-referencing results will exceed the cost of a paid platform within the first month. We've found that investigators running more than two cases weekly save at least 40% of their research time by switching to an integrated platform.

Frequently Asked Questions

What is the best free OSINT tool in 2026?

For free OSINT investigations, theHarvester and Sherlock are the strongest starting points. theHarvester pulls emails, subdomains, and IPs from public sources like search engines and DNS records. Sherlock checks a username across 400+ platforms in under three minutes. Both are open source Python tools that run from the command line. For a no-install option, OSINT Framework provides a curated directory of 500+ free resources organized by data type.

Is it legal to use OSINT tools?

Yes, OSINT tools collect publicly available information, which is legal in most jurisdictions. The legality depends on how you use the data, not the collection itself. Accessing password-protected accounts, violating terms of service, or using data for harassment can create legal liability. Regulations like GDPR in Europe and CCPA in California also govern how personal data can be processed, even when publicly visible. Always consult local laws before conducting investigations.

What is the difference between OSINT tools and OSINT frameworks?

An OSINT tool performs a specific function, like Sherlock scanning usernames across 400+ sites or Shodan indexing internet-connected devices. An OSINT framework is a collection or platform that organizes multiple tools and data sources into a unified workflow. Maltego and SpiderFoot are frameworks because they integrate dozens of data sources with visual link analysis. Frameworks suit complex investigations. Individual tools handle focused tasks faster.

How many sources should a good OSINT tool cover?

Coverage depends on the investigation type. For username searches, 400+ platforms (Sherlock's range) is a practical minimum. For comprehensive person investigations combining email, phone, username, and domain data, 200+ correlated sources provides strong coverage. More sources aren't always better if the tool can't filter false positives or correlate findings across data types. Quality of correlation matters more than raw source count.

Can OSINT tools find deleted social media accounts?

Standard OSINT tools cannot find deleted accounts directly, since the profile URL returns a 404 error. However, cached versions may exist on the Wayback Machine (web.archive.org), and some breach databases retain data from accounts that have since been deleted. IntelX archives historical web content and can sometimes surface deleted profiles. Google cache may also preserve recent snapshots. The sooner you search after deletion, the higher the chance of finding cached data.

What OSINT tools do law enforcement agencies use?

Law enforcement commonly uses Maltego, Social Links, and Palantir for large-scale investigations. Maltego's link analysis and visual graphing make it popular for mapping criminal networks. Social Links integrates with Maltego and provides deep social media analysis. Many agencies also use open source tools like Sherlock, theHarvester, and SpiderFoot alongside commercial platforms. According to the SANS Institute (2024), over 80% of law enforcement digital investigators use at least one open source OSINT tool in their workflow.

Conclusion

The OSINT tools landscape in 2026 is broader and more capable than ever. With 5.56 billion internet users generating data across thousands of platforms (DataReportal, 2026), the demand for effective open source intelligence tools will only grow. The 15 tools in this guide cover every major investigation type, from username enumeration to infrastructure scanning to breach data analysis.

The pattern is clear. Free tools like Sherlock, theHarvester, and Google Dorks remain powerful for focused tasks. Paid platforms like Maltego, IntelX, and Espectro earn their cost through automation and correlation. The best investigators don't pick one tool. They build a toolkit matched to their most common investigation types, then invest in automation for the steps that consume the most time.

Whatever tools you choose, the principle stays the same: collect broadly, validate carefully, correlate across sources, and document everything. The tool is just the vehicle. The method is what produces results.

Try the #1 OSINT platform, 200+ sources, one search

Start free on Espectro