You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/bots/additional-configurations/detection-ids/scraping-detections.mdx
+3-32Lines changed: 3 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,42 +44,13 @@ To access scraping detections:
44
44
45
45
```js title="Rule example"
46
46
47
-
(any(cf.bot_management.detection_ids[*] eq 50331649) and not cf.bot_management.verified_bot)
47
+
(any(cf.bot_management.detection_ids[*] in {5033164850331649}) and not cf.bot_management.verified_bot)
48
48
```
49
49
50
50
:::tip[Best practice]
51
-
If you are choosing to challenge as your rule action, check for any API calls on which you do not want to issue a challenge. To exclude requests to such paths, edit the [WAF custom rule](/waf/custom-rules/) to exclude the relevant paths.
51
+
If you are choosing to challenge as your rule action, ensure that you exclude any API calls on which you do not want to issue a challenge. To exclude requests to such paths, edit the [WAF custom rule](/waf/custom-rules/) to exclude the relevant paths.
52
52
:::
53
53
54
-
## Limit scraping requests with scraping detections
55
-
56
-
Rate limiting rules can limit the number of requests from a particular ASN or JA4 Fingerprint so long as it continues to exhibit suspicious behavior.
57
-
58
-
To use rate limiting rules with scraping detections:
59
-
60
-
<TabssyncKey="dashNewNav">
61
-
<TabItemlabel="Old dashboard">
62
-
<Steps>
63
-
1. Log in to the [Cloudflare dashboard](https://dash.cloudflare.com/), and select your account and domain.
64
-
2. Go to **Security** > **WAF**.
65
-
3. Under **Rate limiting rules**, select **Create rule**.
66
-
4. Fill out the form using the **Custom expression builder** and `cf.bot_management_detection_ids` along with other necessary information.
67
-
5. Select **Save as draft** to return to the rule later, or **Deploy** to deploy the rule.
68
-
</Steps>
69
-
</TabItem>
70
-
<TabItemlabel="New dashboard"icon="rocket">
71
-
<Steps>
72
-
1. In the Cloudflare dashboard, go to the **Security rules** page.
2. Select **Create rule** and choose **Rate limiting rule**.
76
-
3. Fill out the form using the **Custom expression builder** and `cf.bot_management_detection_ids` along with other necessary information.
77
-
4. Select **Save as draft** to return to the rule later, or **Deploy** to deploy the rule.
78
-
</Steps>
79
-
</TabItem>
80
-
</Tabs>
81
-
82
54
:::note
83
-
Detection IDs `50331648` and `50331649` are dynamically recalculated, meaning a single fingerprint would not be permanently rate limited unless it continues to remain suspicious at all times. Rate limiting on these detection IDs allows for more lenient controls, as opposed to immediately challenging or blocking.
84
-
55
+
The matched traffic for detection IDs `50331648` and `50331649` is dynamically re-calculated, meaning a single fingerprint would not be permanently flagged unless it continues to behave suspiciously at all times.
0 commit comments