Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare.
It is useful for bug bounty hunters, pentesters, or OSINT purposes, as it can filter results according to your needs.
- Multi-threading โ fast domain checks.
- IPv4 & IPv6 support.
- Result filtering โ only IP, only domain, or domain + IP.
- Cloudflare detection โ quickly identify domains behind Cloudflare.
- Unknown mode โ show domains that cannot be resolved.
- Save output to file for later use.
- Silent Mode
Clone the repository and install dependencies:
git clone https://github.com/justakazh/pler.git
cd pler
pip install -r requirements.txtOr install directly from PyPI (if published):
pip install python-plerpython3 pler.py [options]| Argument | Description |
|---|---|
-d, --domain <domain> |
Target domain to check. |
-l, --list <file> |
File containing list of domains (one per line). |
-t, --threads <int> |
Number of threads (default: 3). |
-ft, --filter-type {ip,domain,domain_ip} |
Output filter type. |
-su, --show-unknown |
Show domains with unknown IP. |
-sc, --show-cloudflare |
Show domains that use Cloudflare. |
-o, --output <file> |
Save results to a file. |
-s, --silent |
Disable banner & non-essential output. |
Check a single domain
pler -d example.comCheck from a file
pler -l subdomains.txtCheck via STDIN
echo "example.com" | pler
cat subdomains.txt | plerShow only IP addresses
cat subdomains.txt | pler -ft ipShow only domains
cat subdomains.txt | pler -ft domainShow only domains using Cloudflare
cat subdomains.txt | pler -scShow only unknown IPs
cat subdomains.txt | pler -suSave results to file
cat subdomains.txt | pler -ft domain_ip -o result.txtThis project is licensed under the MIT License.