Yesterday, I was bored and decided to do some OSINT stuff on Instagram. So, I started digging for some interesting targets.

Finding the Target
First, I browsed through various hashtags related to luxury and travel. After a while, I stumbled upon a profile that seemed promising. This guy had tons of pictures with fancy cars, private jets, and expensive watches. Bingo!
Gathering Public Information
I began by collecting all the publicly available information from his profile. I noted down:
- His username and any variations he might be using.
- His full name, if available.
- Any locations mentioned in his posts or bio.
- The people he frequently interacted with.
- Any other social media links he might have shared.
Digging Deeper
Next, I used some online tools and websites, just searching his username and real name if I knew It . I just typed in his username to see what would pop up. I found some additional social media profiles, maybe a few forum posts, and some old blog comments. Nothing too crazy, but it helped me build a better picture of his online presence.
Analyzing the Pictures
Now, this is where it got a bit more interesting. I downloaded some of his high-resolution pictures and used reverse image search.
With Yandex, I found out the locations that he usually visited, and more public information. It will show you all the details.

Putting It All Together
After a few hours of digging, I managed to piece together a pretty good profile of this guy. I knew his likely locations, his friends, his interests, and even some of his travel patterns. Of course, I’m not going to do anything shady with this information. This was just a fun little exercise to see how much I could find out using only publicly available data.
The Results
It’s pretty wild how much you can uncover with a bit of patience and some basic OSINT techniques.
It took approximately 5 hours to find some juicy info.
This whole thing reminded me of how important it is to be careful about what you share online. You never know who might be looking!