Exposing the IP Address of a Dark Web Link Collection
Our team has conducted threat intelligence in the dark web space and identified a technique used to expose the real IP addresses, behind Cloudflare protected sites using authenticated origin pulls.
โ๏ธโ One of the first targets is "darknetlinks[.]info" - a link collection for dark web forums, marketplaces, exchanges and others.
Our investigation showed that the site is using Cloudflare services to protect on a DNS-level, and on a server-level using authenticated origin pulls (AOP), to restrict server traffic only to Cloudflare servers.
๐๏ธ Conducting certificate intelligence using Censys, our team identified their origin certificate with the fingerprint "02a43b2d77464a269fc32fccf79699dea82569215c37134331f7aaba54d63052" and one host "146[.]19[.]143[.]203" server, which serves their dark web link collection.

๐ก๏ธ The technique and exposed target are part of Covert Security's upcoming CS-ADWI (Advanced Dark Web Intelligence) course, featuring topics such as...
- Monero transaction deanonymization through honeypot nodes.
- Hidden service deanonymization on the dark web.
- Deanonymization of Cloudflare protected services on the clear web.
๐ ๐๐ต๐ข๐บ ๐ต๐ถ๐ฏ๐ฆ๐ฅ ๐ง๐ฐ๐ณ ๐ฎ๐ฐ๐ณ๐ฆ ๐ถ๐ฑ๐ฅ๐ข๐ต๐ฆ๐ด ๐ข๐ฏ๐ฅ ๐ฆ๐น๐ฑ๐ฐ๐ด๐ฆ๐ด, ๐ข๐ด ๐ฐ๐ถ๐ณ ๐ฅ๐ข๐ณ๐ฌ ๐ธ๐ฆ๐ฃ ๐ณ๐ฆ๐ด๐ฆ๐ข๐ณ๐ค๐ฉ ๐ฆ๐น๐ฑ๐ข๐ฏ๐ฅ๐ด.