skuaintel

Date: 2026-03-23
Author: skuaintel

Research Note 001: Infrastructure Analysis of example.com

This investigation examines the infrastructure behind the domain example.com so we can understand its hosting, ownership and TLS configuration.
The goal is for us to demonstrate a simple methodology for domain level investigation using tools commonly found.

Method

The following techniques were used:

Findings

Domain Lookup example.com

A DNS lookup using dig shows the domain resolves to the following IP addresses:

These IPs fall within Cloudflare-owned address space, indicating that traffic to this domain is routed through Cloudflare’s CDN rather than directly to an origin server. This is a common setup used to provide performance benefits and to obscure backend infrastructure.

dig-on-example-com

We can also check nslookup on example.com to see the same results.

nslookup-on-example-com

WHOIS (Domain Info) example.com

Registrar: RESERVED-Internet Assigned Numbers Authority (IANA)
Name servers: ELLIOT.NS.CLOUDFLARE.COM, HERA.NS.CLOUDFLARE.COM
Registered on: 08/14/1995 at 04:00

This indicates the domain is reserved and not owned by a typical organisation, confirming it is used for documentation/testing.

whois-domain-example-com

WHOIS (IP Information) example.com

Organisation: Cloudflare, Inc (CLOUD14)
ASN: ASN information wasn’t returned in this query, however the IP range (104.16.0.0/12) is known to belong to Cloudflare.
Network range: 104.16.0.0 - 104.31.255.255 (104.16.0.0/12)

This confirms the domain is fronted by a CDN, meaning the real server location is hidden and traffic is proxied.

IP-whois-example-com

TLS Certificate Check of example.com

Subject Alternative Name (SAN):

san-example-com

Issuer:

issuer-example com

Validity Period:

This indicates automated certificate management, which is typical of CDN-managed infrastructure such as Cloudflare.

Validity-Period-example-com

Cryptography

Leaf Certificate (Level 0):

Intermediate Chain:

Modern ECC-Based certificate Mixed chain (ECC and RSA root), common in public PKI

SSL-Chain-Example-Com

TLS Protocol

TLS Version: TLS 1.3
Session Feature: NewSessionTicket observed
ALPN: HTTP/2 negotiated

TLS 1.3 is a modern secure configuration for handling data in transit.

TLS-example-com

Certificate Transparency

Searching on crt.sh for example.com we can see the following output.

Key Findings:

crt-sh-example-com

The origin infrastructure is likely obscured, as Cloudflare terminates TLS connections and proxies traffic between clients and the backend server.

Summary of Key Observations

These characteristics are consistent with professionally managed web infrastructure.

Conclusion

The domain example.com is hosted behind Cloudflare infrastructure, which abstracts the origin server and provides CDN and TLS termination services.

The use of short-lived certificates, modern TLS (1.3), and Cloudflare-managed DNS indicates a standard configuration typical of professional web infrastructure.

This investigation demonstrates how publicly available data can be used to assess domain infrastructure and security posture, even when origin systems are intentionally obscured.