NeonRecon consolidates username enumeration, email intelligence, domain reconnaissance, and breach detection into a single web interface. The power of Sherlock, Maigret, and Holehe combined, no terminal required.
Start Scanning →Each module runs independently. Enable what you need, disable what you don't. Results stream live to your dashboard.
Search a username across 300+ platforms simultaneously. Async scanning returns results in seconds with profile URLs and status indicators.
Discover which services an email is registered on. Identify Gravatar links, GitHub associations, and platform registrations without authentication.
Pull profile photos, bios, links, and follower counts from found accounts. View everything in a unified dashboard instead of 20 open tabs.
WHOIS data, DNS records, and subdomain enumeration in one query. Map the infrastructure behind any domain.
Cross-reference targets against known data breaches. Surface breach names, dates, and exposure types for informed security assessments.
Export findings as clean, timestamped OSINT reports. HTML or JSON output with full source attribution for documentation and compliance.
Username, email address, or domain. Pick your scan type and which modules to activate.
Results stream live in a terminal-style output. Found profiles, services, and records appear in real time.
Aggregated profiles, breach data, and domain intel rendered in a clean dashboard with tabs per category.
Generate a timestamped OSINT report with sources. Share as HTML or JSON for your records.
NeonRecon uses only publicly available information. No brute-force techniques, no authentication bypass, no scraping behind login walls. Built-in rate limiting protects both targets and source platforms. This tool is designed for legitimate OSINT research: security audits, journalism, personal privacy checks, and authorized investigations.
The same reconnaissance capabilities that security professionals use through command-line scripts, available to anyone through a browser. That's the future NeonRecon is building.
Try the Scanner →