BlackEyes LogoBLACKEYES

BLACKEYES

From email address to intelligence report — in minutes.

Enter an email. Our investigation pipeline searches breach databases, social platforms, corporate records, and the open web — pivoting across sources to build a comprehensive dossier. No OSINT skills required.

Breach Intelligence

Passwords, usernames, phone numbers, and IPs — searched across 3.8B+ compromised records from 2008 to present.

Social Media

Profiles identified and verified across all major platforms. Hidden accounts and alt personas surfaced automatically.

Geo Intelligence

Current and historical locations built from IPs, breach records, timezone patterns, and online activity.

Identity Mapping

Email variants, usernames, domains, and aliases connected into a single digital identity profile.

Network Analysis

Professional associates, business connections, family links, and social relationships mapped from public sources.

Corporate Records

Directorships, company ownership, and business registrations from Companies House and public filings.

Activity Timeline

Chronological view of account creation, breach exposure, and digital presence evolution over time.

Hybrid Analysis

Traditional API lookups and structured data extraction alongside AI agents for cross-referencing and analysis. Hard data first, intelligence second.

Intelligence Reports

4,000–6,000 word dossier across 11 structured sections. Every finding source-cited and ready to share with stakeholders or legal teams.

Use Cases

Investigators & Analysts

Automate the groundwork — breach checks, social sweeps, corporate lookups — so you can focus on analysis, not data collection.

Due Diligence

Verify candidates, partners, and stakeholders before you commit. Hiring decisions, business partnerships, and investment checks — all from an email address.

Personal Digital Exposure

See what the internet knows about you. Leaked credentials, public records, social profiles, and data breaches — the full picture of your digital exposure, from just your email.

Legal & Compliance

Thorough due diligence for legal cases, compliance investigations, and regulatory checks. Source-cited and defensible.

Fraud Prevention

Verify identities, detect fraudulent activity, and cross-reference claims against breach records and public data.

Journalism & Research

Verify sources, investigate leads, and build evidence trails. Every finding is source-cited and ready for editorial review.

How It Works

1

Enter an email

Paste any email address. That's the only input needed.

2

Pipeline investigates

Our system searches breach databases, social platforms, corporate records, and the open web in parallel.

3

Get your report

Receive a structured intelligence dossier — 4,000–6,000 words across 11 sections, every finding source-cited.

This isn't just a breach checker

Breach checkers tell you if an email was exposed. We start where they stop.

Breach checkers

  • Was this email in a breach? Yes/No
  • Which breaches? Here's a list
  • That's it. Investigation ends

BLACKEYES.IO

  • Breach data is just the starting point
  • Extracts names, usernames, locations, and DOBs from breach records
  • Pivots across social media, corporate registries, public records, and the open web
  • Cross-references findings through multiple independent APIs and data sources
  • Uses agentic dorking — AI-driven search strategies that adapt to what each investigation uncovers
  • Validates every finding with a multi verification system to prevent wrong-person attribution

The result is a 4,000–6,000 word intelligence report that reads like the work of a human OSINT analyst — because the methodology is the same, automated across a pipeline of specialised AI agents working in parallel.

Your Investigations Stay Yours

Your eyes only

Investigation data is stored securely and visible only to your account.

Passive collection

Targets are never contacted or notified. All data is gathered from publicly available sources and existing breaches.

Clean checks included

Every credit you purchase includes a free clean check. If no breach data is found, a clean check is used instead of your credit. You only pay for full investigations.

What You Get

A detailed intelligence report covering 11 sections.

This is a hybrid example investigation based on multiple investigations. No real individual is represented, but the structure, depth, and detail are exactly what you receive.

Loading example report...

Simple, transparent pricing.

No hidden fees. Buy credits or subscribe monthly and save.

1 credit = 1 investigation

Starter

4 credits

£19.95

£4.99 per credit

Full investigation report per credit

All 11 intelligence sections included

Source-cited, export-ready dossier

Most Popular

Professional

10 credits

£39.95

£4.00 per credit

Full investigation report per credit

All 11 intelligence sections included

Source-cited, export-ready dossier

Save 20% per credit vs Starter

Business

25 credits

£84.95

£3.40 per credit

Full investigation report per credit

All 11 intelligence sections included

Source-cited, export-ready dossier

Save 32% per credit vs Starter

Agency

100 credits

£299.95

£3.00 per credit

Full investigation report per credit

All 11 intelligence sections included

Source-cited, export-ready dossier

Save 40% per credit vs Starter

What's New

Platform updates and new capabilities.

10 Mar 2026Integrated Veriphone API — carrier detection, line type, and number validation
09 Mar 2026Integrated Companies House API (UK) — corporate officer, directorship, and company registration lookups
09 Mar 2026Improved entity gating agents — multi-stage verification that catches wrong-person attribution
08 Mar 2026Expanded username search — multiple platforms added including forums, gaming, automotive, and genealogy
08 Mar 2026Integrated Wayback Machine searches for historical web presence analysis