How To Find Real IP Behind CloudFlare and WAF’s Featured Image

Disclaimer: The information in this article is provided for educational purpose only. The techniques described are commonly used by security researchers and penetration testers to evaluate the effectiveness of Web Application Firewall (WAF) deployments and to ensure that origin servers are properly protected.

Web application firewalls (WAFs) and the CDNs that power them—Cloudflare, Akamai, Amazon CloudFront, Fastly, etc.—sit between visitors and a site’s origin server. They proxy DNS, TLS and HTTP traffic, masking the real IP of the web server to reduce DDoS risk, absorb malicious traffic, and speed up content delivery. However, in certain cases—such as when performing a penetration test, troubleshooting performance issues, or verifying that private services are truly hidden—it becomes important to identify the actual backend server.

This is where guides on How To Find Real IP Behind CloudFlare and other WAF solutions come into play, helping security professionals confirm whether their protective layers are correctly configured.

Why You Might Need the Real IP 

  • Validate security posture: Confirm that sensitive services (SSH, RDP, admin panels) are not directly exposed once the WAF is bypassed.
  • Accurate vulnerability scanning: Many scanners fail when they only hit the CDN; talking to the origin reveals the true patch level and software stack.
  • Latency or routing analysis: Knowing where the server actually lives lets you optimise peering, choose nearer PoPs, or relocate workloads.
  • Incident response: If an attacker is targeting your backend IP directly, you need to see that traffic and block at the edge firewall.

Manual Step-by-Step Workflow to Find the Real IP Behind WAF

The goal is to gather tiny leaks—DNS records, certificates, mis-routed sub-domains—and confirm a live HTTP/S response that matches the target hostname.

Baseline DNS look-ups

  • Look up the A records (IPv4/IPv6) of the domain using tools like dig, nslookup, or online services like nslookup.io.
  • If the WAF is in place, the returned addresses usually belong to the provider (e.g., Cloudflare ranges).
  • A quick sanity check is to try different subdomains (e.g., mail.domain.com, ftp.domain.com) to see if any are pointed directly to the origin server instead of the WAF.
How To Find Real IP Behind CloudFlare and WAF's

    Manual Testing of Returned Addresses

    • Sometimes domains have multiple A records.
    • You can check each one manually in the browser or with curl.
    • If the WAF is active, you’ll usually see an error page or a block message. If you find one address that bypasses the WAF, it may be the origin server.
    Tracing the Real Server IP Behind WAF Protection

    Use Shodan

    • Shodan is a search engine for internet-connected devices.
    • Enter the domain name, known IPs, or SSL certificate details.
    • Why useful? Shodan stores historical scans of servers, including open ports, banners, and services. You may find the server’s IP address before it was placed behind the WAF, or other exposed services still resolving to the origin.
    Identifying the Origin IP Behind a WAF

    Check SecurityTrails

    • SecurityTrails provides historical DNS data.
    • You can review past A records (before the WAF was enabled).
    • Why useful? If the website was once exposed directly, older records might still point to the origin IP. Even if the DNS has been updated, the origin may still respond at that address.
    Identifying the Origin IP Behind a WAF

    Use FOFA

    • FOFA.info is a Chinese internet asset search engine (similar to Shodan or Censys).
    • It indexes domains, IPs, SSL certificates, and services.
    • You can search for the domain or related certificates to discover IP addresses tied to it.
    • Just like with Shodan, testing those addresses in the browser can reveal whether one is the live origin.
    Identifying the Origin IP Behind a WAF
    Identifying the Origin IP Behind a WAF

    ⚠️ Important Notes. Running these tests on systems you don’t own or don’t have permission to audit may be illegal. Always limit them to your own infrastructure or with explicit authorization.Used browser extensions to see if the site is protected by a WAF (like Amazon CloudFront). ​⁠

    These techniques are widely used in penetration testing, red teaming, and security audits to ensure proper WAF configuration.

    If the WAF is correctly deployed and the origin IP is well-hidden, none of these methods should expose the backend. That’s the ideal security outcome.

    Other Ways to Discover the Real IP Address Behind Protection

    In addition to DNS history, Shodan, and FOFA, security researchers sometimes use the following methods when testing their own infrastructure to check whether a Web Application Firewall (WAF) or reverse proxy is properly hiding the backend server.

    Examine SPF Records

    • What it is: SPF (Sender Policy Framework) records are DNS TXT records that define which servers can send email for a domain.
    • Why it matters: Sometimes, organizations accidentally include the origin server’s IP in their SPF records.
    • How to check:
      • Run dig TXT domain.com or use online SPF checkers.
      • Look for direct IP addresses or hostnames that might reveal the origin.

    Use ZoomEye

    • What it is: ZoomEye is another internet asset search engine, similar to Shodan and FOFA, but widely used in Asia.
    • Why it matters: It crawls the global internet and indexes devices, services, and SSL certificates.
    • How to use:
      • Search by domain, IP, or certificate details.
      • Cross-reference results with known WAF ranges. Non-WAF IPs may be the real server.

    VirusTotal and AlienVault OTX

    • VirusTotal: Aggregates malware scans and network information. When users upload suspicious files or URLs, VT logs associated IPs and domains.
    • AlienVault OTX (Open Threat Exchange): A collaborative threat intelligence platform that stores IP/domain relationships.
    • Why it matters: Both platforms often contain historical records linking domains to IPs, including those before a WAF was added.
    • How to use:
      • Search the domain on VirusTotal and AlienVault OTX.
      • Review the “Relations” or “Passive DNS” sections for possible origin IPs.

    Automating with Bash Scripts

    • What it is: Instead of manually checking different sources, security engineers often write simple Bash scripts to automate:
      • DNS lookups
      • API queries (Shodan, Censys, FOFA)
      • Masscurl requests against candidate IPs
    • Why it matters: Saves time and ensures consistency when testing multiple domains.
    • Example: A script could pull all historical IPs from SecurityTrails, then curl each one and log which respond with the real site content.

    Verification (Hosts File & Burp Suite)

    • Hosts file method:
      • Add a candidate IP and map it to the target domain in your /etc/hosts (Linux/macOS) or C:\Windows\System32\drivers\etc\hosts (Windows).
      • Open the domain in a browser. If it resolves directly to the origin and loads correctly, you’ve verified the IP.
    • Burp Suite method:
      • Configure Burp Suite to intercept traffic.
      • Send requests directly to the candidate IP while setting the Host header to the target domain.
      • If the server responds with the correct website content, that confirms the origin.

    Comparative Overview of WAF / WAAP Solutions

    Provider / SolutionType and Deployment OptionsExample Infrastructure or Edge NodesCountries / Global Presence
    Cloudflare WAFCloud‑based WAF, CDN, reverse proxyGlobal Anycast edge network, HTTP reverse proxyOperates in 100+ countries, hundreds of cities
    Imperva WAFCloud WAF + on-site appliance hybrid deploymentGateway filtering layer, DDoS scrubbing centresGlobal deployment; ~45 DDoS scrubbing centers
    AWS WAFCloud service integrated with AWS Application GatewayDeployed across AWS edge infrastructureGlobal AWS regions
    Akamai App & API ProtectorCloud-based WAF + DDoS protectionAkamai edge network with IP scoring mechanismsGlobal Akamai CDN presence
    Fortinet FortiWebPhysical appliance, virtual machine, or cloud serviceFront-end filter appliances or VM-based deploymentsMulti-region, enterprise-focused
    Imperva (Symantec WAF)On-premises and hybrid deploymentDeployed as appliance or hybrid gatewayEnterprise-scale but global coverage implied
    Azure Application Gateway WAFCloud-based ADC + WAF integrated into AzureRuns across Azure edge and regional data centersAvailable in Azure global regions
    Barracuda WAFHardware, virtual appliance, private cloud, SaaSEdge/layer-level WAF appliancesBroad availability, enterprise customers
    AppTrana (Indusface)Cloud WAAP (Web Application & API Protection)Cloud-managed platformGlobal, enterprise-grade
    ModSecurityOpen-source module (Apache, NGINX, IIS), local proxyRuns on origin or proxy serverDeployable globally due to its open-source nature

    This table groups web-based services, CLI tools, browser extensions, and automation scripts into one place, making it easy to see their purpose.

    #Tool / ServiceTypeWhat It Does
    1WappalyzerBrowser extensionIdentifies technologies used by a website (CMS, frameworks, analytics) and can detect WAF presence.
    2ShodanSearch engineIndexes internet-connected devices and services; allows search by IP, domain, SSL certs, banners, etc.
    3DNSReconCLI tool (Python)Performs DNS enumeration, record analysis, and reverse lookups for domains.
    4NmapNetwork scannerScans networks/services; detects open ports, SSL/TLS certs, and running services.
    5ViewDNSWeb serviceProvides tools like reverse IP lookup, DNS history, WHOIS, and subdomain finders.
    6SecurityTrailsDNS/IP intelligence platformShows current and historical DNS, IP, and WHOIS data for domains and IPs.
    7SPF Record CheckerOnline checkerValidates and displays SPF (Sender Policy Framework) records for email security.
    8Favicon Hash GeneratorOnline utilityGenerates hash of a website’s favicon, often used to identify technologies or clusters of sites.
    9CensysSearch engineProvides data on hosts, domains, and SSL certs by scanning the global internet.
    10FOFASearch engine (China)Similar to Shodan/Censys; indexes IPs, domains, SSLs, and device fingerprints.
    11ZoomEyeSearch engineAnother Shodan/FOFA alternative, mainly popular in Asia; indexes IPs and connected devices.
    12VirusTotalThreat intelligence serviceAggregates antivirus scans, passive DNS, and shows related IPs/domains/subdomains.
    13AlienVault OTXThreat intel platformOpen community-driven database of IPs/domains linked to malicious or suspicious activity.
    14Burp SuiteWeb security testing toolIntercepts and manipulates web traffic; used for penetration testing and vulnerability analysis.
    15httpxCLI probing toolQuickly checks availability of IPs/URLs and returns HTTP status codes and server responses.
    16Multiple URL OpenerBrowser extension / toolOpens or checks multiple URLs/IPs at once, useful for bulk validation.
    17Bash scripts / one-linersCommand-line automationAutomates enumeration, filtering, and testing of IPs/domains using system tools (dig, curl, grep).

    Conclusion

    Unmasking an origin server is rarely a “single click.” Instead, you combine DNS archaeology, certificate intelligence, sub-domain misconfigurations, and direct HTTP probing until evidence converges on the same IP.

    While these techniques are essential for red-team assessments and blue-team hardening, always obtain proper authorisation before scanning or connecting; many jurisdictions treat unsolicited direct access as a violation of computer-misuse law.

    Used ethically, the process gives you the clarity you need to patch, firewall or relocate services that should never have been exposed.

    Frequently Asked Questions

    Yes. A cloud WAF like Cloudflare or Akamai uses its own IP ranges, which replace the origin server’s public IP in DNS.

    Yes. Cloudflare proxies DNS and HTTP traffic, masking the real server IP behind its network.

    Look at DNS records, HTTP headers, or use tools like Wappalyzer and dig—they reveal if traffic routes through a WAF/CDN.

    In cloud providers like AWS, you define an IP set (allowed or blocked ranges) and attach it to a WAF rule.

    Point DNS to the WAF/CDN, firewall off direct server access, and allow traffic only from the provider’s IP ranges.

    No. 1.1.1.1 is a DNS resolver; it doesn’t mask your IP—it only hides your DNS queries from ISPs.

    Restrict inbound traffic to only the WAF/CDN’s IP ranges, use ACLs, and close unused ports.

    An Access Control List that whitelists only the WAF/CDN IPs to reach the origin server, blocking direct access.

    Run nslookup domain.com to resolve DNS records and see which IP addresses are returned.

    Yes. Network firewalls and WAF gateways typically have IPs on the network interface they filter traffic through.

    Yes. A cloud WAF acts as a reverse proxy, inspecting and filtering HTTP/HTTPS traffic before it reaches the origin.

    Recommended Posts

    Insights & Inspirations: Our Blog

    How Does IP Score Impact Your Online Reputation Management? - featured image
    IP address

    How Does IP Score Impact Your Online Reputation Management?

    In today’s digital world, your online reputation matters more than ever. Whether you’re an individual trying to maintain a positive personal image or a business...

    8 min read
    How to Change IP Address to EU on IPhone - featured image
    IP address

    How to Change IP Address to EU on IPhone

    What Is an IP Address and Why It Matters An IP address is like a home address in the digital world. But instead of a street and an apartment, you have a set of...

    13 min read
    IP Grabber Link: What It Is and How to Stay Safe - featured image
    Cybersecurity IP address

    IP Grabber Link: What It Is and How to Stay Safe

    One of the main threats to your online privacy today comes from an IP grabber. These tools can track your IP address without your consent, exposing your online...

    12 min read
    How to Use a Proxy Server in 2025 Easy Guide - featured image
    Proxy

    How to Use a Proxy Server in 2025 Easy Guide

    What Is a Proxy Server: The Middleman of the Internet A proxy is not a magic "hide me" button, but an intermediary. Imagine: You want to deliver a letter, but...

    16 min read
    How to Bypass Google CAPTCHA Easily - featured image
    Cybersecurity Scraping

    How to Bypass Google CAPTCHA Easily

    What Is Google Captcha and Shield Against Bots Captcha is short for the Completely Automated Public Turing test to tell Computers and Humans Apart. That is, a...

    24 min read
    All Types of Proxies Explained: What They Are and Which One to Use - featured image
    Proxy

    All Types of Proxies Explained: What They Are and Which One to Use

    Proxies can be confusing because the word “proxy” describes many different behaviors. This guide cuts through the noise by organizing all types of proxies the...

    12 min read
    10 Best WhatsApp Alternatives in 2025 (for Messaging & Video Calls) - featured image
    Cybersecurity

    10 Best WhatsApp Alternatives in 2025 (for Messaging & Video Calls)

    Why look beyond WhatsApp? You might want stronger privacy and transparency, independence from one ecosystem, resilience during outages, richer collaboration...

    12 min read
    Is WhatsApp Safe to Use in 2025? Security Risks You Should Know - featured image
    Cybersecurity

    Is WhatsApp Safe to Use in 2025? Security Risks You Should Know

    A couple of years ago, the question "is it safe to use WhatsApp" seemed theoretical — like, "well, this is a large, well-known service, everything should be...

    21 min read
    What Can Someone Do With Your IP Address? 5 Potential Risks - featured image
    IP address Cybersecurity

    What Can Someone Do With Your IP Address? 5 Potential Risks

    Whether we’re browsing the web, streaming movies, or interacting on social media, our devices are always sending and receiving data. Every device connected to...

    10 min read
    How to Clear Search History on iPhone in 2025 (All Apps) - featured image
    Cybersecurity

    How to Clear Search History on iPhone in 2025 (All Apps)

    If you just want the short answer: you can clear search history on iPhone from inside each app (Safari, Chrome, Firefox, YouTube) or, in Safari’s case, straight...

    15 min read
    X (Twitter Proxy) and How to Use It - featured image
    Proxy

    X (Twitter Proxy) and How to Use It

    Why Twitter and Proxies Go Hand in Hand Twitter is no longer the carefree platform it was ten years ago, when you could create dozens of accounts with impunity...

    12 min read
    Top-14 Unblocked Browsers 2025: Complete Guide to Safe and Free Internet Browsing - featured image
    Cybersecurity

    Top-14 Unblocked Browsers 2025: Complete Guide to Safe and Free Internet Browsing

    Today, over half the world’s population faces some kind of internet restriction. About 4.5 billion people dealt with blocked websites — at school, at work, or...

    12 min read
    How to Block IP Address Best Practices - featured image
    IP address

    How to Block IP Address Best Practices

    What Does "IP Block" Mean? Imagine that the Internet is a huge city, and each IP address is like a house number. When you "block the IP," you are essentially...

    16 min read
    What to Do If Someone Uses an IP Puller on You - featured image
    Cybersecurity IP address

    What to Do If Someone Uses an IP Puller on You

    The internet can be a fun and exciting place to connect with others, whether it’s for gaming, socializing, or working on a project. However, just like in the...

    8 min read
    Top 20 Best Proxy Server Providers of 2025 – The Ultimate Review - featured image
    Cybersecurity Proxy Recommended

    Top 20 Best Proxy Server Providers of 2025 – The Ultimate Review

    In today’s digital-first world, proxies have become a crucial tool for both individuals and businesses. No longer limited to questionable tactics like black hat...

    26 min read