Investigator Use
Public WWW is a source code search engine that indexes the HTML, JavaScript, and CSS source code of websites and allows investigators to search for specific code patterns, scripts, tracking IDs, libraries, and other technical elements across the indexed web. It enables finding websites that share common technical characteristics.
For OSINT investigators, Public WWW enables a powerful infrastructure attribution technique: identifying all websites that use the same analytics tracking ID, social media pixel code, advertising network tag, or other identifiable code element. Because these tracking IDs are often unique to a single operator, finding all websites sharing the same ID reveals a portfolio of sites controlled by the same person or organization.
Google Analytics tracking IDs (UA-XXXXXXXX or G-XXXXXXXXXX format) are particularly useful for this technique. When an investigator identifies one site's GA tracking ID from its source code, searching for that ID in Public WWW returns all other websites using the same ID — sites that the same operator controls and has connected to the same analytics account.
Facebook Pixel codes, AdSense publisher IDs, and other monetization or analytics codes similarly link websites to their operators. A single publisher ID connecting dozens of apparently unrelated websites is a strong indicator of a coordinated website network under one operator's control.
For fraud investigation, identifying that a fraudulent e-commerce site shares its payment processor code, analytics ID, or affiliate ID with multiple other sites reveals the scope of the fraud operation and provides additional evidence of the same operator behind all sites.
Phishing kit fingerprinting is another application — phishing pages often contain distinctive code patterns from the kits used to create them. Searching Public WWW for these patterns can identify all phishing pages created from the same kit.
Search operators allow targeting specific domains, file types, or code patterns. The search syntax supports standard HTML/JavaScript patterns and wildcard matching.
Document all source code searches performed with specific patterns searched, all domains returned, and query timestamps.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
All IO
OSINT Search Techniques
All.io aggregates results from multiple search engines in one interface, covering web pages, tweets, YouTube, and images for OSINT.
Answerthepublic
OSINT Search Techniques
AnswerThePublic surfaces real questions people search around any keyword — useful for OSINT subject profiling and research mapping.
Carrot Search
OSINT Search Techniques
Carrot2 organizes your search results into topics. With an instant overview of what
DorkSearch
OSINT Search Techniques
DorkSearch generates advanced Google dork queries to find exposed data, sensitive documents, and vulnerabilities for OSINT research.
Duckduckgo
OSINT Search Techniques
The Internet privacy company that empowers you to seamlessly take control of your personal information online, without any tradeoffs.
Etools
OSINT Search Techniques
Transparent metasearch engine in Swiss quality. Simultaneously queries major search engines with one click.