Hunt down social media accounts with Sherlock

Hunt down social media accounts with Sherlock

Sherlock is a powerful command line tool that can be used to find usernames across many websites and social networks. It works on Linux, MacOS and Windows.


To install Sherlock, follow the instructions below. Make sure that you have Python3-pip and Python 3.6 or above installed. You can find Sherlock's github here.

On all platforms
~$ git clone
~$ cd sherlock
~/sherlock$ pip3 install -r requirements.txt

# On Linux
~$ sudo apt install sherlock

Once installed, you can run Sherlock by python3 -h.

~$ python3 -h                                                 
usage: sherlock [-h] [--version] [--verbose] [--folderoutput FOLDEROUTPUT] [--output OUTPUT] [--tor] [--unique-tor] [--csv] [--site SITE_NAME] [--proxy PROXY_URL] [--json JSON_FILE] [--timeout TIMEOUT] [--print-all] [--print-found]
                [--no-color] [--browse] [--local]
                USERNAMES [USERNAMES ...]

Sherlock: Find Usernames Across Social Networks (Version 0.14.0)

positional arguments:
  USERNAMES             One or more usernames to check with social networks.

  -h, --help            show this help message and exit
  --version             Display version information and dependencies.
  --verbose, -v, -d, --debug
                        Display extra debugging information and metrics.
                        If using multiple usernames, the output of the results will be saved to this folder.
  --output OUTPUT, -o OUTPUT
                        If using single username, the output of the result will be saved to this file.
  --tor, -t             Make requests over Tor; increases runtime; requires Tor to be installed and in system path.
  --unique-tor, -u      Make requests over Tor with new Tor circuit after each request; increases runtime; requires Tor to be installed and in system path.
  --csv                 Create Comma-Separated Values (CSV) File.
  --site SITE_NAME      Limit analysis to just the listed sites. Add multiple options to specify more than one site.
  --proxy PROXY_URL, -p PROXY_URL
                        Make requests over a proxy. e.g. socks5://
  --json JSON_FILE, -j JSON_FILE
                        Load data from a JSON file or an online, valid, JSON file.
  --timeout TIMEOUT     Time (in seconds) to wait for response to requests. Default timeout is infinity. A longer timeout will be more likely to get results from slow sites. On the other hand, this may cause a long delay to gather
                        all results.
  --print-all           Output sites where the username was not found.
  --print-found         Output sites where the username was found.
  --no-color            Don't color terminal output
  --browse, -b          Browse to all results on default browser.
  --local, -l           Force the use of the local data.json file.

You can see that their is many useful options. Notably tor and the proxy flag.

If you installed it using the apt method; all you have to do is type sherlock.

~$ sherlock dingo418
[*] Checking username dingo418 on:
[+] Coil:
[+] Fiverr:
[+] GitHub:
[+] HackerOne:
[+] Minecraft:
[+] PCPartPicker:
[+] Pinterest:
[+] Scratch:
[+] TikTok:
[+] TradingView:
[+] Zhihu:

Hunt down accounts

Now all you have to do is choose your target. In this example i have chosen BobSege. The --timeout 10 flag forces Sherlock to skip a website after 10 seconds of no response. I always recommend to add it on.

~$ python3 bobseger --timeout 10
[+] 9GAG:
[+] Apple Developer:
[+] Apple Discussions:
[+] AskFM:
[+] Behance:
[+] Blogger:
[+] BodyBuilding:
[+] ChaturBate:
[+] Clubhouse:
[+] Codecademy:
[+] Coil:
[+] DailyMotion:
[+] DeviantART:
[+] Discogs:
[+] Disqus:
[+] Docker Hub:
[+] Duolingo:
[+] Facebook:
[+] Fiverr:
[+] Flipboard:
[+] FortniteTracker:
[+] Freesound:
[+] G2G:
[+] GaiaOnline:
[+] Genius (Artists):
[+] Giphy:
[+] GitHub:
[+] GoodReads:
[+] Gravatar:
[+] Imgur:
[+] Instagram:
[+] Issuu:
[+] Kik:
[+] Kongregate:
[+] Linktree:
[+] Minecraft:
[+] Munzee:
[+] MyMiniFactory:
[+] Myspace:
[+] Naver:
[+] Newgrounds:
[+] PCPartPicker:
[+] Periscope:
[+] Pinterest:
[+] Pokemon Showdown:
[+] Pornhub:
[+] Quizlet:
[+] Rate Your Music:
[+] Redbubble:
[+] Reddit:
[+] ReverbNation:
[+] Roblox:
[+] Scratch:
[+] Scribd:
[+] SlideShare:
[+] Smule:
[+] SoundCloud:
[+] Telegram:
[+] Tenor:
[+] TikTok:
[+] TradingView:
[+] Trello:
[+] Twitch:
[+] Twitter:
[+] VSCO:
[+] Wattpad:
[+] Wikipedia:
[+] WordPress:
[+] Xbox Gamertag:
[+] Xvideos:
[+] YouNow:
[+] YouPorn:
[+] Zhihu:
[+] jeuxvideo:
[+] mercadolivre:
[+] xHamster:

You can find out a lot about your target. In addition, Sherlock also lets you search multiple usernames at once by simply adding a space to your search like below.

~$ python3 dingo dingoo --timeout 10

Useful flags

There is a few other useful flags contained in Sherlock. Here are a couple:

Proxy (-p)

-p allows you to specify a proxy. The proxy has to be in the syntax of -p [TYPE-OF-PROXY]://[IP]:[PORT]. An example is below:

~$ python3 bobseger --timeout 10 -p socks5://

Tor (-t)

-t allows you to run Sherlock over tor. You will need to be running tor on your current machine and have it added to your system path.

~$ python3 bobseger --timeout 10 -t

Output (-o)

-o allows you to specify an output file for all the positive sites.

~$ python3 dingo418 --timeout 10 -o dingo418.txt
~$ cat dingo418.txt

Browser (-b)

-b allows you to automatically open up all the results onto your default browser

~$ python3 bobseger --timeout 10 -b

Ending Notes

Sherlock is a very powerful OSINT tool that is a lot of fun to play around with. You can find a lot about a person

I hope you enjoyed this guide for Sherlock for find social media accounts. If you have any questions you can always leave a comment below or feel free to reach out to me on Twitter @dingo418.