Industries

Overview

Industries We Serve

Discover who we empower to make the world safer.

Professional Practices

Private Investigators

Giving private investigators access to extensive digital information.

Risk Protection

Identifying threats with live data to aid risk management.

Insurance & Fraud

Detecting fraud and mitigating risks with real-time analysis.

Cyber Security

Discovering, assessing and mitigating potential cyber threats.

Law Professionals

Aiding legal professionals in digital evidence-gathering.

Anti-Money Laundering

Boosting AML efforts with actionable intelligence on suspicious activity.

Service Sectors

Government
Free Access

Empowering governments with swift digital identity verification.

Law Enforcement
Free Access

Providing tools for law enforcement to accurately track digital footprints.

Journalism
Free Access

Enabling journalists to authenticate sources and combat disinformation.

Non-Profits
Free Access

Helping investigative non-profits make the world a safer place.

Products
OSINT PlatformAPIEnterprisePalette
Insights
Intel HubCase StudiesTraining LogPublications
Contact
Our TeamContact Us
TrainingPricing
Sign Up
Search Now
All Guides & Information
The Intel Hub
Guides & Information

Cracking the Shells: A Guide to OSINT and Shell Companies

Written by
OSINT Industries Team
on
July 22, 2025
Share this post

When it comes to corporate structures, shell companies are perhaps the most deceptive. 

Whilst seeming clean on paper, these entities are often used to hide ownership, obscure illicit flows of money, or distance specific identities from controversy. But under the sharp gaze of an intrepid OSINT investigator, even the best-built corporate cover can start to crack.

In this guide, we’ll walk you through the techniques used by OSINT professionals when investigating shell corporations: where to look, and what to avoid. We’ll reveal how to follow the hidden money (without tipping off your targets), and break through even the toughest shell corporations to find the truth within. So no matter how perfect a Fibonacci spiral of fraud your target has built, you’ll understand how to get to the data you need. Let’s get cracking.

What are Shell Companies, and Why Use OSINT?

A shell company is a business entity that exists on paper, but lacks active business operations. Like a shell around the ‘meat’ of an individual’s real activity, a shell corporation can misdirect attention for whatever reason the owner requires. Most shell corporations are designed to be opaque; often involving nominee directors or offshore jurisdictions, and labyrinthine ownership structures. 

Whilst shell companies can be used for legitimate reasons (like corporate restructuring), they’re also commonly used to mask illicit activities: money laundering, tax evasion, bribery, sanctions evasion… the usual suspects. They can even be used for identity protection - severing connections between an individual and their publicly recorded activity, which is attributed to the company instead. This has a number of legitimate applications, like hiding politically exposed persons (PEPs), for example. But it’s easy to imagine nefarious ones, too. 

You can probably already see how OSINT and shell companies might work together. Although difficult for multiple reasons, OSINT investigations are the best, most effective way to burrow under the surface and discover what’s really going on beneath the shell. By leveraging open data sources - from corporate registries to leaks, social media, vessel tracking, and more - you can reveal the people, payments, and patterns that shell structures are built to protect.

(Want to brush up on the basics? For a 101 guide, check out ‘OSINT Basics: What is OSINT?’)

Diving for Treasure: OSINT Techniques for Discovering Shell Corporations

To break through a shell company’s façade, you need structured, repeatable techniques. This section introduces the core OSINT methods used by investigators working with OSINT and shell companies; exposing ownership trails, asset links, and jurisdictional loopholes that are being exploited by the shell-owners. Here’s our step-by-step strategy for OSINT and shell corporations.

1. Map the Company Structure

The first step to breaking into a shell corporation is understanding its structure. How has the owner organised their shell company, and how is it working to obscure their activities? Start with what little you know: like a name, or a rough location. Maybe you know the jurisdiction where the company is administrated, or even its registration number. Take this information and plug it into public corporate registries, like:

  • OpenCorporates (for legal-entity data from US and global companies
  • ICIJ Offshore Leaks Database (for featured in the Paradise Papers, Panama Papers, Pandora Papers, Bahama Leaks and more)
  • Companies House (for UK companies)

While you’re trawling the corporate seabed, always keep your goal in mind: to map out the complex ecosystem of shareholders, directors, parent companies, and registration addresses connected to your target shell corporation. Keep an eye out for red flags that might signify murky waters; like repeated use of different mailboxes or corporate service providers. 

If the company has nominees with dozens of separate directorships, you may have discovered the nexus of a shell corporation network. You can then take this fishy-looking data and combine it with other types of OSINT analysis. The overlap of corporate data with personal details (LinkedIn bios, reused email addresses) could identify the hermit crab hidden within the corporate shell.

2. Hunt for Leaks and Litigation

When investigating OSINT around shell corporations, leaks and legal documents can give you priceless information about who owns what, and what they’re using it for - especially if they’re doing something nefarious. Use tools like the ICIJ Offshore Leaks Database - alongside similar tools for different jurisdictions and purposes - to check if the organisation you’re investigating has been featured in any recent high-profile leaks. Look for data from leaks like: 

  • Panama Papers / Paradise Papers - One of the most historic high-profile leaks of offshore entity data, with over 11.5million files exposed. These documents, taken from the archives of an offshore tax law firm, have provided OSINT data to expose countless shell corporations connected to the world’s most powerful figures.
  • FinCEN Files - A leak of more than 2500 documents, covering over 2trillion dollars of transactions between international banks and high-net-worth individuals. These leaks exposed OSINT data around shell companies used for sanction workarounds, money laundering, and other suspicious activity. 

After leaks, look into litigation. Search for lawsuits around suspicious transfers, or any mentions of your target shell corporation in publicly-recorded legal disputes. These databases can contain depositions, emails, and affidavits - alongside other documents that could help substantiate your suspicions.

3. Follow the Money (and Assets)

Shell companies are often used to hold or move funds or assets: from cash, to yachts and planes, to real estate. On the less flashy end, they could be moving chemicals, or even counterfeit goods. You can use OSINT to find what a shell company owns, and what they’re doing with it:

  • MarineTraffic and VesselFinder show shipping assets tied to a given corporation
  • ADS-B Exchange and FlightRadar24 can track corporate jets
  • Property databases - from Zillow to land registry portals - are often searchable by company

Also, look for assets, products or funds that could be related to the kind of activities you have suspicions the shell corp may be involved in. For example, OSINT Industries’ platform has been used to uncover shell corporations that were obscuring the Chinese fentanyl trade. OSINT investigator Julian connected chemical asset transports with fentanyl dealing, using OSINT data gathered on Chinese shell corporations. 

Don’t forget to look for incongruities between company and assets, too. A “dormant” company that owns a $25M Gulfstream jet? A “consultancy” that bought four penthouses? Smells like a shell.

4. Correlate Their Digital Footprints

This should be pretty basic if you’re a seasoned OSINT investigator, but it still bears repeating; always correlate your data with other sources. This is how you turn OSINT data into actionable insights; turning your mapped-out ecosystem, public legal-entity documents, and asset info into a provable record of your shell corporation, its activities -  and its owners. It’s the perfect way to link a shell corporation with a specific person. 

  • Use LinkedIn, Facebook, and Twitter to look for employees, directors, or relatives.
  • Cross-check email addresses for repeats or links to online accounts
  • Review company websites and domain registrations for connections with any of the data you’ve gathered so far. 

Some of the best discoveries in OSINT shell corporation investigations happen by mistake: maybe a director forgot to switch LinkedIn profiles before updating a fake consultancy, or a shell firm reused an IP address from another shady entity. Even metadata or a reused phone number can connect multiple entities.

In Deep Water: Legal Risks With OSINT and Shell Companies

Shell companies often overlap with sensitive issues; like financial crime investigations, state secrets, and even disgruntled individuals who might want to put a stop to your digging around in their business. To keep yourself safe while working with OSINT on shell corps. 

  • Know your jurisdiction’s privacy and data handling laws: GDPR, CCPA, UK DPA, etc.
  • Be wary of “accidental” scraping of protected financial data or login-only environments. 
  • Use caution when profiling politically exposed persons (PEPs) or publishing names, especially when linking them to shell structures.

Both OSINT and shell companies are a legal grey zone in some countries; you can land yourself in some serious trouble if you get too involved. To be on the safe side, work with legal counsel or compliance experts if needed, especially before publication. 

As for keeping yourself hidden, the best defense against being discovered by your targets is good OpSec, and clean digital hygiene. Check out our guide to covering your tracks while investigating, and learn how to preserve your OSINT cyber hygiene. It’s especially vital for sensitive missions like OSINT on shell corporations. 

Read more here: Scrubbing Up on OSINT Cyber Hygiene (Best Practices)

Swimming with the Current: OSINT on Shell Corporations is Easier with OSINT Industries

Cracking a shell corporation with OSINT doesn’t have to be difficult - if you have the tools to do it. OSINT Industries can automate queries and do all the heavy lifting for you, in just a fraction of the time a human would take. Plus, by focusing only on public data with clear source attribution, OSINT tools like ours ensure effortless compliance with data protection laws like GDPR, CCPA, and CAN-SPAM. That’s why cutting-edge tools like OSINT Industries are essential for shell corp investigations; they do all the deep-diving and shell-cracking for you, so you can get to work on analysing the pearls.

‍

OSINT platform free trial

Try the world's most popular OSINT platform for free. Elevate your enterprise investigations with unmatched accuracy.

Get Free Trial
Get our OSINT newsletter.

The latest and greatest of all-things-OSINT at your fingertips, every two weeks.

By subscribing you agree to our Privacy Policy.

Start your free enterprise trial

Get Free Trial

Reveal what's behind any contact, instantly.

Search Now

Related intel for you

View all
Guides & Information
Oct 2025

Google OSINT: Using Google Profiles in OSINT Investigations

Google OSINT taps into profiles, YouTube, Maps, Docs & more. Learn how to ethically uncover OSINT data across Google's massive ecosystem.
Guides & Information
Oct 2025

Digital Due Diligence: Why Businesses Need Email to Social Media Lookup

Every online account is linked to an email. Learn how businesses leverage OSINT email-to-social lookup for fraud prevention, due diligence & stronger security.
Guides & Information
Oct 2025

Wiping the Prints: Managing Your OSINT Digital Footprint With OpSec

Protect your OSINT digital footprint. Learn how to stay anonymous, avoid tracking, and investigate safely with proven tools, tips, and best practices.
View all
Get our OSINT newsletter.

The latest and greatest of all-things-OSINT at your fingertips, every two weeks.

#OSINT4Good
Law EnforcementGovernmentJournalismNon-Profits
Industry
Insurance + FraudCyber SecurityLaw ProfessionalsAnti-Money LaunderingPrivate InvestigatorsDigital Risk Protection
Solutions
OSINT PlatformOSINT TrainingEnterprise API Access
Request Free Access
Law EnforcementGovernmentJournalistsNon-Profits
Join the Community
Twitter
YouTube
LinkedIn
Bluesky
Telegram (Updates)
Telegram (Community)
© 2025 OSINT. All right reserved.
Terms of UseEthics & CompliancePrivacy PolicyContact us