This has the unintended consequence of inadvertently revealing the "real" IP of websites attempting to mask their IP behind CloudFlare. This is how the "CrimeFlare" service works under the hood. In order to prevent this, website operators are supposed to configure their server's backends such that they only respond to CloudFlare's IPs. This works of course, however, I suspect that many of their customers are not aware of how CrimeFlare/mass IP scans work and fail to configure their servers correctly. Meaning, a large number of CloudFlare's customers pay for a service which can easily be defeated. Only CloudFlare customers which are tech savvy enough to understand how to configure their servers to only respond to CloudFlare IP's would be able to stop this.
CLoudFlare supposedly has 4.1 million customers. I suspect that the number of CloudFlare customer's who's backend servers are vulnerable(misconfigured to reply to non-CloudFlare IPs - and thus discoverable by CrimeFlare et al.) may be in the hundreds of thousands to millions. Meaning, hundreds of thousands of people could be paying for an easily defeated anti-DDOS measure. It feels wrong that CloudFlare is possibly making tens of millions of dollars off of vulnerable customers who they fail to notify that their sites are vulnerable. I don't believe enough is being done by CloudFlare to warn their customers about the danger of mass-IP scans possibly unmasking their services.