...
How To Find Real IP Behind CloudFlare and WAF’s Featured Image

Disclaimer: The information in this article is provided for educational purpose only. The techniques described are commonly used by security researchers and penetration testers to evaluate the effectiveness of Web Application Firewall (WAF) deployments and to ensure that origin servers are properly protected.

Web application firewalls (WAFs) and the CDNs that power them—Cloudflare, Akamai, Amazon CloudFront, Fastly, etc.—sit between visitors and a site’s origin server. They proxy DNS, TLS and HTTP traffic, masking the real IP of the web server to reduce DDoS risk, absorb malicious traffic, and speed up content delivery. However, in certain cases—such as when performing a penetration test, troubleshooting performance issues, or verifying that private services are truly hidden—it becomes important to identify the actual backend server.

This is where guides on How To Find Real IP Behind CloudFlare and other WAF solutions come into play, helping security professionals confirm whether their protective layers are correctly configured.

Why You Might Need the Real IP 

  • Validate security posture: Confirm that sensitive services (SSH, RDP, admin panels) are not directly exposed once the WAF is bypassed.
  • Accurate vulnerability scanning: Many scanners fail when they only hit the CDN; talking to the origin reveals the true patch level and software stack.
  • Latency or routing analysis: Knowing where the server actually lives lets you optimise peering, choose nearer PoPs, or relocate workloads.
  • Incident response: If an attacker is targeting your backend IP directly, you need to see that traffic and block at the edge firewall.

Manual Step-by-Step Workflow to Find the Real IP Behind WAF

The goal is to gather tiny leaks—DNS records, certificates, mis-routed sub-domains—and confirm a live HTTP/S response that matches the target hostname.

Baseline DNS look-ups

  • Look up the A records (IPv4/IPv6) of the domain using tools like dig, nslookup, or online services like nslookup.io.
  • If the WAF is in place, the returned addresses usually belong to the provider (e.g., Cloudflare ranges).
  • A quick sanity check is to try different subdomains (e.g., mail.domain.com, ftp.domain.com) to see if any are pointed directly to the origin server instead of the WAF.
How To Find Real IP Behind CloudFlare and WAF's

    Manual Testing of Returned Addresses

    • Sometimes domains have multiple A records.
    • You can check each one manually in the browser or with curl.
    • If the WAF is active, you’ll usually see an error page or a block message. If you find one address that bypasses the WAF, it may be the origin server.
    Tracing the Real Server IP Behind WAF Protection

    Use Shodan

    • Shodan is a search engine for internet-connected devices.
    • Enter the domain name, known IPs, or SSL certificate details.
    • Why useful? Shodan stores historical scans of servers, including open ports, banners, and services. You may find the server’s IP address before it was placed behind the WAF, or other exposed services still resolving to the origin.
    Identifying the Origin IP Behind a WAF

    Check SecurityTrails

    • SecurityTrails provides historical DNS data.
    • You can review past A records (before the WAF was enabled).
    • Why useful? If the website was once exposed directly, older records might still point to the origin IP. Even if the DNS has been updated, the origin may still respond at that address.
    Identifying the Origin IP Behind a WAF

    Use FOFA

    • FOFA.info is a Chinese internet asset search engine (similar to Shodan or Censys).
    • It indexes domains, IPs, SSL certificates, and services.
    • You can search for the domain or related certificates to discover IP addresses tied to it.
    • Just like with Shodan, testing those addresses in the browser can reveal whether one is the live origin.
    Identifying the Origin IP Behind a WAF
    Identifying the Origin IP Behind a WAF

    ⚠️ Important Notes. Running these tests on systems you don’t own or don’t have permission to audit may be illegal. Always limit them to your own infrastructure or with explicit authorization.Used browser extensions to see if the site is protected by a WAF (like Amazon CloudFront). ​⁠

    These techniques are widely used in penetration testing, red teaming, and security audits to ensure proper WAF configuration.

    If the WAF is correctly deployed and the origin IP is well-hidden, none of these methods should expose the backend. That’s the ideal security outcome.

    Other Ways to Discover the Real IP Address Behind Protection

    In addition to DNS history, Shodan, and FOFA, security researchers sometimes use the following methods when testing their own infrastructure to check whether a Web Application Firewall (WAF) or reverse proxy is properly hiding the backend server.

    Examine SPF Records

    • What it is: SPF (Sender Policy Framework) records are DNS TXT records that define which servers can send email for a domain.
    • Why it matters: Sometimes, organizations accidentally include the origin server’s IP in their SPF records.
    • How to check:
      • Run dig TXT domain.com or use online SPF checkers.
      • Look for direct IP addresses or hostnames that might reveal the origin.

    Use ZoomEye

    • What it is: ZoomEye is another internet asset search engine, similar to Shodan and FOFA, but widely used in Asia.
    • Why it matters: It crawls the global internet and indexes devices, services, and SSL certificates.
    • How to use:
      • Search by domain, IP, or certificate details.
      • Cross-reference results with known WAF ranges. Non-WAF IPs may be the real server.

    VirusTotal and AlienVault OTX

    • VirusTotal: Aggregates malware scans and network information. When users upload suspicious files or URLs, VT logs associated IPs and domains.
    • AlienVault OTX (Open Threat Exchange): A collaborative threat intelligence platform that stores IP/domain relationships.
    • Why it matters: Both platforms often contain historical records linking domains to IPs, including those before a WAF was added.
    • How to use:
      • Search the domain on VirusTotal and AlienVault OTX.
      • Review the “Relations” or “Passive DNS” sections for possible origin IPs.

    Automating with Bash Scripts

    • What it is: Instead of manually checking different sources, security engineers often write simple Bash scripts to automate:
      • DNS lookups
      • API queries (Shodan, Censys, FOFA)
      • Masscurl requests against candidate IPs
    • Why it matters: Saves time and ensures consistency when testing multiple domains.
    • Example: A script could pull all historical IPs from SecurityTrails, then curl each one and log which respond with the real site content.

    Verification (Hosts File & Burp Suite)

    • Hosts file method:
      • Add a candidate IP and map it to the target domain in your /etc/hosts (Linux/macOS) or C:\Windows\System32\drivers\etc\hosts (Windows).
      • Open the domain in a browser. If it resolves directly to the origin and loads correctly, you’ve verified the IP.
    • Burp Suite method:
      • Configure Burp Suite to intercept traffic.
      • Send requests directly to the candidate IP while setting the Host header to the target domain.
      • If the server responds with the correct website content, that confirms the origin.

    Comparative Overview of WAF / WAAP Solutions

    Provider / SolutionType and Deployment OptionsExample Infrastructure or Edge NodesCountries / Global Presence
    Cloudflare WAFCloud‑based WAF, CDN, reverse proxyGlobal Anycast edge network, HTTP reverse proxyOperates in 100+ countries, hundreds of cities
    Imperva WAFCloud WAF + on-site appliance hybrid deploymentGateway filtering layer, DDoS scrubbing centresGlobal deployment; ~45 DDoS scrubbing centers
    AWS WAFCloud service integrated with AWS Application GatewayDeployed across AWS edge infrastructureGlobal AWS regions
    Akamai App & API ProtectorCloud-based WAF + DDoS protectionAkamai edge network with IP scoring mechanismsGlobal Akamai CDN presence
    Fortinet FortiWebPhysical appliance, virtual machine, or cloud serviceFront-end filter appliances or VM-based deploymentsMulti-region, enterprise-focused
    Imperva (Symantec WAF)On-premises and hybrid deploymentDeployed as appliance or hybrid gatewayEnterprise-scale but global coverage implied
    Azure Application Gateway WAFCloud-based ADC + WAF integrated into AzureRuns across Azure edge and regional data centersAvailable in Azure global regions
    Barracuda WAFHardware, virtual appliance, private cloud, SaaSEdge/layer-level WAF appliancesBroad availability, enterprise customers
    AppTrana (Indusface)Cloud WAAP (Web Application & API Protection)Cloud-managed platformGlobal, enterprise-grade
    ModSecurityOpen-source module (Apache, NGINX, IIS), local proxyRuns on origin or proxy serverDeployable globally due to its open-source nature

    This table groups web-based services, CLI tools, browser extensions, and automation scripts into one place, making it easy to see their purpose.

    #Tool / ServiceTypeWhat It Does
    1WappalyzerBrowser extensionIdentifies technologies used by a website (CMS, frameworks, analytics) and can detect WAF presence.
    2ShodanSearch engineIndexes internet-connected devices and services; allows search by IP, domain, SSL certs, banners, etc.
    3DNSReconCLI tool (Python)Performs DNS enumeration, record analysis, and reverse lookups for domains.
    4NmapNetwork scannerScans networks/services; detects open ports, SSL/TLS certs, and running services.
    5ViewDNSWeb serviceProvides tools like reverse IP lookup, DNS history, WHOIS, and subdomain finders.
    6SecurityTrailsDNS/IP intelligence platformShows current and historical DNS, IP, and WHOIS data for domains and IPs.
    7SPF Record CheckerOnline checkerValidates and displays SPF (Sender Policy Framework) records for email security.
    8Favicon Hash GeneratorOnline utilityGenerates hash of a website’s favicon, often used to identify technologies or clusters of sites.
    9CensysSearch engineProvides data on hosts, domains, and SSL certs by scanning the global internet.
    10FOFASearch engine (China)Similar to Shodan/Censys; indexes IPs, domains, SSLs, and device fingerprints.
    11ZoomEyeSearch engineAnother Shodan/FOFA alternative, mainly popular in Asia; indexes IPs and connected devices.
    12VirusTotalThreat intelligence serviceAggregates antivirus scans, passive DNS, and shows related IPs/domains/subdomains.
    13AlienVault OTXThreat intel platformOpen community-driven database of IPs/domains linked to malicious or suspicious activity.
    14Burp SuiteWeb security testing toolIntercepts and manipulates web traffic; used for penetration testing and vulnerability analysis.
    15httpxCLI probing toolQuickly checks availability of IPs/URLs and returns HTTP status codes and server responses.
    16Multiple URL OpenerBrowser extension / toolOpens or checks multiple URLs/IPs at once, useful for bulk validation.
    17Bash scripts / one-linersCommand-line automationAutomates enumeration, filtering, and testing of IPs/domains using system tools (dig, curl, grep).

    Conclusion

    Unmasking an origin server is rarely a “single click.” Instead, you combine DNS archaeology, certificate intelligence, sub-domain misconfigurations, and direct HTTP probing until evidence converges on the same IP.

    While these techniques are essential for red-team assessments and blue-team hardening, always obtain proper authorisation before scanning or connecting; many jurisdictions treat unsolicited direct access as a violation of computer-misuse law.

    Used ethically, the process gives you the clarity you need to patch, firewall or relocate services that should never have been exposed.

    Frequently Asked Questions

    Yes. A cloud WAF like Cloudflare or Akamai uses its own IP ranges, which replace the origin server’s public IP in DNS.

    Yes. Cloudflare proxies DNS and HTTP traffic, masking the real server IP behind its network.

    Look at DNS records, HTTP headers, or use tools like Wappalyzer and dig—they reveal if traffic routes through a WAF/CDN.

    In cloud providers like AWS, you define an IP set (allowed or blocked ranges) and attach it to a WAF rule.

    Point DNS to the WAF/CDN, firewall off direct server access, and allow traffic only from the provider’s IP ranges.

    No. 1.1.1.1 is a DNS resolver; it doesn’t mask your IP—it only hides your DNS queries from ISPs.

    Restrict inbound traffic to only the WAF/CDN’s IP ranges, use ACLs, and close unused ports.

    An Access Control List that whitelists only the WAF/CDN IPs to reach the origin server, blocking direct access.

    Run nslookup domain.com to resolve DNS records and see which IP addresses are returned.

    Yes. Network firewalls and WAF gateways typically have IPs on the network interface they filter traffic through.

    Yes. A cloud WAF acts as a reverse proxy, inspecting and filtering HTTP/HTTPS traffic before it reaches the origin.

    Recommended Posts

    Insights & Inspirations: Our Blog

    No-Code Data Scraping: Best Tools in 2026 - featured image
    Scraping

    No-Code Data Scraping: Best Tools in 2026

    In today's data-driven world, information is power, but scraping it from the web has traditionally required technical expertise. No-code data scraping tools are...

    9 min read
    Top 5 Residential Backconnect Proxy Providers 2026 - featured image
    Proxy

    Top 5 Residential Backconnect Proxy Providers 2026

    A residential backconnect proxy is aspecialized proxy service that pulls IP addresses from a large pool of real residential users. Unlike typical data center...

    5 min read
    Social Media Privacy Guide: Protecting your data - featured image
    Cybersecurity

    Social Media Privacy Guide: Protecting your data

    Previously, we discussed how to stay anonymous online in 2025. But what about social media specifically? You casually browse an online store for running shoes,...

    5 min read
    Biu Biu VPN 2025: Full Review of Privacy, Speed, and Usability   - featured image
    VPN

    Biu Biu VPN 2025: Full Review of Privacy, Speed, and Usability  

    Biu Biu VPN is a free service designed to help users browse safely and access blocked websites. Many turn to it for basic privacy and unrestricted browsing. But...

    8 min read
    Best Free VPN for Google Chrome in 2026 (Top Safe and Fast Picks)  - featured image
    VPN

    Best Free VPN for Google Chrome in 2026 (Top Safe and Fast Picks) 

    A free VPN for Chrome can help you hide your IP, bypass simple restrictions, and add a layer of protection. But not every free VPN is safe, and many Chrome...

    10 min read
    Top Free Android Antivirus Apps: What Really Works in 2025 - featured image
    Cybersecurity

    Top Free Android Antivirus Apps: What Really Works in 2025

    If you check your email, pay bills, install apps, or use public Wi-Fi on your Android phone every day, you've probably thought at least once, "Is...

    8 min read
    Top Internet Speed Test Services in 2025: Honest Breakdown  - featured image
    IP address

    Top Internet Speed Test Services in 2025: Honest Breakdown 

    You only really notice your internet connection when it starts to annoy you. Video calls freeze. Streams buffer. Games lag right at the crucial...

    9 min read
    Top Antidetect Browsers for Linux Users in 2025 - featured image
    Antidetect Browsers

    Top Antidetect Browsers for Linux Users in 2025

    An antidetect browser is a multi-profile browser that allows users to separate online activities by creating multiple independent browsing environments. Each...

    8 min read
    How to Have a Public IP Address and Why You Might Need One - featured image
    IP address

    How to Have a Public IP Address and Why You Might Need One

    If you've ever tried to host a website, set up remote access, or simply understand your network better, you’ve probably wondered how to get a public IP address....

    7 min read
    Best DNS Leak Test Checkers of 2025 — Comprehensive Guide - featured image
    Antidetect Browsers Cybersecurity

    Best DNS Leak Test Checkers of 2025 — Comprehensive Guide

    A DNS Leak Test Checker helps you find out whether your real DNS requests are leaking outside your secure connection. A DNS leak exposes the domains you visit...

    8 min read
    Good Telegram Alternatives You Should Know About - featured image
    Cybersecurity

    Good Telegram Alternatives You Should Know About

    Why Look For A Telegram Alternative In 2025, more and more users are thinking about finding a Telegram alternative — and the reasons for this are quite serious....

    9 min read
    Easy Ways Of How To Bypass CAPTCHA Human Verification - featured image
    Antidetect Browsers Cybersecurity Proxy VPN

    Easy Ways Of How To Bypass CAPTCHA Human Verification

    It is not possible to bypass CAPTCHA human verification directly and it is not necessary. The correct way to “bypass” is not to hack, but to eliminate the...

    13 min read
    Chat GPT Atlas Browser Review. What Does OpenAI Browser Has In It? - featured image
    Cybersecurity

    Chat GPT Atlas Browser Review. What Does OpenAI Browser Has In It?

    What Is OpenAI Browser? OpenAI Browser is not just a new ChatGPT feature, but a real step towards the smart internet. Simply put, it is an embedded browser that...

    11 min read
    Best Free Temporary Email Services For Tests And Registration - featured image
    Cybersecurity

    Best Free Temporary Email Services For Tests And Registration

    What Is a Temporary Email Temporary email is a one-time mailbox that does not last long, but makes life on the Internet safer and more convenient. You need it...

    12 min read
    Helium Browser in 2025: A Complete Review for Anonymous Browsing - featured image
    Antidetect Browsers Cybersecurity

    Helium Browser in 2025: A Complete Review for Anonymous Browsing

    What if a browser “light as helium” could hand you back control of the web: no telemetry, no ad sludge, no noise? We put that promise to the test. In this...

    9 min read