Find the real IP behind Cloudflare, check all DNS records, detect CDN providers, and analyse domain infrastructure — all in one tool.
github.com, reddit.com, wordpress.comQueries all DNS record types (A, AAAA, MX, NS, TXT, CNAME, SOA) live via Cloudflare DoH API.
Detects Cloudflare by checking nameservers, IP ranges, and known CDN signatures.
Checks SPF, DMARC, and DKIM records to evaluate email authentication security posture.
Identifies if a domain uses Cloudflare, AWS, Fastly, Akamai, or other CDN providers.
DNS resolves to a Cloudflare IP address (e.g. 104.21.x.x) — NOT your real server.
Cloudflare's network receives the request, applies WAF rules, DDoS protection, and caching.
Cloudflare contacts your real server using the origin IP stored in their system.
Cloudflare returns the response to the user. The real server IP never appears in public DNS.
Common subdomains like mail., cpanel., ftp., direct., or webmail. sometimes bypass Cloudflare and expose the origin IP.
Email servers are often hosted on the origin server or same network. MX record IPs can reveal the hosting provider or real IP range.
Services like SecurityTrails and ViewDNS store historical DNS records from before Cloudflare was added. Old A records reveal the origin.
SPF records, domain verification records, and custom TXT entries sometimes contain references to the real hosting infrastructure.
Certificates may contain Subject Alternative Names (SANs) revealing internal hostnames or other domains sharing the same origin server.
Search engines for internet-connected devices can find servers that respond to your domain's SSL certificate, revealing origin IPs.