OSINT Case Files
Anonymized investigation reports from real TraxinteL engagements. Every case file demonstrates our methodology, findings, and outcomes.
How We Uncovered a Hidden Instagram Account in 48 Hours
A spouse suspected infidelity after noticing suspicious phone behavior. TraxinteL's Deep Search uncovered a secret Instagram profile tied to dating app activity.
Tracing $180K in Stolen Cryptocurrency Through Telegram Channels
An investor lost $180,000 to a Telegram-based crypto scam. TraxinteL traced the funds across 7 wallets and identified the operator's real identity.
Unmasking an AI-Generated Catfish on Tinder Using Facial Recognition
A user suspected their Tinder match was using AI-generated photos. TraxinteL confirmed the profile was entirely synthetic and linked to a known romance scam network.
Executive Due Diligence Reveals Fabricated Credentials on LinkedIn
A VC firm requested background checks on a startup founder. TraxinteL discovered fabricated degrees, a hidden lawsuit, and a previous company shuttered under fraud allegations.
Locating a Missing Teenager Through Snapchat Geolocation Data
A family reported their 16-year-old missing after 72 hours. TraxinteL used Snapchat metadata and cross-platform OSINT to locate the teen within 18 hours.
Fortune 500 Executive's Credentials Found on Dark Web Marketplace
A corporate security team discovered their CEO's personal email in a dark web credential dump. TraxinteL conducted a full exposure audit and identified 3 active threats.
Identifying a Persistent Digital Stalker Across WhatsApp and Instagram
A client was receiving threatening messages from anonymous WhatsApp numbers. TraxinteL traced the harassment to a known contact using cross-platform behavioral analysis.
Stopping a Brand Impersonation Ring Exploiting OnlyFans Creators
An OnlyFans creator discovered 12 fake accounts using their content. TraxinteL identified the operator and mapped the full impersonation network.
Recovering a Minor from a Predatory Discord Server
Parents discovered their child communicating with an unknown adult on Discord. TraxinteL identified the predator and provided actionable intelligence to law enforcement.
Following the Ethereum Trail: Tracing Ransomware Payments to an Exchange
A mid-size company paid a $75,000 Ethereum ransom. TraxinteL traced the funds through a mixing service and identified the cash-out point.
Catching a Double Life: How Bumble Activity Exposed a Serial Cheater
A spouse discovered their partner maintained 3 active dating profiles while married. TraxinteL linked all accounts through device fingerprint analysis.
The Deleted Tinder Account That Wasn't Really Deleted
A partner claimed they deleted Tinder months ago. TraxinteL's cache recovery analysis proved the account remained active with recent conversations.
Hinge Messages Recovered After a Factory-Reset Phone
A client's partner factory-reset their phone to destroy evidence. TraxinteL reconstructed the conversation timeline through cloud backup forensics.
When Your Partner Has a Secret OnlyFans Creator Account
A client discovered their spouse was secretly earning income as an OnlyFans creator. TraxinteL traced the revenue trail and confirmed hidden financial activity.
Facebook Messenger's Hidden Inbox: Finding Conversations They Thought Were Gone
A partner had been using Facebook Messenger's 'Vanish Mode' to conduct an affair. TraxinteL found evidence through notification metadata and contact pattern analysis.
$450K Bitcoin Romance Scam: Following the Blockchain to a Mixing Service
A victim lost $450,000 to a romance scam that used Bitcoin as the payment mechanism. TraxinteL traced the funds through multiple hops and a mixing service.
CashApp Fraud Ring: How 12 Fake Accounts Were Linked to One Operator
A CashApp user was defrauded through a fake ticket sale. TraxinteL discovered the seller operated 12 fraudulent accounts, all linked through device fingerprints.
The NFT Rug Pull: Tracing Ethereum Smart Contract Deployers
A $2M NFT project vanished overnight. TraxinteL traced the smart contract deployer's wallet to their real identity through a single mistaken transaction.
Venmo Transaction History Revealed a Hidden Second Family
During divorce proceedings, financial OSINT revealed a pattern of Venmo transactions consistent with maintaining a second household. TraxinteL mapped the complete financial picture.
Pig Butchering Scam: From WhatsApp to Crypto Wallet to Real Identity
A victim lost $320,000 to a 'pig butchering' investment scam originating from WhatsApp. TraxinteL traced the operation from the initial message to the final wallet.
Finding a Runaway Teen Through TikTok Duet Geolocation
A 15-year-old ran away from home. TraxinteL analysts traced them through TikTok duet metadata and identified their location in under 24 hours.
Using Reddit Post History to Locate a Missing Adult
A man went missing after posting increasingly concerning messages on Reddit. TraxinteL analyzed his post history to determine his probable location.
The Instagram Story That Led to a Missing Hiker's Last Known Location
A hiker went missing in a national park. TraxinteL extracted EXIF data and shadow analysis from their last Instagram story to determine their precise trail position.
Discord Voice Channel Metadata Helped Find a Missing Gamer
A teenager went silent after being active in a Discord gaming community. TraxinteL traced their last connection to determine their approximate physical location.
The Fake Reference Network: 8 LinkedIn Profiles Created to Support a Fraud
A job applicant provided stellar references. TraxinteL discovered all 8 reference LinkedIn profiles were fabricated by the applicant themselves.
Competitor Intelligence: How a CEO's Twitter Likes Revealed M&A Plans
A private equity firm suspected a competitor was planning an acquisition. TraxinteL analyzed the target CEO's social media activity to confirm deal signals.
The GitHub Commit That Exposed Corporate Espionage
A tech company suspected an employee of leaking proprietary code. TraxinteL traced leaked code fragments on GitHub to the employee's personal account.
Vetting a $10M Acquisition: How OSINT Found Hidden Lawsuits
An acquisition target appeared clean on paper. TraxinteL's deep search uncovered 4 hidden lawsuits and a pattern of regulatory violations across 3 states.
The CFO's Offshore Company: Discovered Through a Forgotten LinkedIn Endorsement
During an embezzlement investigation, TraxinteL discovered a CFO's hidden offshore entity through a single LinkedIn skill endorsement from a foreign associate.
Instagram Geo-Tags Used to Map a Stalker's Surveillance Pattern
A client reported feeling watched. TraxinteL analyzed the suspected stalker's Instagram posts and proved they were systematically following the client's daily routine.
Mapping a Cyberstalker Across 6 Platforms Using Behavioral Biometrics
A victim received harassment from seemingly unrelated accounts on 6 different platforms. TraxinteL proved they were all operated by the same person.
The Burner Phone That Wasn't Burner Enough: WhatsApp Registration Metadata
A harassment campaign used supposedly untraceable burner phones. TraxinteL identified the operator through WhatsApp registration metadata and carrier patterns.
The AI Girlfriend Scam: How We Detected a Deepfake Video Call
A victim believed they were in a video-call relationship with a real person. TraxinteL's analysis revealed every video call used real-time deepfake technology.
A Military Romance Scam Network Operating Across 5 Dating Apps
TraxinteL uncovered a coordinated romance scam using stolen U.S. military photos and operating simultaneous profiles on Tinder, Bumble, Hinge, Zoosk, and Match.
The Fake Recruiter on LinkedIn Who Was Phishing Credentials
A tech company experienced a spearphishing campaign originating from a convincing LinkedIn recruiter profile. TraxinteL exposed the operation and identified the threat actor.
Employee Credentials Found in a Ransomware Gang's Leak Site
During proactive dark web monitoring, TraxinteL discovered a client company's employee credentials on a ransomware gang's leak site before they were exploited.
A Hospital's Patient Records Appeared on a Dark Web Forum
TraxinteL's monitoring detected hospital patient records for sale on a dark web forum. Rapid response minimized exposure and supported HIPAA breach notification.
200 Fake Instagram Stores Selling Counterfeit Products Under Our Client's Brand
A luxury brand discovered hundreds of Instagram accounts selling counterfeit products using their trademarks. TraxinteL mapped the entire network and facilitated mass takedowns.
The Telegram Channel Selling Fake Professional Certificates Using Our Client's Logo
A professional certification body discovered a Telegram channel selling counterfeit certificates bearing their official seal. TraxinteL identified the operator.
The Stolen Identity: 14 Accounts Opened Using One Leaked SSN
A victim discovered their SSN had been sold on the dark web. TraxinteL conducted a comprehensive identity exposure audit, finding 14 fraudulently opened accounts.
Board Member Doxxing Prevention: Scrubbing a CEO's Digital Footprint Before an IPO
Before a high-profile IPO, TraxinteL conducted a comprehensive digital exposure audit on all board members, removing 340+ data broker listings and securing personal information.
An Activist Investor Doxxed Our Board — How We Mapped the Threat Actor in 72 Hours
After board members' personal information appeared on hostile forums, TraxinteL attributed the attack to a coordinated campaign and identified the threat actors.
Securing C-Suite Travel: Real-Time OSINT Monitoring During a High-Risk Summit
TraxinteL provided real-time threat intelligence monitoring for a Fortune 500 CEO traveling to a high-risk international conference, detecting 2 credible threats.
Physical Security Breach Predicted by Social Media Chatter: How OSINT Prevented a Workplace Incident
TraxinteL's continuous monitoring detected escalating threat language from a former employee on social media, allowing the client to prevent a workplace violence incident.
The Insider Threat We Caught on Reddit: An Employee Selling Proprietary Data on a Burner Account
TraxinteL's dark web monitoring detected an employee advertising access to proprietary company databases on a Reddit marketplace, using a seemingly anonymous account.
Executive Background Check Uncovers Undisclosed SEC Investigation
A C-suite candidate passed standard background checks. TraxinteL's deep OSINT investigation revealed an active SEC investigation at their previous company.
The Serial Workplace Harasser: How OSINT Revealed a Candidate's Pattern Across 3 Companies
Standard references checked out perfectly. TraxinteL's deep search revealed the candidate had been involved in harassment complaints at three previous employers.
Deepfake Candidate: An Applicant Used AI-Generated Video to Pass Remote Interviews
A remote candidate appeared different on video calls than in their submitted ID photo. TraxinteL's analysis confirmed the use of real-time deepfake technology during interviews.
Remote Employee Moonlighting Investigation: Secretly Working Two Full-Time Jobs
A company suspected a remote senior developer was underperforming due to a second full-time job. TraxinteL confirmed dual employment through digital footprint analysis.
Pre-Hire Social Media Audit Prevents $2M Discrimination Lawsuit Risk
A candidate for a client-facing director role had a clean resume but extensive public social media posts containing discriminatory content that would have created massive liability.
eDiscovery Acceleration: How OSINT Reduced Document Review by 60% in a $50M Litigation
In complex commercial litigation, TraxinteL used OSINT to pre-filter a 2M document corpus, reducing review costs by $1.2M and accelerating the case timeline.
Sanctions Screening Deep Dive: Identifying a Vendor's Hidden Connection to a Sanctioned Entity
Standard sanctions screening cleared a new vendor. TraxinteL's enhanced due diligence revealed a 3rd-tier ownership connection to an OFAC-sanctioned individual.
Anti-Money Laundering Investigation: Tracing Shell Companies Through LinkedIn Corporate Pages
A suspicious transaction pattern led to an AML investigation. TraxinteL traced the shell company network using LinkedIn company pages, revealing the beneficial owner.
FCPA Compliance: Detecting Bribery Indicators in a Joint Venture Partner's Digital Footprint
Before entering a $20M joint venture in an emerging market, TraxinteL's investigation revealed the local partner had undisclosed connections to government officials.
Whistleblower Tip Validation: Confirming Fraud Allegations Using Only Public Data
An anonymous whistleblower alleged executive fraud at a portfolio company. TraxinteL validated the allegations using only publicly available data without tipping off the subjects.
Acquisition Target's CTO Was Running a Competing Side Business — Found on Product Hunt
During acquisition due diligence, TraxinteL discovered the target company's CTO had launched a competing product on Product Hunt using company resources.
Post-Merger Integration Risk: Discovering the Acquired Company's Toxic Online Reputation
After a $30M acquisition closed, the acquirer discovered devastating employee reviews. TraxinteL's pre-merger reputation analysis could have flagged this before closing.
Vendor Due Diligence: A $5M SaaS Vendor Was a 2-Person Operation With No Real Office
A company was about to commit $5M annually to a SaaS vendor claiming 50+ employees. TraxinteL's investigation revealed it was a 2-person operation with AI-generated employee profiles.
PE Portfolio Company Monitoring: Detecting a CEO's DUI Arrest Before It Made the News
TraxinteL's continuous monitoring service detected a portfolio company CEO's arrest 14 hours before it appeared in news media, giving the PE firm time to prepare.
Competitive M&A Intelligence: How We Predicted a Rival's Acquisition Target 6 Weeks Early
A PE firm suspected a competitor was eyeing the same acquisition target. TraxinteL's analysis of patent filings and hiring patterns predicted the move 6 weeks before announcement.
Counterfeit Product Intelligence: Mapping a $12M Fake Goods Supply Chain from Alibaba to Amazon
A consumer electronics brand discovered counterfeit products on Amazon. TraxinteL traced the entire supply chain from Alibaba manufacturers to Amazon FBA warehouses.
Trademark Squatting Across 14 Countries: Identifying and Contesting Bad-Faith Filings
A global brand discovered their trademark had been filed by unknown parties in 14 countries where they planned expansion. TraxinteL identified the squatting network.
Influencer Fraud Audit: 40% of a $500K Campaign's Influencers Had Fake Followers
A CPG brand spent $500K on influencer marketing. TraxinteL's post-campaign audit revealed 40% of the influencers had artificially inflated follower counts.
Executive Impersonation on LinkedIn: 23 Fake Profiles Used to Solicit Our Clients
A consulting firm discovered 23 fake LinkedIn profiles impersonating their partners and directors, used to generate fraudulent business development leads.
Dark Web Brand Monitoring: Our Client's Customer Database Was Being Sold — We Found It First
TraxinteL's proactive dark web monitoring detected a client's customer database listed for sale on a dark web marketplace 72 hours before the breach was publicly disclosed.
Attack Surface Discovery: We Found 47 Forgotten Subdomains — 12 Were Vulnerable
A bank engaged TraxinteL for external attack surface mapping. We discovered 47 forgotten or undocumented subdomains, 12 of which had exploitable vulnerabilities.
Third-Party Risk Intelligence: A Critical Vendor's GitHub Repo Exposed API Keys
TraxinteL's vendor risk monitoring detected that a client's critical SaaS vendor had accidentally committed API keys to a public GitHub repository.
Phishing Infrastructure Attribution: Tracing a BEC Campaign to a Specific Threat Actor Group
A company lost $340K to a business email compromise attack. TraxinteL traced the phishing infrastructure to a known threat actor group and supported law enforcement recovery.
Credential Exposure Monitoring: 1,200 Employee Credentials Found Across 14 Breach Databases
A Fortune 1000 company's first comprehensive credential exposure audit revealed 1,200 employee credentials in breach databases, with 340 still using the compromised passwords.
Social Engineering Readiness Assessment: How Many Employees Overshare on LinkedIn?
TraxinteL audited a defense contractor's employee LinkedIn profiles and found 73% leaked information that could be weaponized in social engineering attacks.