I'm investigating the impact of the leak of CloudFlare payload data due to a parser bug on services that we use.
It's relatively easy to tell if a service is directing traffic to CloudFlare via DNS:
$ nslookup www.authy.com
Server: google-public-dns-a.google.com
Address: 8.8.8.8
Non-authoritative answer:
Name: www.authy.com
Addresses: 104.16.0.17
104.16.1.17
$ whois -h whois.arin.net n 104.16.0.17 | egrep 'Organization'
Organization: Cloudflare, Inc. (CLOUD14)
Does CloudFlare terminate all traffic directed to them this way, or if not, is there a way to independently tell whether a CloudFlare customer is using CloudFlare's reverse proxy service?