PERSINT Phone Investigation: OSINT From 11 Digits to a Full Profile

PERSINT · May 3, 2026 · Updated May 3, 2026

A phone number is not eleven digits. It's a key. It opens messengers, banking sessions, two-factor codes, abandoned dating profiles, decade-old forum signups, and — if you know how to ask — the carrier's own routing database. PERSINT.PHONE is the discipline of turning that key into a person.

This is the sub-direction of PERSINT (People / Persona OSINT) that pivots from a single number to identity, services, social presence and movement. Done well, it produces a profile in under an hour. Done badly, it produces a Truecaller screenshot and a guess.

What PERSINT.PHONE actually is

The premise is simple: a phone number is one of the most stable, most cross-linked identifiers a real human carries. Account recovery flows lean on it. Messengers are bound to it. Delivery apps, ride-share, banks, government portals — all of them treat the number as a primary key. Strip away the marketing and a phone-number investigation is just three things stacked on top of each other:

  1. The network layer — what the carrier knows about the number right now.
  2. The application layer — what messengers and apps reveal because the number is registered with them.
  3. The historical layer — what breach data, caller-ID communities, and old web traces remember about the number.

The order matters. If you start with caller-ID apps and skip the network layer, you'll burn time on a VoIP number assigned to no one. If you start with messengers and skip OPSEC, you'll notify the target. The workflow below is built to fail in the cheapest place first.

Stage 1 — The network layer (HLR + MNP)

Before touching messengers, confirm the number is real, active, and on the carrier you think it's on. That's an HLR (Home Location Register) lookup — a query sent across the SS7 signaling network that asks the operator whether a GSM number is currently valid, which network actually serves it, and whether it's roaming. The carrier replies. No SMS, no call, no notification on the target's device.

HLR tells you the number lives. MNP (Mobile Number Portability) tells you whether it lived somewhere else first. MNP queries hit the national porting registry and return the original carrier plus the current one — a free clue when the original network anchors a country, region, or year of issue, and the current network doesn't.

The cheap, lower-resolution version of this is a free lookup like Numverify, baked into the standard scan that PhoneInfoga runs on every number. PhoneInfoga is the workhorse: country, area, carrier, line type, then a Google-dorked OSINT pass against the formatted variants of the number. It doesn't claim to verify ownership — it just exposes what the open web already knows. The project itself is now stable but unmaintained, which matters: if your scanners stop returning, it's the upstream APIs aging out, not your install.

Two outputs from this stage drive everything after: line type (mobile vs. VoIP vs. landline) and active status. A throwaway VoIP number tells you the target was being careful. An active mobile in the country you expected tells you the rest of the workflow will probably work.

Stage 2 — Messenger walks

This is where most of the actual identity comes from. Add the number to a clean burner contact book and walk it through the major messengers one by one.

WhatsApp. If the number is registered, you can pull profile photo, "About" status, and last-seen timestamp — assuming the user hasn't tightened privacy settings. Investigators routinely cross-reference WhatsApp profile photos against LinkedIn to confirm professional identity from the picture alone.

Telegram. Username, profile picture, bio, and visible activity in public channels. With the right settings on the target's side, you can resolve a phone number to a Telegram user ID, which then lets you pivot to all their public group memberships and historical messages. Telegram leaks more PII by default than any other mainstream messenger — assume the target hasn't fixed it.

Signal. Confirms only that the number is registered. By design, Signal is hostile to bulk discovery — that's the point. Use it as a yes/no signal, nothing more.

Viber, Wickr, WeChat, LINE. Geographic priors apply. Viber lights up across the post-Soviet space and parts of the Balkans. WeChat is non-negotiable for Chinese targets. LINE is the same story for Japan, Taiwan, Thailand. If the target's country is in the list, walk the messenger. If not, skip it.

OPSEC note that nobody tells you. Adding a number to your contacts can — depending on the platform's privacy settings — surface your profile to the target through "people you may know" type recommendations. Use a sterile burner device with its own number, photo, and contact graph. Never mix accounts.

Stage 3 — Caller-ID databases

Caller-ID apps are where the ethics get queasy and the data gets useful. Truecaller, Sync.me, GetContact, Eyecon, Hiya and similar apps work on a give-to-get model: users hand over their entire address book in exchange for caller identification on incoming calls. Multiply that by hundreds of millions of users and you get a crowdsourced reverse directory that knows what name your contacts saved you under.

Coverage is brutally regional, as Bellingcat documented years ago in the classic guide on contact-book apps: GetContact is dense across Russia, Ukraine, Turkey and the Middle East but blocked in the US and UK. Truecaller is everywhere but India is its motherland. Sync.me reaches places others don't. Run the same number through three of them and the answers don't always match — that's not a bug, that's signal. Multiple distinct names from different regions point to a recycled or shared number. A single dominant name across all three is the closest thing you'll get to confirmation.

Western-market equivalents work differently. Whitepages, Spokeo, ZabaSearch, Spy Dialer, CallerSmart — these are scraped from public records, voter rolls, marketing databases, and old phone directories. Coverage is biased toward the US, biased toward landlines, and stale by years. They still beat guessing.

For commercial-grade aggregation, Epieos and OSINT Industries sit on top of dozens of modules and run them all on a single submitted number. Epieos surfaces linked Google account display name and profile photo when the number is attached to a Google account — without sending the target a notification. OSINT Industries runs around 100 modules per query and is the closest thing the field has to a "submit, get a dossier" button.

Stage 4 — Breach corpora and historical traces

If the network and messenger layers gave you nothing, the last layer is what someone leaked years ago. DeHashed indexes phone numbers across billions of breached records and returns the email addresses, usernames, and account contexts they appeared next to. A single hit pivots a phone investigation into an email investigation, which is a categorically different — usually richer — game.

The Facebook 2021 leak alone exposed phone numbers tied to over half a billion accounts. The Twitter 2022 leak added hundreds of millions more. If a phone number has been in regular use since 2015, the probability that it appears in some breach corpus is uncomfortably close to one. Always check.

Breach matches do something else useful: they timestamp. A number first appearing in a 2017 forum dump tells you the owner has been using it for at least nine years. That alone rules out throwaways and adds confidence to whatever else you've found.

SIM-swap timeline and pattern of life

Two advanced techniques worth knowing about even if you rarely use them.

The SIM-swap timeline: every time a number is moved to a new SIM, the carrier records the timestamp. Some fraud-prevention APIs expose "time since last SIM swap" as a query. A number swapped 48 hours before a banking login is a different risk profile than one that hasn't moved in two years — and that delta is also a behavioural signal in an investigation. It's the same logic banks use to detect fraud, applied in reverse to detect recent SIM-swap activity.

Pattern of life from call records is the older, dirtier version: when leaked carrier metadata is available, call-frequency and time-of-day distributions reveal work hours, sleep cycle, weekend behaviour, and habitual contacts. This data lives mostly in leaked dumps and broker feeds rather than in OSINT-friendly APIs, but it appears often enough in major breaches to be worth searching for.

What won't work — and why operators still try it

Three failure modes show up in every junior PERSINT report.

First, treating the first Truecaller hit as ground truth. Numbers get recycled. Names get spoofed. People save their boss as "do not answer." A single caller-ID hit is a lead, not a conclusion.

Second, ignoring VoIP. If PhoneInfoga flags a number as VoIP and the messenger walk returns nothing, the target is using a Twilio, Google Voice, or TextNow number. The whole pivot stack collapses. Move on or change identifier.

Third, notifying the target. Adding the number to WhatsApp, then a few hours later checking it on Signal, then again on Telegram — eventually one of those platforms surfaces a friend recommendation, a "joined" notification, or a profile-view artefact. Use clean burner accounts that you're prepared to throw away after the case.

The tightest possible workflow

For an experienced operator, the whole sequence collapses into:

  1. PhoneInfoga + Numverify scan → confirm line type and carrier.
  2. HLR/MNP lookup → confirm active and check porting history.
  3. Burner contact-book add → walk WhatsApp / Telegram / Signal / regional messenger.
  4. Truecaller / Sync.me / GetContact triangulation → cross-check names.
  5. Epieos + OSINT Industries → linked Google/Skype/social accounts.
  6. DeHashed and equivalent breach search → emails, usernames, historical context.
  7. If needed: SIM-swap timeline check, leaked-records pattern of life.

Done in this order, you fail cheap on bad numbers and spend deep budget only on real ones. The bonus is that the artifacts compound: a name from Truecaller plus a profile photo from WhatsApp plus an email from a breach plus a Google account from Epieos is no longer a guess. It's an attribution.

For continued reading on what's actually working in the field this quarter, the OSINT phone-number community is small enough to follow directly. The accounts shipping the most useful PERSINT.PHONE material on Twitter/X include @cyb_detective, @hatless1der, @sector035, @osintindustries, @soxoj and @i_am_osint. Their feeds are the closest thing this discipline has to a changelog.

A phone number, in the end, is exactly as private as the laziest service it was ever used to sign up for. PERSINT.PHONE is the craft of finding which one that was.