BlackEyes LogoBLACKEYES
For Private Investigators

Digital groundwork, in minutes

Automate the OSINT passes every case needs. Breach data, social footprint, corporate records, identity mapping — from a single email address.

~15 min per case
11-section report
Every source cited

Where your billable hours disappear

The digital groundwork on every case follows the same pattern. Repeat work, low margin, and the client rarely pays for it in full.

The Breach Sweep

Running a subject through breach aggregators, interpreting findings, cross-referencing with other indicators — two to four hours of billable time.

The Social Sweep

Username checks across a dozen platforms, alias identification, content review, network mapping — another few hours, before you've started the actual investigation.

Corporate Lookups

Companies House searches, officer lookups, dissolved-company history, beneficial ownership. Essential but tedious; easy to miss subsidiaries or former roles.

Identity Triangulation

Cross-referencing names, emails, usernames, and aliases to confirm you're looking at the right person. The stage where wrong-subject attribution happens.

What each investigation surfaces

The digital opening of a case follows the same choreography every time: breach sweep, username check, platform sweep, corporate lookups, geographic triangulation. Hours of pattern-matching work that earns a modest line on the invoice. BLACKEYES collapses that opening phase to around fifteen minutes from an email seed — breach archaeology, platform sweep, username graph, commercial footprint, location triangulation — and delivers it as a case-file dossier with citations. Physical investigation, interviewing, surveillance, and the judgement that wins the case all remain the PI’s own.

Breach Archaeology

Decades of breach records cross-referenced against subject identifiers. Passwords, phone numbers, DOBs, and usernames that didn't previously connect, now do — the investigative Rosetta Stone for a new subject.

Platform Sweep

Automated pass across the platforms where a subject's story tends to get complicated — forums, dating platforms, professional networks, buy-sell marketplaces. Hours of manual search compressed to minutes.

Username Graph

Username graph construction from the email seed. Essential when the subject is technically savvy enough to segregate their identities across accounts.

Commercial Footprint

Current and dissolved company filings — the subject's formal commercial history compared against their declared version of events.

Location Triangulation

IP geolocation from breach records, timezone patterns, social content metadata, and open-source geo signals — triangulated into a current and historical location picture.

Case-File Dossier

Structured for case-file integration. Every source cited, every URL categorised as verified match or excluded, ready to hand to a client or retain as workproduct.

Built for the cases that matter

Matrimonial & family

Surface undisclosed accounts, hidden assets, and social evidence relevant to matrimonial and family-law proceedings.

Pre-litigation due diligence

Build a defensible picture of a subject before claim or motion is filed. Source-cited report stands up to scrutiny.

Corporate investigations

Employee misconduct, insider risk, undeclared directorships, or conflict-of-interest investigations.

Tracing & skip tracing

Digital identity layer alongside traditional address and person-tracing work. Start point for physical investigation.

Pricing that rebills cleanly

Per-case pricing from £4.99 per investigation. £3 per investigation on the Agency pack (100 credits) — cleanly markupable within your case fees. Monthly subscriptions for steady caseloads.

Questions PIs ask

Is this a replacement for traditional investigation?

No. BLACKEYES handles the digital groundwork — breach checks, social sweeps, corporate lookups, identity mapping. A professional PI brings judgement, physical investigation, interviewing, surveillance, and case strategy. Most of our PI customers use BLACKEYES to do in fifteen minutes what they'd previously charge two hours for on the digital side, freeing them to focus on investigation work only a human can do.

Can I use the reports as evidence?

Every finding is source-cited, referencing the underlying public source. Reports have supported litigation and tracing work. Admissibility and evidential weight depend on the jurisdiction, matter, and whether a specific finding has been independently verified — for contentious litigation, consult counsel on chain-of-custody. BLACKEYES reports are raw material, not a conclusion. PIs routinely independently verify findings before relying on them in case reports.

Are AI-generated findings reliable?

The pipeline combines traditional API lookups (Companies House, phone intelligence, breach databases) with AI analysis across social and digital-footprint signals. Multi-stage verification, entity gating, and a Skeptic agent reduce false positives — but AI can still misattribute or misinterpret, and third-party data can be out of date. For any finding that will go in a case report or influence a decision, independent verification remains the investigator's responsibility. BLACKEYES is not liable for third-party data accuracy.

Does BLACKEYES replace my existing OSINT toolkit?

If you manually run Maltego, SpiderFoot, theHarvester, Sherlock, or OSINT Framework tools, BLACKEYES automates the equivalent passes and cross-references the findings. It complements rather than replaces specialist tooling for particular source types, but for most email-input investigations it's faster than assembling the same picture manually.

Are targets notified when investigated?

No. BLACKEYES operates passively. The subject is never contacted, notified, or made aware of the investigation. All data is drawn from publicly available sources and historical breach records — no subject-facing activity.

Open your first case

One email. Fifteen minutes. The digital side of the investigation, handled — so you can focus on the rest.

Reports are tools, not conclusive judgements — verify material findings before reliance. See the FAQ