...
How To Find Real IP Behind CloudFlare and WAF’s Featured Image

Disclaimer: The information in this article is provided for educational purpose only. The techniques described are commonly used by security researchers and penetration testers to evaluate the effectiveness of Web Application Firewall (WAF) deployments and to ensure that origin servers are properly protected.

Web application firewalls (WAFs) and the CDNs that power them—Cloudflare, Akamai, Amazon CloudFront, Fastly, etc.—sit between visitors and a site’s origin server. They proxy DNS, TLS and HTTP traffic, masking the real IP of the web server to reduce DDoS risk, absorb malicious traffic, and speed up content delivery. However, in certain cases—such as when performing a penetration test, troubleshooting performance issues, or verifying that private services are truly hidden—it becomes important to identify the actual backend server.

This is where guides on How To Find Real IP Behind CloudFlare and other WAF solutions come into play, helping security professionals confirm whether their protective layers are correctly configured.

Why You Might Need the Real IP 

  • Validate security posture: Confirm that sensitive services (SSH, RDP, admin panels) are not directly exposed once the WAF is bypassed.
  • Accurate vulnerability scanning: Many scanners fail when they only hit the CDN; talking to the origin reveals the true patch level and software stack.
  • Latency or routing analysis: Knowing where the server actually lives lets you optimise peering, choose nearer PoPs, or relocate workloads.
  • Incident response: If an attacker is targeting your backend IP directly, you need to see that traffic and block at the edge firewall.

Manual Step-by-Step Workflow to Find the Real IP Behind WAF

The goal is to gather tiny leaks—DNS records, certificates, mis-routed sub-domains—and confirm a live HTTP/S response that matches the target hostname.

Baseline DNS look-ups

  • Look up the A records (IPv4/IPv6) of the domain using tools like dig, nslookup, or online services like nslookup.io.
  • If the WAF is in place, the returned addresses usually belong to the provider (e.g., Cloudflare ranges).
  • A quick sanity check is to try different subdomains (e.g., mail.domain.com, ftp.domain.com) to see if any are pointed directly to the origin server instead of the WAF.
How To Find Real IP Behind CloudFlare and WAF's

    Manual Testing of Returned Addresses

    • Sometimes domains have multiple A records.
    • You can check each one manually in the browser or with curl.
    • If the WAF is active, you’ll usually see an error page or a block message. If you find one address that bypasses the WAF, it may be the origin server.
    Tracing the Real Server IP Behind WAF Protection

    Use Shodan

    • Shodan is a search engine for internet-connected devices.
    • Enter the domain name, known IPs, or SSL certificate details.
    • Why useful? Shodan stores historical scans of servers, including open ports, banners, and services. You may find the server’s IP address before it was placed behind the WAF, or other exposed services still resolving to the origin.
    Identifying the Origin IP Behind a WAF

    Check SecurityTrails

    • SecurityTrails provides historical DNS data.
    • You can review past A records (before the WAF was enabled).
    • Why useful? If the website was once exposed directly, older records might still point to the origin IP. Even if the DNS has been updated, the origin may still respond at that address.
    Identifying the Origin IP Behind a WAF

    Use FOFA

    • FOFA.info is a Chinese internet asset search engine (similar to Shodan or Censys).
    • It indexes domains, IPs, SSL certificates, and services.
    • You can search for the domain or related certificates to discover IP addresses tied to it.
    • Just like with Shodan, testing those addresses in the browser can reveal whether one is the live origin.
    Identifying the Origin IP Behind a WAF
    Identifying the Origin IP Behind a WAF

    ⚠️ Important Notes. Running these tests on systems you don’t own or don’t have permission to audit may be illegal. Always limit them to your own infrastructure or with explicit authorization.Used browser extensions to see if the site is protected by a WAF (like Amazon CloudFront). ​⁠

    These techniques are widely used in penetration testing, red teaming, and security audits to ensure proper WAF configuration.

    If the WAF is correctly deployed and the origin IP is well-hidden, none of these methods should expose the backend. That’s the ideal security outcome.

    Other Ways to Discover the Real IP Address Behind Protection

    In addition to DNS history, Shodan, and FOFA, security researchers sometimes use the following methods when testing their own infrastructure to check whether a Web Application Firewall (WAF) or reverse proxy is properly hiding the backend server.

    Examine SPF Records

    • What it is: SPF (Sender Policy Framework) records are DNS TXT records that define which servers can send email for a domain.
    • Why it matters: Sometimes, organizations accidentally include the origin server’s IP in their SPF records.
    • How to check:
      • Run dig TXT domain.com or use online SPF checkers.
      • Look for direct IP addresses or hostnames that might reveal the origin.

    Use ZoomEye

    • What it is: ZoomEye is another internet asset search engine, similar to Shodan and FOFA, but widely used in Asia.
    • Why it matters: It crawls the global internet and indexes devices, services, and SSL certificates.
    • How to use:
      • Search by domain, IP, or certificate details.
      • Cross-reference results with known WAF ranges. Non-WAF IPs may be the real server.

    VirusTotal and AlienVault OTX

    • VirusTotal: Aggregates malware scans and network information. When users upload suspicious files or URLs, VT logs associated IPs and domains.
    • AlienVault OTX (Open Threat Exchange): A collaborative threat intelligence platform that stores IP/domain relationships.
    • Why it matters: Both platforms often contain historical records linking domains to IPs, including those before a WAF was added.
    • How to use:
      • Search the domain on VirusTotal and AlienVault OTX.
      • Review the “Relations” or “Passive DNS” sections for possible origin IPs.

    Automating with Bash Scripts

    • What it is: Instead of manually checking different sources, security engineers often write simple Bash scripts to automate:
      • DNS lookups
      • API queries (Shodan, Censys, FOFA)
      • Masscurl requests against candidate IPs
    • Why it matters: Saves time and ensures consistency when testing multiple domains.
    • Example: A script could pull all historical IPs from SecurityTrails, then curl each one and log which respond with the real site content.

    Verification (Hosts File & Burp Suite)

    • Hosts file method:
      • Add a candidate IP and map it to the target domain in your /etc/hosts (Linux/macOS) or C:\Windows\System32\drivers\etc\hosts (Windows).
      • Open the domain in a browser. If it resolves directly to the origin and loads correctly, you’ve verified the IP.
    • Burp Suite method:
      • Configure Burp Suite to intercept traffic.
      • Send requests directly to the candidate IP while setting the Host header to the target domain.
      • If the server responds with the correct website content, that confirms the origin.

    Comparative Overview of WAF / WAAP Solutions

    Provider / SolutionType and Deployment OptionsExample Infrastructure or Edge NodesCountries / Global Presence
    Cloudflare WAFCloud‑based WAF, CDN, reverse proxyGlobal Anycast edge network, HTTP reverse proxyOperates in 100+ countries, hundreds of cities
    Imperva WAFCloud WAF + on-site appliance hybrid deploymentGateway filtering layer, DDoS scrubbing centresGlobal deployment; ~45 DDoS scrubbing centers
    AWS WAFCloud service integrated with AWS Application GatewayDeployed across AWS edge infrastructureGlobal AWS regions
    Akamai App & API ProtectorCloud-based WAF + DDoS protectionAkamai edge network with IP scoring mechanismsGlobal Akamai CDN presence
    Fortinet FortiWebPhysical appliance, virtual machine, or cloud serviceFront-end filter appliances or VM-based deploymentsMulti-region, enterprise-focused
    Imperva (Symantec WAF)On-premises and hybrid deploymentDeployed as appliance or hybrid gatewayEnterprise-scale but global coverage implied
    Azure Application Gateway WAFCloud-based ADC + WAF integrated into AzureRuns across Azure edge and regional data centersAvailable in Azure global regions
    Barracuda WAFHardware, virtual appliance, private cloud, SaaSEdge/layer-level WAF appliancesBroad availability, enterprise customers
    AppTrana (Indusface)Cloud WAAP (Web Application & API Protection)Cloud-managed platformGlobal, enterprise-grade
    ModSecurityOpen-source module (Apache, NGINX, IIS), local proxyRuns on origin or proxy serverDeployable globally due to its open-source nature

    This table groups web-based services, CLI tools, browser extensions, and automation scripts into one place, making it easy to see their purpose.

    #Tool / ServiceTypeWhat It Does
    1WappalyzerBrowser extensionIdentifies technologies used by a website (CMS, frameworks, analytics) and can detect WAF presence.
    2ShodanSearch engineIndexes internet-connected devices and services; allows search by IP, domain, SSL certs, banners, etc.
    3DNSReconCLI tool (Python)Performs DNS enumeration, record analysis, and reverse lookups for domains.
    4NmapNetwork scannerScans networks/services; detects open ports, SSL/TLS certs, and running services.
    5ViewDNSWeb serviceProvides tools like reverse IP lookup, DNS history, WHOIS, and subdomain finders.
    6SecurityTrailsDNS/IP intelligence platformShows current and historical DNS, IP, and WHOIS data for domains and IPs.
    7SPF Record CheckerOnline checkerValidates and displays SPF (Sender Policy Framework) records for email security.
    8Favicon Hash GeneratorOnline utilityGenerates hash of a website’s favicon, often used to identify technologies or clusters of sites.
    9CensysSearch engineProvides data on hosts, domains, and SSL certs by scanning the global internet.
    10FOFASearch engine (China)Similar to Shodan/Censys; indexes IPs, domains, SSLs, and device fingerprints.
    11ZoomEyeSearch engineAnother Shodan/FOFA alternative, mainly popular in Asia; indexes IPs and connected devices.
    12VirusTotalThreat intelligence serviceAggregates antivirus scans, passive DNS, and shows related IPs/domains/subdomains.
    13AlienVault OTXThreat intel platformOpen community-driven database of IPs/domains linked to malicious or suspicious activity.
    14Burp SuiteWeb security testing toolIntercepts and manipulates web traffic; used for penetration testing and vulnerability analysis.
    15httpxCLI probing toolQuickly checks availability of IPs/URLs and returns HTTP status codes and server responses.
    16Multiple URL OpenerBrowser extension / toolOpens or checks multiple URLs/IPs at once, useful for bulk validation.
    17Bash scripts / one-linersCommand-line automationAutomates enumeration, filtering, and testing of IPs/domains using system tools (dig, curl, grep).

    Conclusion

    Unmasking an origin server is rarely a “single click.” Instead, you combine DNS archaeology, certificate intelligence, sub-domain misconfigurations, and direct HTTP probing until evidence converges on the same IP.

    While these techniques are essential for red-team assessments and blue-team hardening, always obtain proper authorisation before scanning or connecting; many jurisdictions treat unsolicited direct access as a violation of computer-misuse law.

    Used ethically, the process gives you the clarity you need to patch, firewall or relocate services that should never have been exposed.

    Frequently Asked Questions

    Yes. A cloud WAF like Cloudflare or Akamai uses its own IP ranges, which replace the origin server’s public IP in DNS.

    Yes. Cloudflare proxies DNS and HTTP traffic, masking the real server IP behind its network.

    Look at DNS records, HTTP headers, or use tools like Wappalyzer and dig—they reveal if traffic routes through a WAF/CDN.

    In cloud providers like AWS, you define an IP set (allowed or blocked ranges) and attach it to a WAF rule.

    Point DNS to the WAF/CDN, firewall off direct server access, and allow traffic only from the provider’s IP ranges.

    No. 1.1.1.1 is a DNS resolver; it doesn’t mask your IP—it only hides your DNS queries from ISPs.

    Restrict inbound traffic to only the WAF/CDN’s IP ranges, use ACLs, and close unused ports.

    An Access Control List that whitelists only the WAF/CDN IPs to reach the origin server, blocking direct access.

    Run nslookup domain.com to resolve DNS records and see which IP addresses are returned.

    Yes. Network firewalls and WAF gateways typically have IPs on the network interface they filter traffic through.

    Yes. A cloud WAF acts as a reverse proxy, inspecting and filtering HTTP/HTTPS traffic before it reaches the origin.

    Recommended Posts

    Insights & Inspirations: Our Blog

    Chat GPT Atlas Browser Review. What Does OpenAI Browser Has In It? - featured image
    Cybersecurity

    Chat GPT Atlas Browser Review. What Does OpenAI Browser Has In It?

    What Is OpenAI Browser? OpenAI Browser is not just a new ChatGPT feature, but a real step towards the smart internet. Simply put, it is an embedded browser that...

    11 min read
    Best Free Temporary Email Services For Tests And Registration - featured image
    Cybersecurity

    Best Free Temporary Email Services For Tests And Registration

    What Is a Temporary Email Temporary email is a one-time mailbox that does not last long, but makes life on the Internet safer and more convenient. You need it...

    12 min read
    Helium Browser in 2025: A Complete Review for Anonymous Browsing - featured image
    Antidetect Browsers Cybersecurity

    Helium Browser in 2025: A Complete Review for Anonymous Browsing

    What if a browser “light as helium” could hand you back control of the web: no telemetry, no ad sludge, no noise? We put that promise to the test. In this...

    9 min read
    What Is reCAPTCHA and Why It Exists - featured image
    Cybersecurity

    What Is reCAPTCHA and Why It Exists

    Let's try to start with the simplest one. Each of us has come across a situation at least once: you visit a website, you want to register or leave a comment,...

    13 min read
    How To Create Multiple Gmail Accounts And Manage Them Effectively - featured image
    Cybersecurity

    How To Create Multiple Gmail Accounts And Manage Them Effectively

    Why People Create Multiple Gmail Accounts Creating multiple Gmail accounts is a normal practice in 2025, especially for those who work online, manage projects,...

    11 min read
    Best Free Cloud Storages Up To 100 GB - featured image
    Cybersecurity

    Best Free Cloud Storages Up To 100 GB

    In short, in 2025, the cloud world has become incredibly diverse. Almost every user can choose their free cloud storage for specific tasks, from photo storage...

    10 min read
    Top 12 Best Free Email Services Besides Gmail - featured image
    Cybersecurity

    Top 12 Best Free Email Services Besides Gmail

    Life Without Gmail If you're tired of Google ads and algorithms, there are plenty of decent alternatives. The best free email services today not only offer a...

    11 min read
    How to Remove My Personal Data from the Internet Best Guide - featured image
    Cybersecurity

    How to Remove My Personal Data from the Internet Best Guide

    Today, the question “How to remove my personal data from the Internet?” is not only asked by cybersecurity specialists, but also by ordinary users. The reason...

    12 min read
    Best Free Antidetect Browsers 2025: Quick Comparison Guide - featured image
    Cybersecurity

    Best Free Antidetect Browsers 2025: Quick Comparison Guide

    This review covers only browsers that stay free permanently, not those with 3-, 7-, or 15-day trials. The goal isn’t to list every short-term demo, but to...

    8 min read
    TOP 10 Most Useful And Best Account Management Software Tools In 2025 - featured image
    Cybersecurity IP address

    TOP 10 Most Useful And Best Account Management Software Tools In 2025

    Best Account Management Software Right Now In short, the best system for managing multiple accounts is not a single application, but a bundle of tools where...

    12 min read
    Ultimate Top 10 Best Mobile Proxy Server Providers - featured image
    Proxy

    Ultimate Top 10 Best Mobile Proxy Server Providers

    What Is a Mobile Proxy A mobile proxy is a server that redirects your Internet traffic through real mobile networks (3G, 4G, 5G) using the IP addresses of...

    11 min read
    Which Android Cloud Emulator Is Worth It in 2025? Top 10 Picks - featured image
    Antidetect Browsers

    Which Android Cloud Emulator Is Worth It in 2025? Top 10 Picks

    As mobile technology evolves, developers, gamers, and businesses are increasingly turning to cloud-based Android emulators to run Android systems remotely....

    11 min read
    Easiest Ways Of How To Bypass Roblox Error 600 - featured image
    IP address VPN

    Easiest Ways Of How To Bypass Roblox Error 600

    If Roblox suddenly issues Error 600, do not rush to panic, in most cases it is just a connection failure or temporary authentication problems. The error means...

    6 min read
    Best Free Adblockers For All Occasions - featured image
    Cybersecurity

    Best Free Adblockers For All Occasions

    The Best Free Adblockers Right Now If you don't want to waste time on lengthy comparisons and are just looking for a working solution, here is a quick list of...

    13 min read
    Best Practices of How to Avoid AI Detection in Your Content - featured image
    Cybersecurity

    Best Practices of How to Avoid AI Detection in Your Content

    What Is AI Detection and How to Easily Avoid It To put it simply, AI detection is a system that tries to “catch” text written by artificial intelligence by...

    9 min read