Nmap analysis on kali by being annonymous

Hello, I am new to the pen test.

I have slight knowledge in network and system, title pro sys and network… so slight knowledge in routing, osi model and a bit of linux but I forgot a lot.

-So I wanted to attempt a flood and penetration on a test site. which is weird to access the ip I ping the site and tracert I get an ip that goes from 96 to 97 on the penultimate byte during my floods.
However when I type the ip on the internet browser I come across a cloudfare page (I imagine the cloud server that hosts the site?).
So is it still effective when trying to flood via metasploit?

The site remains very active so I imagine that there is a minimum of security (I had made one at a time via ufw 3 months ago for the anti back).

-Furthermore, during an nmap it is sometimes noted that all the ports are in ignored state!!!??? but then how is it possible that the site is accessible on the internet!?
For example I can have during my first nmap results of ports but during the second scan there is nothing more detected:

──(root㉿kali)-[~]
└─# proxychains nmap 188.114.97.*
[proxychains] config file found: /etc/proxychains.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.16
Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:19 CEST
Nmap scan report for 188.114.97.*
Host is up (0.016s latency).
Not shown: 996 filtered tcp ports (no-response)
PORT STATE SERVICE
80/tcp open http
443/tcp open https
8080/tcp open http-proxy
8443/tcp open https-alt

Nmap done: 1 IP address (1 host up) scanned in 53.07 seconds

┌──(root㉿kali)-[~]
└─# proxychains nmap -sV 188.114.97.*
[proxychains] config file found: /etc/proxychains.conf
[proxychains] preloading /usr/lib/x86_64-linux-gnu/libproxychains.so.4
[proxychains] DLL init: proxychains-ng 4.16
Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-25 22:21 CEST
Nmap scan report for 188.114.97.$
Host is up (0.0020s latency).
All 1000 scanned ports on 188.114.97.* are in ignored states.
Not shown: 1000 filtered tcp ports (no-response)

Service detection performed. Please report any incorrect results at Nmap OS/Service Fingerprint and Correction Submission Page .
Nmap done: 1 IP address (1 host up) scanned in 11.49 seconds

-Finally, it s weird, with “nmap -sV”
without typing ‘‘proxychians’’ first on the other ip adress, i found service “tcpwrapped” but i didn’t found any vulnerabilitie on metasploit.

Starting Nmap 7.92 ( https://nmap.org ) at 2022-07-24 18:40 CEST
Nmap scan report for davidduke.com (188.114.96.)
Host is up (0.013s latency).
Other addresses for davidduke.com (not scanned): 188.114.97.
**06:98c1:3120>
Not shown: 997 filtered tcp ports (no-response)
PORT STATE SERVICE VERSION
80/tcp open tcpwrapped
443/tcp open tcpwrapped
8080/tcp open tcpwrapped

Service detection performed. Please report any incorrect results at https://>
Nmap done: 1 IP address (1 host up) scanned in 72.63 seconds

Thanks. sorry english is not my mothertongue.