When a company utilizes the WAF, the original server is hidden. So, an attacker tries harmful payloads or files that you try to run on the main app, and the effect is that it stalls. Even if you attempt an IP address, it will tell you that “Direct Access is not permitted.”
There are many ways to reconnaissance an original server and bypass WAF. One way is to check DNS records. For example, MX records can be viewed through the website https://mxtoolbox.com/ or use the free ZOFIXER scanner which shows original server IP or some of the subdomains of that domain did not use WAF, which also leads to the possibility of leaking the IP of the original server.
ZOFixer.com security scan helps to find this vulnerability in your software and server, you can easily use it by registering on our website and activating the 30-day trial.