
Closed
Posted
Paid on delivery
I am conducting an authorised security assessment on a website that currently sits behind Cloudflare. The owner has given me written permission to verify how well the service hides the origin server, and my first objective is simple: locate the true, routable IP address of that server. What I need from you • Discover the origin IP without disrupting production traffic or triggering any Cloudflare security events. • Confirm that browsing directly to the uncovered IP renders the site identically to the public domain (same content, layout, and functionality). • Provide a concise report describing the exact approach—whether you relied on passive DNS enumeration (dig, SecurityTrails, Shodan etc.), historical records, sub-domain leakage, server misconfiguration, or any other non-intrusive technique—so the owner can understand the exposure and remediate it. Acceptance criteria 1. A single IPv4 (and IPv6, if present) address that serves the live site outside Cloudflare. 2. Screenshot or screencast proof of the page loading from that raw address. 3. Step-by-step notes that another tester could follow to reproduce the result. This is a focused, one-off task; once the IP is confirmed and documented the engagement is complete. Please outline your estimated turnaround time along with any clarifying questions you might have.
Project ID: 40202070
14 proposals
Remote project
Active 13 days ago
Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
14 freelancers are bidding on average $23 USD for this job

Hello. I would like to help you with check security/hiding original server ip address after cloudflare issue. I have experience. Please read my feedback. Thank you.
$15 USD in 1 day
7.9
7.9

Hi there, I've carefully reviewed your project to discover the Cloudflare origin IP without disrupting live traffic. I have a strong background in security assessments and network reconnaissance, ensuring a non-intrusive approach that respects the production environment. - Utilize passive DNS enumeration and historical data sources like SecurityTrails and Shodan for IP discovery. - Verify direct IP access matches the public domain content and functionality without triggering any Cloudflare protections. - Provide a detailed, step-by-step report including screenshots for clear reproducibility and remediation guidance. **Skills:** ✅ Network Security & Penetration Testing — focused on Cloudflare bypass techniques ✅ Linux & Scripting — for safe data gathering and verification ✅ Passive DNS & OSINT tools — Shodan, SecurityTrails, dig ✅ Reporting & Documentation — clear, concise technical reports ✅ Risk-free Methodology — no production impact or security event triggers **Certificates:** ✅ Microsoft® Certified: MCSA | MCSE | MCT ✅ cPanel® & WHM Certified CWSA-2 I can deliver the findings within a day with full proof and documentation. Looking forward to your questions or clarifications to start immediately. What is the expected timeframe for delivery, and do you have any preferred tools or constraints for the discovery process? Best regards,
$30 USD in 1 day
6.7
6.7

Hello, I’m a Senior Network & Security Engineer with 10+ years of hands-on experience designing, implementing, and migrating enterprise and service-provider networks. I specialize in Network Security, SD-WAN, routing & switching, enterprise wireless, and secure network architecture, helping companies modernize legacy networks, improve reliability, and reduce WAN costs. Core expertise: - Firewalls & Security: FortiGate, Palo Alto, Cisco ASA / Firepower IPsec & SSL VPN, site-to-site, remote access, policy design - Routing & Switching: Cisco ASR/ISR, Catalyst, Nexus, Juniper Routers (M10, MX 960) and SRX 500 (BGP, OSPF, EIGRP, IS-IS, MPLS, VLANs, STP, HSRP/VRRP) Enterprise LAN & campus design - LAN Switching (Multi-Vendor): Cisco, Juniper, Meraki, HP, Aruba, FortiSwitch Access/core design, redundancy, QoS, segmentation - Enterprise Wireless: Cisco WLC & APs, Cisco Meraki Wi-Fi, Ubiquiti, Aruba Wi-Fi, FortiAP Coverage design, roaming, security, troubleshooting - SD-WAN: Fortinet SD-WAN, Cisco SD-WAN (Viptela), Cisco Meraki (hub-and-spoke, MPLS + Internet, segmentation, HA, traffic steering) - Cloud & Hybrid Networking: AWS / Azure / GCP Site-to-site VPN, routing integration - Network Automation: Python Certifications: CCIE Enterprise Cisco Certified Specialist – Enterprise SD-WAN Implementation CCNP Data Center CCNP Security Juniper JNCIA-Junos, JNCIA-Cloud If you share your current setup and goal, I can propose a clear and practical solution. Best regards,
$20 USD in 1 day
6.5
6.5

Hi, I have 8+ years of experience as a System Administrator with hands-on expertise in setting up and managing Linux web hosting and cloud servers, including server security, monitoring, and performance optimization. I work with Apache, Nginx, DNS, SSL, Cloudflare configuration and hosting panels such as cPanel/WHM, Plesk, and Virtualmin, and I also handle email server setup and email marketing environments. I provide complete server deployment along with SSL installation (free or paid), including HTTPS configuration and final verification to ensure everything works smoothly. Please discuss your requirements so we can get started. Thank you
$20 USD in 1 day
6.2
6.2

We at Offensium Vault Private Limited (ISO 27001:2022 & ISO 9001:2015) can assist with this authorised and focused security assessment. We have hands-on experience performing non-intrusive Cloudflare origin exposure checks for organisations to validate whether their real server IP is adequately protected. The assessment will be conducted strictly within written authorisation and without triggering Cloudflare security events or impacting production traffic. Our approach will include (passive & safe techniques only): • Passive DNS and historical record analysis • Subdomain and asset enumeration for IP leakage • Review of misconfigurations (headers, DNS records, mail servers, legacy endpoints) • Correlation using open intelligence sources and safe validation methods Deliverables you will receive: • Identified origin IPv4 / IPv6 address (if exposed) • Screenshot or screen recording proving the site loads directly via the raw IP • Clear, step-by-step methodology so the exposure can be reproduced and fixed • Short remediation guidance to properly lock the origin behind Cloudflare Turnaround time: Typically 24–48 hours from access/authorization confirmation. This will be handled ethically, quietly, and professionally, aligned with industry best practices. Happy to proceed immediately once authorisation details are confirmed. — Offensium Vault Private Limited (ISO 27001:2022 & ISO 9001:2015)
$50 USD in 7 days
3.1
3.1

Hi there! Finding a website’s origin IP behind Cloudflare can be tricky without triggering security alerts or affecting live traffic. A careful, non-intrusive approach is key to maintain the site’s integrity during testing. I have experience conducting authorized security assessments and passive reconnaissance for websites. I can use safe techniques like passive DNS, Shodan, SecurityTrails, subdomain enumeration, and historical records. I focus on accurate results while ensuring zero disruption to production environments. I provide clear documentation so site owners understand any exposure and how to remediate it. I will locate the origin IP (IPv4/IPv6 if present) and confirm it serves identical content. I’ll provide screenshots or screencast proof of the page loading from the raw address. I will deliver step-by-step notes of my methodology for reproducibility and clarity. check our work https://www.freelancer.com/u/ayesha86664 Do you want me to prioritize IPv6 discovery as well, or focus mainly on IPv4? Let me know if you’re interested & we can discuss it. Best Regards Ayesha
$20 USD in 2 days
0.0
0.0

Hi, I’ve reviewed your authorised Cloudflare Origin IP Discovery task and I’m confident I can locate the true origin IP using strictly non-intrusive methods, with no disruption to production or triggering Cloudflare events. With solid experience in Web Security, Cloudflare configurations, passive DNS and historical data analysis, I will assemble a concise, evidence-based approach that reveals the origin visibility and exposure, while keeping you fully informed. What you’ll get: (1) a single IPv4 address (and IPv6 if present) serving the live site outside Cloudflare; (2) a screenshot or screencast proving the site loads from the raw IP; (3) a step-by-step, reproducible report describing the exact methods used (passive DNS, historical records, subdomain leakage, or other non-intrusive techniques) and remediation notes. Turnaround: I can begin immediately and deliver within 1–2 days, with a brief clarifying question addressed upfront to align scope. Best regards,
$25 USD in 6 days
0.0
0.0

I have very high experience in waf bypassing so hire me I can make sure i get you original ip atleast by chance of 95% and i can do extensive recon with shodan , security trails etc .I give you post exploitation poc too. thank you
$20 USD in 7 days
0.0
0.0

I can help with this authorized Cloudflare origin discovery task. I’ll use non-intrusive, passive techniques only (DNS history, certificate transparency, OSINT sources like SecurityTrails/Shodan, subdomain and configuration leakage checks) without generating traffic spikes or triggering Cloudflare security events. Once a candidate origin IP is identified, I’ll verify that accessing the site directly via the raw IP renders the same content and functionality as the public domain. You’ll receive: - The discovered IPv4/IPv6 address (if exposed) - Screenshots/screencast proving direct access - A concise report explaining the exact approach and findings, so the issue can be remediated Estimated turnaround: same day or within 24 hours.
$20 USD in 7 days
0.0
0.0

Having dedicated my career to internet and network security, I can confidently assert that your project falls right into the sweet spot of my expertise. As a seasoned penetration tester, I specialize in identifying potential vulnerabilities, and uncovering Cloudflare IP addresses is a common challenge that I have successfully tackled before.
$25 USD in 1 day
0.0
0.0

Pristina, Kosovo
Payment method verified
Member since Sep 20, 2024
$30-250 USD
€750-1500 EUR
$30-250 USD
$250-750 USD
$250-750 USD
₹1500-12500 INR
$25-50 USD / hour
₹400-750 INR / hour
₹1500-12500 INR
$250-750 USD
$60 USD
$30-250 USD
€250-750 EUR
$10-30 USD
$30-250 USD
$30-250 USD
$10-30 USD
$30-250 USD
$4500-5300 USD
$250-750 USD
$30-250 USD
$30-250 AUD
$30-250 USD
₹1500-12500 INR