All these methods are based on bad admin configurations, but still are quite common
If you want to find real I.P. address of website, which is hidden by CLOUDFLARE. It has came to my attention that many booters, hosts, malicious websites, and more use CloudFlare for DDoS Protection & Anti-Abuse Report Protection. With CloudFlare protection, it is difficult to get the hosts IP; therefore, it is difficult to send an abuse report or launch a (D)DoS attack. This simple guide will help you obtain any website protected by CloudFlare's real IP, which can be used for whatever you desire!
METHOD 1:-
If you simply ping the domain , it will give i.p. which is not website`s real i.p. address. you should try following option to get real I.P. address of domain.
ping direct-connect.domain.com
OR
ping direct.domain.com
OR
ping ftp.domain.com
OR
ping cpanel.domain.com
OR
ping mail.domain.com
METHOD 2 :-
For a Long Aged Domain you can use netcraft toolbar to check real ip
For Example
Code:
http://toolbar.netcraft.com/site_report?url=DOMAIN.COM
Clearly We can see change in IP to a cloudflare one.
METHOD 3 :-
You can try bruteforcing DNS , some subdomain will have real IP of website.
For this purpose you need NMAP tools.
Open your terminal with root privellege & type following code
# nmap -sV -sS -F <target>
it will scan host & give results , it`s not give real i.p. of website.(but from this you can know weather website is protected by CLOUDFLARE or not)
Now type following code in terminal
# nmap --script dns-brute -sn <target>
it will give you real I.P. of website.
I made simple bash script which do all things for you.For more details click here.
IF all of above methods does not work ;then there is no admin misconfiguration. So you cannot find real I.P.
If you want to find real I.P. address of website, which is hidden by CLOUDFLARE. It has came to my attention that many booters, hosts, malicious websites, and more use CloudFlare for DDoS Protection & Anti-Abuse Report Protection. With CloudFlare protection, it is difficult to get the hosts IP; therefore, it is difficult to send an abuse report or launch a (D)DoS attack. This simple guide will help you obtain any website protected by CloudFlare's real IP, which can be used for whatever you desire!
METHOD 1:-
If you simply ping the domain , it will give i.p. which is not website`s real i.p. address. you should try following option to get real I.P. address of domain.
ping direct-connect.domain.com
OR
ping direct.domain.com
OR
ping ftp.domain.com
OR
ping cpanel.domain.com
OR
ping mail.domain.com
METHOD 2 :-
For a Long Aged Domain you can use netcraft toolbar to check real ip
For Example
Code:
http://toolbar.netcraft.com/site_report?url=DOMAIN.COM
Clearly We can see change in IP to a cloudflare one.
METHOD 3 :-
You can try bruteforcing DNS , some subdomain will have real IP of website.
For this purpose you need NMAP tools.
Open your terminal with root privellege & type following code
# nmap -sV -sS -F <target>
it will scan host & give results , it`s not give real i.p. of website.(but from this you can know weather website is protected by CLOUDFLARE or not)
Now type following code in terminal
# nmap --script dns-brute -sn <target>
it will give you real I.P. of website.
I made simple bash script which do all things for you.For more details click here.
IF all of above methods does not work ;then there is no admin misconfiguration. So you cannot find real I.P.
0 nhận xét:
Đăng nhận xét