anmolksachan

Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network

10
3
69% credibility
Found Feb 28, 2026 at 10 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

CloudFail is a security tool that reveals the original IP addresses of websites protected by Cloudflare by querying public certificate transparency logs and passive DNS records.

How It Works

1
🔍 Discover CloudFail

You learn about a helpful tool that uncovers the hidden real locations of websites shielded by online protection services.

2
💻 Prepare on your computer

You easily set it up on your machine by following simple steps, like getting a new app ready to use.

3
🌐 Pick your website

Choose the website you want to check, but only if you have clear permission from its owner to avoid any trouble.

4
🚀 Launch the search

Hit start after confirming your okay to proceed, and it quietly looks through public records without touching the site.

5
Watch it work

Sit back as it gathers clues from free online logs and histories, sometimes using extra helpers if you connect them.

Get the real addresses

Celebrate seeing a list of likely original server locations with confidence scores, perfect for your authorized checks.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 10 to 10 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is CloudFail?

CloudFail is a Python CLI tool that uncovers hidden origin IP addresses behind Cloudflare-protected domains by querying certificate transparency logs, passive DNS databases, and old records from misconfigured sources. Developers run it against a target like `python -m cloudfail -t example.com --confirm-scope` to get a list of potential real IPs, complete with confidence scores and JSON output. It handles free sources out-of-the-box or amps up with paid APIs like Censys and Shodan for deeper scans.

Why is it gaining traction?

Unlike basic cloudfail alternatives, this v2.0 edition runs resilient passive recon across seven free data sources concurrently, dodging single-point failures with retries and backoff—no crashes on crt.sh errors or rate limits. Tor proxy support keeps queries anonymous, and options like `--passive-only` or `--threads 25` make it fast for quick checks or heavy subdomain blasts. As a cloudfail py GitHub fork, it fixes common cloudfail errors while staying lightweight.

Who should use this?

Pentesters and bug bounty hunters authorized to probe Cloudflare sites need this for origin IP discovery without direct traffic. Red teamers behind proxies appreciate `--no-verify-ssl` and Tor routing; OSINT analysts value the passive DNS pivot for historical IPs from AlienVault OTX or HackerTarget.

Verdict

Grab it if you're doing ethical recon on Cloudflare networks—solid docs and CLI make it usable today, despite 10 stars and a 0.7% credibility score signaling early maturity. Pair with tests for production; it's a practical cloudfail py replacement, not a battle-tested suite.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.