Investigation Guide

How to Find Someone's Secret Accounts

Last updated: March 2026

Secret accounts usually aren't as separate as people think. The email addresses, phone numbers, and usernames used to register them often appear in publicly available identity data. A people search report is the most practical starting point for surfacing that information.

Updated March 20269 minute readBy Brian Mahon
Advertiser Disclosure: PublicRecordsService.org may receive referral compensation from some of the services featured on this page. That does not change how we describe them, but it may affect placement and ranking.

Why secret accounts aren't as hidden as people think

Creating a separate account on a social platform, dating app, or messaging service feels private — a different email, a different username, a different persona. And to the casual observer it is private, because there's no obvious way to connect that account back to a real-world identity. The account isn't linked to anything you know about.

The gap in that reasoning is the registration infrastructure. Every account on every platform was created using something: an email address, a phone number, a username. Those credentials don't exist in a vacuum. Email addresses associated with a person's name can surface in publicly available data. Phone numbers listed under someone's identity appear in public records. Usernames, when they've been used publicly anywhere, can be indexed and associated with a real identity.

People search aggregators compile exactly this type of identity data — not what accounts someone has, but the credentials associated with their identity that could be used to locate those accounts. That's the practical approach to finding accounts that weren't meant to be found. For the broader context on online profile research, see our guide on finding someone's online profiles.

What a people search report surfaces

A background report from a people search aggregator draws from a wide range of publicly available data sources — voter registration, public filings, marketing databases, reverse phone directories, and publicly indexed web data. For identity research, the most useful sections are:

  • Email addresses — all addresses publicly associated with that person's name, not just the primary one
  • Phone numbers — all numbers listed under their identity, including ones you don't recognize
  • Usernames — handles that appear in publicly indexed data under their identity
  • Linked social profiles — accounts publicly indexed alongside their name
  • Associates — names and contacts frequently linked to their identity in public data

The key insight is that none of this requires access to anyone's account. It's publicly associated data — the kind of information that appears in public sources regardless of what anyone has shared with you directly. An email address used to register a separate account, if that email has ever appeared in a publicly indexed source under that person's name, may show up in a background report.

The core principle

A secret account is only as hidden as the credentials used to create it. If the email address, phone number, or username used for registration has ever appeared in publicly available data alongside that person's real identity, a people search report may surface it. That connection — between a real identity and its associated credentials — is what makes this type of research possible.

The username consistency pattern

One of the most reliably useful patterns in hidden account research is username reuse. People choose usernames based on things that are memorable to them — combinations of their name, a number, a word they like, an abbreviation they've used for years. The username someone creates for a "separate" account is frequently a variation of something they use elsewhere, because novel memorable usernames are harder to invent than people expect.

In practice: the username that appears in a background report under someone's identity — even if it looks unrelated to their known accounts — is worth checking across platforms. The same handle that appears in a public data source associated with their name may be their username on dating apps, messaging platforms, forums, or other services.

The email prefix extension of this pattern is particularly useful. If a background report surfaces the email [email protected] that you didn't know about, the string user_private is a likely username candidate on any platform that supports username-based profile access. Checking it directly at tinder.com/@user_private, or searching it across platforms using a username search tool, takes minutes. See our Tinder profile guide and dating profile guide for the platform-specific approaches.

How to follow up on what you find

Unknown email addresses

For each email address in a report that you don't recognize: check it against the major social and dating platforms using the account creation or forgot-password flow. These flows indicate whether an account is registered under that email without revealing any account details or requiring you to complete any sign-up. Search the full email address in a standard web search to see where it appears publicly. Check the prefix as a username on platforms that support username-based profile URLs.

Unknown phone numbers

Run each unfamiliar number through a reverse phone lookup to confirm carrier, region, and any public profile associations. Some platforms support account discovery by phone number — WhatsApp, Telegram, and certain dating apps allow finding a contact by number if the person has enabled that option. A number that appears in public data under someone's name but isn't a number you know about is worth investigating further.

Listed usernames

Search any username that appears in the report directly across platforms. Free tools like Sherlock (open source, command-line) and paid services like UserSearch.org allow you to check a single username across hundreds of platforms simultaneously. A username that appears in a background report under someone's identity and also appears on a platform they didn't mention to you is a meaningful connection.

Linked social profiles

Any social profile that appears in the report but that you weren't aware of is worth reviewing independently. Even if the profile appears innocuous on its own, connections, followers, and associated content may provide context. A public profile linked to someone's name in a background report but never shared with you is at minimum something worth understanding. See our guide on finding someone's social media accounts for the broader approach.

When public records help

What you find in the report How to follow up
Unfamiliar email address Account creation / forgot-password check on major platforms; prefix as username; web search for public appearances
Unfamiliar phone number Reverse lookup; phone-based account discovery on applicable platforms
Username in indexed data Direct platform URL check; cross-platform username search via Sherlock or UserSearch
Linked social profile you didn't know about Review profile independently; note connections, associated content, and posting history
Associate names you don't recognize Separate background search on the associate; cross-reference with known contacts

Background reports work best as a starting point, not a final answer. What they surface are the identity credentials — email, phone, username — that connect a real person to their accounts. The follow-up work, which is manual and platform-specific, is where the actual account picture emerges. See our public record search guide for context on what types of data appear in these reports more broadly.

Mistakes to avoid

  • Expecting the report to list accounts directly. People search reports compile identity credentials — emails, phones, usernames — not account inventories. The report is the research starting point; the account discovery happens through the follow-up steps.
  • Assuming a clean report means no hidden accounts. Not all registration credentials surface in public data. A secondary email address created recently on a provider that isn't indexed widely may not appear in any report. Absence in the report is not confirmation of absence.
  • Checking only platforms you already know about. If someone is keeping accounts separate, they're not using platforms they've mentioned to you. The follow-up check should cover the platforms you don't already have visibility into, not the ones where you can see their activity anyway.
  • Drawing conclusions from a single unfamiliar data point. Secondary email addresses have mundane explanations as often as not — old accounts, work addresses, sign-up addresses for services. The pattern across multiple unfamiliar identifiers is more reliable than any single item.

Best services to review first

For hidden account research, these are the two services I recommend reviewing first. The goal is the most complete picture of all email addresses, phone numbers, and usernames associated with a person's identity — which is what makes these services more useful here than services focused primarily on court records.

Service Why it helps Best fit
Instant Checkmate Aggregates the full range of identity data — email addresses, phone numbers, usernames, linked social profiles — in a single report. The breadth of identity data is what matters for this type of research. First report to pull for the most complete identity data picture
TruthFinder Draws from different sources in some cases and provides broad coverage of contact information and social profiles. Useful as a cross-check when the first report didn't surface specific identifiers. Second source when cross-checking or looking for identifiers that didn't appear in the first report

These services are not consumer reporting agencies and cannot be used for employment, tenant screening, insurance, credit, or other FCRA-regulated purposes.

Frequently asked questions

Can a background report show hidden social media accounts?

Not directly — background reports don't list accounts. What they surface is the identity data associated with a person — email addresses, phone numbers, usernames — that can then be used to locate accounts independently. An email address you didn't know about, or a username that appears in the report, may be the credential tied to accounts that were kept separate.

What makes username consistency useful for finding hidden accounts?

People tend to reuse memorable usernames across platforms, even when they intend an account to be separate. A username that appears in a background report under someone's identity — even one that looks unrelated to their known handles — is worth checking directly on platforms that support username-based profile access. The email prefix pattern extends this: the part of an unfamiliar email address before the @ is frequently the same string used as a username elsewhere.

Can I use these searches for jobs, housing, or insurance decisions?

No. The services discussed on this page are not consumer reporting agencies and the information here is not a consumer report. They should not be used for employment, tenant screening, insurance underwriting, credit, or any other purpose regulated by the Fair Credit Reporting Act.

Brian Mahon

About the Author

Brian Mahon has worked in the public records data industry for more than 13 years. His experience includes roles in product development, marketing, and web platforms at one of the largest public records companies. His work focuses on helping consumers understand how public record search tools work and how to interpret the information they provide.

Read full bio