Free Removal Playbook →

How to Check If Someone Is Using Your Identity (Warning Signs and Next Steps)

Something feels off. Maybe it’s a bill you didn’t recognize, a credit card you never applied for, or a call from a debt collector about an account you’ve never heard of. These are the moments when people start wondering whether someone else is using their personal information.

Knowing how to check if someone is using your identity can be the difference between catching the problem early and spending months untangling a nightmare. This guide walks you through the warning signs, the steps to confirm whether your identity has been compromised, and exactly what to do if it has.

One of the most common ways identity thieves get your personal information is through data brokers — companies that collect and sell your name, address, phone number, and more to anyone willing to pay. Run a free Optery scan to see how many broker sites currently have your data exposed. Reducing that exposure is one of the most effective ways to prevent identity theft in the first place.

Warning Signs That Someone May Be Using Your Identity

Identity theft doesn’t always announce itself with a dramatic moment. More often, it starts with small signals that are easy to dismiss. Here are the most common warning signs to watch for.

Unfamiliar accounts or charges. You see transactions on your bank or credit card statements that you don’t recognize. Even small charges matter — identity thieves often test stolen information with small purchases before making larger ones.

Bills or collection notices for accounts you didn’t open. If you receive a bill from a credit card company, medical provider, or utility you’ve never done business with, someone may have opened an account in your name.

Unexpected credit score changes. A sudden drop in your credit score without any obvious cause can indicate that someone has opened accounts, missed payments, or run up debt under your identity.

Missing mail. If you stop receiving expected bills or financial statements, an identity thief may have changed your mailing address to intercept your documents.

IRS notices. Getting a tax notice about income you didn’t earn or being told your return has already been filed when you haven’t filed yet is a strong indicator of tax-related identity theft.

Medical bills for services you didn’t receive. Medical identity theft happens when someone uses your information to get healthcare, prescriptions, or insurance claims. This can also corrupt your medical records with someone else’s health information.

Denied applications. Being turned down for credit, insurance, or employment due to information in your background that doesn’t match your history can signal that someone else’s activity is being attributed to you.

How to Check If Someone Is Using Your Identity

If you’ve noticed any of the warning signs above, here’s how to investigate further and confirm whether your identity has been compromised.

Check Your Credit Reports

Pull your credit reports from all three major bureaus — Experian, Equifax, and TransUnion. You’re entitled to free weekly reports at AnnualCreditReport.com. Look for accounts you don’t recognize, inquiries you didn’t initiate, addresses you’ve never lived at, and employers you’ve never worked for.

This is the single most effective way to check if someone is using your identity for financial fraud. Any unfamiliar account or hard inquiry is a red flag that requires immediate action. For a walkthrough, read our guide on how to check your credit report for free.

Check Have I Been Pwned

Visit Have I Been Pwned and enter your email addresses. This free tool shows you whether your data has been exposed in any known data breaches. If your email, passwords, or personal information were compromised in a breach, that data may be in circulation and could be used for identity theft. Read our guide on how to check if your email has been hacked.

Check Your Data Broker Exposure

Data brokers are one of the primary sources identity thieves use to gather the personal information they need — your full name, address, phone number, date of birth, and family members. Run a free Optery scan to see how many broker sites have your information right now. The more exposed you are, the higher your risk.

Review Your Bank and Credit Card Statements

Go through at least the last three months of statements from every bank account and credit card you own. Look for any transaction you don’t recognize, no matter how small. Identity thieves often start with small test charges — a dollar or two — before escalating to larger purchases or transfers.

Check Your Social Security Statement

Create an account at SSA.gov (if you haven’t already) and review your Social Security statement. Look for earnings reported under your Social Security number from employers you’ve never worked for. This can indicate that someone is using your SSN for employment. For more on SSN exposure, read our guide on how to check if your SSN is on the dark web.

Search Your Name Online

Google yourself in quotes. Look for addresses you don’t recognize, phone numbers that aren’t yours, or accounts and profiles you didn’t create. Data broker listings that show incorrect information mixed in with your real information can indicate that someone else’s activity is being merged with your profile. Read our guide on what shows up when someone Googles your name.

What to Do If Your Identity Has Been Compromised

If your investigation confirms that someone is using your identity, take these steps immediately.

Freeze Your Credit

Contact all three credit bureaus and place a credit freeze. This prevents anyone — including you — from opening new accounts under your Social Security number until you lift the freeze. It’s free, it takes about 10 minutes per bureau, and it’s the single most effective action you can take to stop financial identity theft in its tracks. Read our complete guide to freezing your credit.

File an FTC Identity Theft Report

Go to IdentityTheft.gov and file a report with the Federal Trade Commission. This creates an official record of the theft and generates a personalized recovery plan with specific steps based on your situation. The FTC report is also useful when disputing fraudulent accounts with creditors.

File a Police Report

Contact your local police department and file a report. While police often can’t investigate identity theft directly, the police report creates an official record that creditors and financial institutions may require when removing fraudulent accounts.

Contact Your Financial Institutions

Notify every bank, credit card company, and financial institution you use. Close or lock any compromised accounts, dispute unauthorized transactions, and request new account numbers and cards. Most institutions have dedicated fraud departments that can expedite this process.

Remove Your Data from Broker Sites

Reduce your exposure to prevent further damage. Incogni removes your personal information from 420+ data brokers automatically for $7.99/month, cutting off the supply of data that identity thieves rely on. Optery provides screenshot verification of every removal if you want visual proof. You can also do it manually through our data broker opt-out guide, though it takes significantly more time.

How to Prevent Identity Theft Going Forward

Once you’ve addressed the immediate threat, these ongoing steps keep you protected:

  • Keep your credit frozen and only temporarily lift it when you need to apply for credit
  • Use a data removal service like Incogni to keep your personal information off broker sites on an ongoing basis
  • Enable two-factor authentication on every financial and email account
  • Use a password manager to create unique passwords for every account
  • Set up Google Alerts for your name to catch new exposures early
  • Monitor your credit reports regularly — at minimum every quarter

Identity theft is almost always preventable. The less personal data available about you online, the harder it is for someone to impersonate you. Start with a free Optery scan to see your current exposure, then take action to shut it down.

For the complete privacy protection framework, read our guide on how to remove your personal information from the internet.