How to Locate and Delete Accounts Linked to Your Email Address

Most people have over 100 online accounts—many forgotten. Here's how to find them, assess the risk, and clean up what you no longer need.

12 min read

Ask someone how many online accounts they use and you usually hear the same answer.

"Ten or fifteen. Maybe twenty."

That sounds reasonable. It just isn't accurate.

Research from password managers and identity security firms shows that the average person has well over 100 online accounts, with some estimates pushing that number closer to 200 or more. These accounts build up slowly over time, which is why most people never notice.

  • A shopping site you used once.
  • A work tool from an old job.
  • An app you tried and deleted.
  • A newsletter signup you forgot about.

Each one asked for an email. And each one kept it.

Creating an account takes seconds. Cleaning them up takes time. Because of that, most accounts stick around long after you stop using them.

Why It's Worth Finding Accounts Linked to Your Email

Your email address connects more things than most people realize.

It's what you use to sign in, reset passwords, confirm identity, and allow apps to connect. When someone tries to piece together where your information shows up online, your email is usually the starting point.

When people finally take the time to review what's connected to one email address, they often find:

  • Services they don't remember signing up for
  • Old tools still using weak or reused passwords
  • Apps that can still read or send messages
  • Exposure from past data breaches they never knew about

This doesn't mean something bad has already happened. But it does explain why problems sometimes seem to come out of nowhere.

This isn't overthinking things. It's basic maintenance.

Old Accounts Don't Become Harmless Just Because You Stop Using Them

A common assumption is that unused accounts don't matter.

They do.

Even an account you haven't touched in years can still store personal details, login credentials, and recovery information. When a breach happens, attackers don't care whether you last logged in yesterday or in 2012.

They care that the account exists.

Breach Alert Reality

That's why people sometimes get breach alerts tied to services they barely remember using.

How to Find Accounts Linked to Your Email

There isn't a single tool that will show you every account you've ever created. Anyone who says otherwise is overselling it.

That said, a few practical steps will uncover most of them.

1. Start With Your Inbox

Your inbox is the best record you have.

Search for phrases like:

  • "Welcome to"
  • "Verify your email"
  • "Confirm your account"
  • "Account created"
  • "Reset your password"
mail.google.com
Found 127 results
  • SpotifyMar 2019

    Welcome to Spotify! Confirm your email

  • DropboxJan 2018

    Verify your email address

  • LinkedInNov 2016

    Welcome to LinkedIn! Get started

  • AirbnbAug 2017

    Your Airbnb account is ready

  • CanvaFeb 2020

    Account created successfully

Load 122 more results...

Then scroll back further than feels comfortable. Older emails often reveal accounts you completely forgot about.

If you've used the same email for years, this step alone can uncover a long list.

2. Check Which Apps Still Have Email Access

Most email providers show which apps and services currently have permission to access your account.

This view usually exposes:

  • Old subscriptions
  • Apps you tested once and abandoned
  • Services you don't recognize at all
myaccount.google.com/permissions
Third-party app access
2 apps have risky access levels
  • N
    Notion
    Read email messages • 2 days ago
  • C
    Calendly
    Read & modify calendar • 1 week ago
  • U
    Unknown AppReview
    Full account access • 3 years ago
  • O
    Old CRM ToolReview
    Send email on your behalf • 2 years ago
  • Z
    Zapier
    Read contacts • 1 month ago

Because this list comes straight from your email provider, it's usually accurate. If you're not using something anymore, remove access.

3. Look Through Saved Browser Passwords

Browsers like Chrome store passwords to make logins easier. They also keep a quiet history of where you've signed up.

Reviewing saved passwords shows:

  • Accounts created automatically with autofill
  • Websites you no longer remember visiting
  • Services still tied to your email
passwords.google.com
Saved Passwords
147 passwords
  • amazon.com
    you@email.com
    Weak
    4 years ago
  • netflix.com
    you@email.com
    Strong
    6 months ago
  • oldservice.io
    you@email.com
    Breached
    5 years ago
  • github.com
    you@email.com
    Strong
    1 year ago
  • randomsite.net
    you@email.com
    Weak
    3 years ago
Password health:
1 breached 23 weak 123 strong

Even if you haven't logged in for years, the account often still exists.

4. Revisit Social Logins You Forgot You Used

Social logins are convenient. They're also easy to forget.

Take a look at:

myaccount.google.com/connections

Most people are surprised by how long these lists are.

5. Use Free Lookup Tools to Catch What You Missed

Some free tools scan public information to show where your email appears. They won't find everything, but they can surface exposure that's hard to spot manually.

Useful options include:

  • epieos.com for public profile lookups
  • SEON (free tier or extension) for email-related signals
  • Have I Been Pwned for breach history
haveibeenpwned.com
4 profiles found
2 breaches
Public Profiles
LinkedIn
Social Profile
Gravatar
Avatar Service
GitHub
Developer
Spotify
Music
Data Breaches
Adobe 2013
153M records • Email, password hints
LinkedIn 2016
164M records • Email, passwords

These tools work best as backup, not as a single solution.

What You Probably Won't Find

It helps to keep expectations realistic.

You likely won't uncover:

  • Private accounts with no email notifications
  • Locked profiles you never verified
  • One-time logins that never sent confirmation messages
The goal isn't to find everything. It's to reduce unnecessary risk.

A Few Misunderstandings That Slow People Down

Some beliefs make this process harder than it needs to be:

  • No single tool finds everything
  • Forgetting an account doesn't always mean fraud
  • A clean social profile doesn't remove all risk
  • Free tools can't see private data

Once you accept these limits, the process becomes much smoother.

What to Do After You Find the Accounts

Finding accounts is only the first step.

Once you identify them:

1
Delete Unused Accounts

Go through your list and remove any accounts you no longer need. Most services have an account deletion option in settings.

2
Update Weak Passwords

For accounts you want to keep, update any weak or reused passwords. Use unique, strong passwords for each service.

3
Remove Unknown App Access

Revoke permissions from apps you don't recognize or no longer use. This prevents them from accessing your data.

4
Enable Security Alerts

Turn on login notifications and security alerts. Without them, you often find out about breaches after damage has already happened.

Account Cleanup Progress
Account Cleanup Checklist
Progress 50%
  • Delete unused accounts
  • Update weak passwords
  • Remove unknown app access
  • Enable security alerts
2 of 4 tasks completed

Alerts Are Essential

Alerts matter. Without them, people often find out about breaches after damage has already happened.

Why This Matters Beyond Personal Cleanup

This goes beyond tidying things up.

Banks, payment services, marketplaces, and fraud prevention systems all look at signals tied to your email when deciding whether to trust an account.

Old exposure, unused access points, and messy account histories don't show up anywhere you can see. But they still influence decisions in the background.

That's why cleaning this up often prevents problems you never even knew were possible.

Final Thoughts

You don't need special tools to understand where your email shows up online.

You need a bit of time, some patience, and a willingness to look further back than you expect.

You won't find everything. That's normal.

What matters is reducing risk, cutting unnecessary access, and knowing where your email has been used—instead of guessing.

Your email is one of the most important pieces of information you have. Treat it with that level of care.