SkillAgentSearch skills...

CloudRip

A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.

Install / Use

/learn @moscovium-mc/CloudRip
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

CloudRip

License: MIT Python 3.8+ Version Platform Tool Type Built for

GitHub Stars Forks Contributors Issues

Maintenance Code style: black

A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains. For penetration testing, security research, and learning how Cloudflare protection works.

Table of Contents

What it does

  • IPv4 & IPv6 support - Resolves both A and AAAA records
  • Multiple IPs detection - Finds ALL IPs behind a domain, not just the first one
  • Progress bar - Real-time progress with live stats (found/cloudflare count)
  • Dynamic Cloudflare IP detection - Fetches latest IP ranges from Cloudflare's API (with fallback)
  • Fast subdomain scanning - Uses multiple threads to speed things up
  • Multiple wordlists - Combine several wordlists in a single scan
  • Wordlist comments - Use # to add comments in your wordlists
  • Multiple output formats - Export to JSON, YAML, CSV, or plain text
  • Verbose & quiet modes - Control output verbosity
  • Filters out Cloudflare IPs - Only shows you the real server addresses
  • Bring your own wordlist - Or use the built-in one (dom.txt)
  • Save your findings - Export results to a file for later
  • Rate limiting - Won't spam the target and get you blocked
  • Solid default wordlist - Organized and comprehensive for better results

Installation

Requirements

  • Python 3.8 or higher
  • pip (Python package manager)

Setup

Clone the repository:

git clone https://github.com/moscovium-mc/CloudRip
cd CloudRip

Create a virtual environment and install dependencies:

Linux/macOS:

python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt

Windows:

python -m venv venv
venv\Scripts\activate
pip install -r requirements.txt

[!TIP] Always use a virtual environment to avoid dependency conflicts with other Python projects.

How to use it

Basic scan:

python3 cloudrip.py example.com

With all the options:

python3 cloudrip.py example.com -w wordlist1.txt -w wordlist2.txt -t 20 -o report.json -f json

Options:

| Option | Description | |--------|-------------| | <domain> | The site you're testing (like example.com) | | -w, --wordlist | Wordlist file(s). Can be specified multiple times (default: dom.txt) | | -t, --threads | How many threads to run (default: 10) | | -o, --output | Save results to a file | | -f, --format | Output format: normal, json, yaml, csv (default: normal) | | -v, --verbose | Show all results including "not found" entries | | -q, --quiet | Minimal output - only show found IPs |

Examples

Basic scan:

python3 cloudrip.py example.com

Multiple wordlists with JSON output:

python3 cloudrip.py example.com -w subs1.txt -w subs2.txt -o report.json -f json

Fast scan with 50 threads:

python3 cloudrip.py example.com -t 50 -o results.csv -f csv

Verbose mode (see all attempts):

python3 cloudrip.py example.com -v

Quiet mode (only found IPs):

python3 cloudrip.py example.com -q -o found.txt

Output Formats

Normal (default)

CloudRip Scan Report
============================================================
Target: example.com
Date: 2025-11-28T12:00:00+00:00
Total checked: 150

[FOUND] Non-Cloudflare IPs (3):
  mail.example.com
    v4:[192.168.1.1, 192.168.1.2, 192.168.1.3]
  ftp.example.com
    v4:[10.0.0.1] | v6:[2001:db8::1]

[CLOUDFLARE] Behind Cloudflare (5):
  www.example.com
    v4:[104.16.1.1 [CF], 172.67.1.1 [CF]] | v6:[2606:4700::1 [CF]]

JSON

{
  "target_domain": "example.com",
  "scan_date": "2025-11-28T12:00:00+00:00",
  "total_checked": 150,
  "summary": {
    "found": 3,
    "cloudflare": 5,
    "not_found": 142,
    "errors": 0
  },
  "results": { ... }
}

CSV

domain,ipv4,ipv4_cloudflare,ipv6,ipv6_cloudflare,status,error
mail.example.com,192.168.1.1;192.168.1.2;192.168.1.3,,,,found,
www.example.com,104.16.1.1;172.67.1.1,104.16.1.1;172.67.1.1,2606:4700::1,2606:4700::1,cloudflare,

Version History

v2.1.0 (Current)

New Features:

  • Full IPv6 support (AAAA record resolution)
  • Multiple IPs detection - Resolves ALL IPs behind a domain (A/AAAA records can return multiple IPs)
  • Real-time progress bar with live stats
  • Dynamic Cloudflare IP range fetching from official API
  • Multiple output formats: JSON, YAML, CSV, normal text
  • Multiple wordlists support (combine with -w file1.txt -w file2.txt)
  • Verbose mode (-v) to see all results including not found
  • Quiet mode (-q) for minimal output
  • Automatic root domain checking before subdomain scan
  • Comprehensive scan summary with statistics
  • Structured report with categorized results (found, cloudflare, not_found, errors)
  • Wordlist comment support (lines starting with #)

Technical Improvements:

  • Complete rewrite with object-oriented architecture
  • Type hints throughout the codebase
  • Dataclasses for structured data handling
  • Better error handling (LifetimeTimeout, EOFError)
  • Cleaner executor shutdown on interrupt
  • Reduced rate limiting delay (0.1s → 0.05s)

v2.0.0

Wordlist Improvements:

  • Massive wordlist upgrade - Took dom.txt from 100 to 600+ subdomains
  • Added API variants, cloud infrastructure, IoT endpoints
  • Covers auth/security, payment gateways, analytics, CI/CD pipelines
  • Way better geo coverage - cities and more countries
  • Handles modern cloud-native and microservices setups
  • Better database and service discovery hits

v1.5.0

  • Rate limiting so you don't get blocked
  • Thread handling works better now
  • Doesn't crash on DNS failures anymore
  • Prettier output with colors

v1.0.0

  • First drop with the core stuff
  • Multi-threaded subdomain scanning
  • Filters out Cloudflare IPs
  • Bring your own wordlist
  • Save results to file
  • Basic dom.txt with ~100 entries

Contributors

Huge thanks to @Dxsk for the contributions to v2.1.0

Contributing

Got ideas for improvements? Found a bug? If it's better wordlists, new features, or bug fixes - all contributions help.

How to contribute:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a pull request

Guidelines:

  • Follow Python best practices and PEP 8
  • Add type hints to new code
  • Update documentation as needed
  • Test your changes thoroughly

Support

If you find this project useful, consider supporting my work:

<a href="https://buymeacoffee.com/webmoney" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" height="40"></a>

Crypto donations:

  • <a href="bitcoin:bc1quavqz6cxqzfy4qtvq4zxc4fjgap3s7cmxja0k4"><img src="https://img.shields.io/badge/Bitcoin-000000?style=plastic&logo=bitcoin&logoColor=white" alt="Bitcoin"></a> bc1quavqz6cxqzfy4qtvq4zxc4fjgap3s7cmxja0k4
  • <a href="ethereum:0x5287af72afbc152b09b3bf20af3693157db9e425"><img src="https://img.shields.io/badge/Ethereum-627EEA?style=plastic&logo=ethereum&logoColor=white" alt="Ethereum"></a> 0x5287af72afbc152b09b3bf20af3693157db9e425
  • <a href="solana:HYZjfEx8NbEMJX1vL1GmGj39zA6TgMsHm5KCHWSZxF4j"><img src="https://img.shields.io/badge/Solana-9945FF?style=plastic&logo=solana&logoColor=white" alt="Solana"></a> HYZjfEx8NbEMJX1vL1GmGj39zA6TgMsHm5KCHWSZxF4j
  • <a href="monero:86zv6vTDuG35sdBzBpwVAsD71hbt2gjH14qiesyrSsMkUAWHQkPZyY9TreeQ5dXRuP57yitP4Yn13SQEcMK4MhtwFzPoRR1"><img src="https://img.shields.io/badge/Monero-FF6600?style=plastic&logo=monero&logoColor=white" alt="Monero"></a> 86zv6vTDuG35sdBzBpwVAsD71hbt2gjH14qiesyrSsMkUAWHQkPZyY9TreeQ5dXRuP57yitP4Yn13SQEcMK4MhtwFzPoRR1

Legal Notice

[!WARNING] FOR AUTHORIZED SECURITY TESTING ONLY

Only use CloudRip on systems you have explicit permission to test. This tool is designed for ethical security research, authorized penetration testing, and educational purposes only.

Unauthorized reconnaissance or scanning of systems is illegal and may violate various laws including:

  • Computer Fraud and Abuse Act (CFAA) in the United States
  • Computer Misuse Act in the United Kingdom
  • Similar legislation in other jurisdictions

**You

View on GitHub
GitHub Stars368
CategoryDevelopment
Updated20h ago
Forks50

Languages

Python

Security Score

100/100

Audited on Apr 6, 2026

No findings