Getting tons of false negatives when scanning common usernames. Is there a way to reduce rate limiting? #2882
-
|
Hey everyone, I've been using Sherlock for some OSINT work and running into an issue where I'm getting way more false negatives than expected, especially when scanning relatively common usernames like "alex_2023" or "john_dev". The scan finishes quickly but only returns maybe 5-10 results when I know for a fact the username exists on 20+ platforms. Here's my current setup: I'm running this from a residential IP (no VPN/proxy) and the timeout seems generous enough. A few observations:
I feel that I'm getting rate-limited by a bunch of sites, but I'm not sure how to work around this without making the scan take forever. I tried adding --timeout 180 but that didn't really help. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
|
Is there a recommended delay/throttle setting to avoid triggering rate limits? I didn't see this in the --help output but maybe I'm missing something. |
Beta Was this translation helpful? Give feedback.
hey @BittuChan, thanks for sharing your problem, here are a few solutions that should ideally work in your case:
Target Specific Sites
Instead of scanning everything at once, use the --site flag to focus on specific platforms:
sherlock alex_2023 --site Instagram --site Twitter --site GitHub --timeout 60Don't Use Tor (Seriously)
Tor actually makes this worse for most sites. Tor exit nodes are heavily rate-limited and often blocked entirely by major platforms. I've found Tor useful only when scanning obscure sites that don't have sophisticated anti-bot systems.
Residential Proxy Rotation
This is the real solution for high-volume scans. You need rotating residential proxies (not datac…