What is the name of the domain?
workers.dev
What is the issue you’re encountering
For many days, someone has been abusing Cloudflare Workers to send malicious requests from the IP address 2a06:98c0:3600::103. Our server uses NGINX to properly forward the client’s real IP address from the CF-Connecting-IP
header. Even though we forward it, this IP address has time and time again shown up in our logs. It always sends requests to odd/unrelated paths, searching for vulnerabilities. It appears that someone has managed to use the fetch()
command in Cloudflare Workers to target Cloudflare-protected websites. Because of this, we are also unable to block requests coming from it as it’s allowlisted by Cloudflare. Many users have reported issues with this IP address in recent years and we need a permanent fix. According to Cloudflare’s own documentation, this IP address belongs to Cloudflare Workers. We have enabled logging of the CF-Worker
header and it is always a bunch of random, such as cigocy.workers.dev
and hezareju.workers.dev
.
What steps have you taken to resolve the issue?
We have enabled mTLS (Authenticated Origin Pulls) in hopes of it resolving the issue, but that did not work. We’ve tried blocking the IP address in WAF and it did also not work. The only thing we are able to do is to block it on the server level, inside NGINX, but it’s not a fix - it’s problematic to keep continue receiving requests from this Cloudflare IP address and then having to block it on server level. It causes performance issues.
We need Cloudflare to take action against the abuse that’s happening in Cloudflare Workers. We need a way to properly block this. And we need clarification regarding whether or not our site ratings (SEO) will be affected by blocking this IP address. We need to know if this IP address is only used by Cloudflare Workers or if it also is used to direct traffic. The documentation I linked above does not answer that question.
I’ve made a post on the r/Cloudflare subreddit yesterday with more information. The link can be found here: https://www.reddit.com/r/CloudFlare/comments/1lehg3l/one_of_cloudflares_ip_addresses_is_abusively/
Previous topics regarding this IP address exists and it seems nothing has changed over the years. This is now an urgent matter and we need someone at Cloudflare to look into it as soon as possible.
It is a major issue that people are able to abuse Cloudflare Workers to send malicious requests from Cloudflare’s own IP address.
Below are two sample log messages (Please have a look at them):
Jun 18 17:41:17 LB2 nginx[8826]: lb2 nginx: {"source": "nginx", "timestamp": "2025-06-18T17:41:17+02:00", "ip": "2a06:98c0:3600::103", "country": "SE", "scheme": "https", "method": "GET", "uri": "/wordpress/wp-admin/setup-config.php", "status": "404", "referrer": "", "protocol": "HTTP/2.0", "userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36", "bytesReceived": "452", "bytesResponded": "84", "duration": "0.000", "contentType": "", "host": "xxxxx.com", "httpHost": "xxxxx.com", "serverName": "xxxxx.com", "cfWorker": "cigocy.workers.dev", "xForwardedFor": "2a06:98c0:3600::103"}
Jun 19 04:38:11 LB1 nginx[10941]: lb1 nginx: {"source": "nginx", "timestamp": "2025-06-19T04:38:11+02:00", "ip": "2a06:98c0:3600::103", "country": "DE", "scheme": "https", "method": "GET", "uri": "/wordpress/wp-admin/setup-config.php", "status": "404", "referrer": "", "protocol": "HTTP/2.0", "userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36", "bytesReceived": "454", "bytesResponded": "84", "duration": "0.000", "contentType": "", "host": "xxxxx.com", "httpHost": "xxxxx.com", "serverName": "xxxxx.com", "cfWorker": "hezareju.workers.dev", "xForwardedFor": "2a06:98c0:3600::103"}
If someone at Cloudflare reads this, please contact me via e-mail or in this thread. If someone is able to notify Cloudflare, please do so and help not just us, but others as well, who receive malicious requests from this IP address.
2a06:98c0:3600::103
2a06:98c0:3600:0000:0000:0000:0000:0103
Thank you in advance.
Was the site working with SSL prior to adding it to Cloudflare?
Yes
What is the current SSL/TLS setting?
Strict (SSL-Only Origin Pull)