Controllo Foto Profilo WhatsApp
+593 99 374 1752
--
--
Sì
No
22 days ago
INTELLIGENCE REPORT
Target: +593 993 741 752 (Ecuador)
Summary
A WhatsApp Business account registered to an Ecuador-based apparel/clothing micro-vendor; the same number appears in an October-2024 Telegram scrape, linking it to the alias “Dianita_Bravo”.Identity Information
- Name / Alias: Dianita Bravo (“D i a n i t”)
- Nationality: EC (Ecuador)
- Carrier: default Movistar-Claro range (no MNC conflict)
- Business: WhatsApp Business tagged “Apparel & clothing”, 24 h×7 schedule, no verifiable tax ID or legal entity.
- Online Presence
- WhatsApp Business: Active, catalog disabled, no commerce features enabled.
- Telegram: UserID 1922123706 under username @Dianita_Bravo (harvested Oct-2024).
- Social footprint: Zero cross-indexed Facebook, Instagram, TikTok, Twitter/X, LinkedIn, or YouTube accounts.
- Profile media: No avatar retrieved (WhatsApp image_status = “not-authorized”).
- Data Exposure
- Breached dataset: “Telegram Scrape” (2024-10) – unverified dump containing first_name, username, country, telegram_id, phone.
- Passwords / hashes: None present.
- Other leaks: None found in LeakCheck, DeHashed, or combo-lists.
- Risk Assessment
- Scam/Spam Score: Low-to-moderate.
– Business profile is minimal, no catalog, no linked FB/IG → suggests fly-by-night dropship or resale operation rather than established storefront.
– Presence in a Telegram scrape could indicate bulk-contact harvesting for mass-messaging; however, no spam reports filed on TrueCaller, WhatsApp Abuse, or Ecuadorian consumer portals. - Fraud indicators: No charge-back history, no associated crypto wallets, no fake-shop domains.
- Notable Findings
- WhatsApp Business configured as 24-hour-open every day yet lists no address, email, or website → typical of ghost sellers that redirect to external chat for payment (often outside platform protection).
- Telegram scrape metadata shows the user was active within 6 months; possible pivot for social-engineering or supply-chain phishing if the target interacts with suppliers.
Conclusion: Low-value target for high-impact breaches; useful as a secondary pivot for Ecuadorian consumer scams or apparel-themed phishing campaigns.
Consigliato dalle principali directory OSINT
Inserito in modo indipendente nelle più autorevoli pubblicazioni di riferimento, metodologie e liste della comunità OSINT.
Autorità in evidenza
i-Intelligence (OSINT Handbook)
Citato nella pagina WhatsApp dedicata dell'OSINT Handbook, uno dei riferimenti più autorevoli del settore.
OSINT Cabal · Live Center
Presentata come API per i dati del profilo WhatsApp nel Centro Live ufficiale, insieme a oltre 30 strumenti selezionati.
OSINT Funnel Methodology
Incluso nella metodologia OSINT Funnel insieme a HaveIBeenPwned, IntelligenceX, Dehashed e Snusbase.
awesome-osint
Incluso nella lista canonica di awesome-osint con migliaia di stelle su GitHub.
Citato anche in
- OSINT 🪙 — TIP #326Post della community
- Mario SantellaRelazione del ricercatore
- LinkedIn Pulse · VarshneyArticolo professionale
- Cybersecurity-Notes (3ls3if)Note del test di penetrazione
Inoltre, decine di post della community, tutorial e note di penetration test OSINT che fanno riferimento all'API.
Cosa Dicono i Nostri Utenti
Recensioni reali dai nostri clienti soddisfatti