If anyone done this lots of time please DM please for more details and payment
I’ve sent you a DM, thanks!I don't think I understand your question, but regardless, these are the uncommon techniques I have had some luck with.
Cloudflare WARP TCP :80 & :443 Scanning - The principle behind this technique is simple, the website master has whitelisted the traffic to only allow ingress from Cloudflare. You can scan most of the world if you have a good list and minimize the time.
After you finish that, you still need to route through WARP, but this time the HTTP request combined with the Host: target.com. If you do everything correctly you will be able to unmask the websites true origin very easily. Just watch out for http.title or favicon to narrow down your target exactly.
If you already have a somewhat idea of what ASN or Organisation the target is residing in, you can choose to use Cloudflare WORKER as well. Create a snippet that tries to connect on each /24,/23,/22 or however it is. The limitation of this technique is that you will get ratelimited, so use a couple WORKER instead of one.
Some common technique you can try is checking on website like SecurityTrail/Shodan first and then using WORKER method to check if website master just whitelisted ingress Cloudflare and continued to use the same server IP.