Free Bluesky account lookup
Resolve any Bluesky handle or DID to a public profile via the official AT Protocol AppView. Returns the display name, avatar, banner, bio, follower/following counts, post count, account-creation date, DID identifier, and a direct link to the public RSS feed for ongoing passive monitoring.
For OSINT investigations: the DID is the permanent identifier โ if a user changes their handle, the DID stays the same. The PLC directory link in the metadata exposes the full DID document with key rotation history, useful for verifying account continuity. The public RSS feed lets you subscribe to a target without following them.
Bluesky is the post-Twitter-API destination for many journalists, activists, and infosec researchers. The AT Protocol's federation model means the public AppView is open to anyone with no key required โ the same data that powers the Bluesky web client.
Frequently asked questions
What can I look up?
Anyone with a Bluesky handle (e.g. jay.bsky.team, username.bsky.social) or a DID identifier (e.g. did:plc:z72i7hdynmk6r22z27h6tvur). The lookup returns display name, avatar, banner, bio, follower/following counts, post count, account creation date, and DID.
Why is the DID interesting?
A DID (Decentralized Identifier) is permanent across handle changes. If a user renames themselves on Bluesky, the DID stays the same. For OSINT, you can resolve any past handle to its current handle by going through the DID. The "PLC directory" link in the metadata shows the full DID document with key-rotation history.
Can I monitor a Bluesky account passively?
Yes. Every Bluesky account has a public RSS feed at bsky.app/profile/{handle}/rss that lists their posts. Add it to any RSS reader for notification-free monitoring. The "RSS feed" link in the metadata above is pre-built for the looked-up account.
Is this a comprehensive social search?
No โ this only confirms a single Bluesky account. For multi-platform username search across 500+ services see the
Username Search page. For other federated networks see the
Mastodon Lookup tool.