Smiley face
Smiley face

Tuesday, March 25, 2014

Finding Real IP Behind Cloudflare

Today im going to share with you how to find the real ip behind Cloudflare.
Please note that this wont work to 100% because most of the owners are very smart and change all kind of subdomains to redirect to Cloudflare.
So this is quite basic and easy to use i have used these tools all the time and havent spent time buying ebooks that says go to this resolver and enter site and you will get ip and baam!, Just No , It doesn't work that way.


1. Checking Dns Records & Ping

Lets go ahead and visit network-tools.com.

Image has been scaled down 55% (870x430). Click this bar to view original image (1919x948). Click image to open in new window.
[Image: tDxMXjL.png]

There you are going the enter the site adress in the box and press Go.

Here's a example:

Code:
IP address: 193.70.231.61
Host name: site.com
Alias: site.com
193.70.231.61 is from Costa Rica(CR) in region South and Central America

TraceRoute from Network-Tools.com to 193.70.231.61 [site.com]
Hop    (ms)    (ms)    (ms)             IP Address    Host name
1       0       0       63          206.123.64.46       - 
2       0       1       0          173.219.246.92      173-219-246-92-link.sta.suddenlink.net 
3       53       6       9          206.223.118.145      xe-0-0-3.edge01.dfw01.as13335.net 
4       0       0       0          193.70.231.21       - 
Trace complete


Retrieving DNS records for site.com...
DNS servers
dog.ns.cloudflare.com [173.245.59.110]
gail.ns.cloudflare.com [173.245.58.116]

Answer records
site.com        A    193.70.231.61    30s
site.com        A    190.93.253.61    30s
site.com        MX   
preference:    10
exchange:    direct-connect.site.com 30s
site.com        MX   
preference:    20
exchange:    ftp.site.com
30s
site.com        99    [47 bytes]    30s
site.com        TXT    v=spf1 a mx include:_spf.elasticemail.com ~all    300s
site.com        NS     dog.ns.cloudflare.com    86400s
site.com        NS     gail.ns.cloudflare.com    86400s
site.com        SOA   
server:    dog.ns.cloudflare.com
email:    dns@cloudflare.com
serial:    2014228352
refresh:    10000
retry:    2400
expire:    604800
minimum ttl:    3600

Now the point here is trying to get a subdomain so in this case we have one here:

Code:
exchange:    direct-connect.site.com 30s
Now let's ping it and see if we get a diffrent ip adress then the one that was assigned to the site.

You can open up cmd and ping it there by using this command "ping yoursite.com" or just go to
 network-tools.com and press ping & enter the subdomain.

Code:
Sending Ping-Signal to direct-connect.site.com [216.146.33.2] with 32 byte data:
Reply From 216.146.33.2: byte=32 time=105ms TTL=241
Reply From 216.146.33.2: byte=32 time=104ms TTL=241
Reply From 216.146.33.2: byte=32 time=106ms TTL=241
Reply From 216.146.33.2: byte=32 time=105ms TTL=241

So now we got another IP

Code:
216.146.33.2


Now lets reverse the IP by going to http://www.ip-adress.com/reverse_ip/
And enter the Ip we got earlier.

Code:
13 Hosts on this IP

Now we can see clearly that site.com is there and that means that we got the real Ip of the site.

2. Site History

This has always been useful you can check the ip that the site had earlier but it's not always succesful.
For me it works if the site is kinda old and has recently managed to change to Cloudflare.


Go to this link http://toolbar.netcraft.com/site_report?url=site.com and change site.com to your desired site.

Code:
Netblock owner    IP address    OS    Web server    Last seen Refresh
CloudFlare CDN network    141.101.121.13    Linux    cloudflare-nginx    24-Jan-2014
CloudFlare CDN network    176.53.060.45    Linux    cloudflare-nginx    24-Jan-2014
CloudFlare CDN network    176.53.060.45    unknown    cloudflare-nginx    24-Jan-2014
CloudFlare Latin America S.R.L San Jos    126.23.260.47    unknown    cloudflare-nginx     4-Jan-2014
CloudFlare Latin America S.R.L San Jos    126.23.260.47    Linux    cloudflare-nginx     4-Jan-2014
CloudFlare Latin America S.R.L San Jos    190.93.251.97    Linux    cloudflare-nginx     2-Jan-2014
CloudFlare Latin America S.R.L San Jos    126.23.260.47    Linux    cloudflare-nginx    29-Dec-2013
CloudFlare Latin America S.R.L San Jos    190.93.251.97    Linux    cloudflare-nginx    23-Dec-2013
CloudFlare Latin America S.R.L San Jos    126.23.260.47    Linux    cloudflare-nginx    18-Dec-2013
AltusHost Inc.                            190.93.251.97    Linux    12-Dec-2013

3. Bypassing by WHM-SSL Trick

This method is a good one also but it works 45% in the most of the cases so it's worth a shoot.

Lets say we have site.com now open the site and just add "/cgi-sys/defaultwebpage.cgi" at the end.

Image has been scaled down 55% (870x429). Click this bar to view original image (1919x946). Click image to open in new window.
[Image: f4ic8Hp.png]

Now we know that the method works so lets add /whm at the end of it.

Image has been scaled down 55% (870x457). Click this bar to view original image (1919x1008). Click image to open in new window.
[Image: YqAzs9h.png]

Note that the url changed now the url you got just ping it in cmd and see if you get a diffrent Ip adress if you do then congratz!, you got the site ip yippie!Thumbup

Hope you Guys enjoyed because it was a hell of writing but im proud of how it came out and this is how tutorials should be written in the future

0 Comments:

Post a Comment

Smiley face
Smiley face