You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cloudflare classifies the threats that it blocks or challenges. To help you understand more about your site’s traffic, the “Type of Threats Mitigated” metric on the analytics page measures threats blocked or challenged by the following categories:
Visitors were presented with an interactive challenge page and failed to pass.
23
22
24
-
*Note: An interactive challenge page is a difficult to read word or set of numbers that only a human can translate. If entered incorrectly or not answered in a timely fashion, the request is blocked.*
23
+
_Note: An interactive challenge page is a difficult to read word or set of numbers that only a human can translate. If entered incorrectly or not answered in a timely fashion, the request is blocked._
25
24
26
25
## Browser challenge
27
26
28
27
A bot gave an invalid answer to the JavaScript challenge (in most cases this will not happen, bots typically do not respond to the challenge at all, so "failed" JavaScript challenges would not get logged).
29
28
30
-
*Note: During a JavaScript challenge you will be shown an interstitial page for about five seconds while Cloudflare performs a series of mathematical challenges to make sure it is a legitimate human visitor.*
29
+
_Note: During a JavaScript challenge you will be shown an interstitial page for about five seconds while Cloudflare performs a series of mathematical challenges to make sure it is a legitimate human visitor._
31
30
32
31
## Bad IP
33
32
34
-
A request that came from an IP address that is not trusted by Cloudflare based on the Threat Score.
33
+
A request that came from an IP address that is not trusted by Cloudflare based on the threat score.
35
34
36
-
Cloudflare uses Threat Scores gathered from sources such as Project Honeypot, as well as our own communities' traffic to determine whether a visitor is legitimate or malicious. When a legitimate visitor passes a challenge, that helps offset the Threat Score against the previous negative behavior seen from that IP address. Our system learns who is a threat from this activity. Site owners may override the Threat Score at any time using Cloudflare's security settings.
35
+
Cloudflare uses threat scores gathered from sources such as Project Honeypot, as well as our own communities' traffic to determine whether a visitor is legitimate or malicious. When a legitimate visitor passes a challenge, that helps offset the threat score against the previous negative behavior seen from that IP address. Our system learns who is a threat from this activity.
37
36
38
37
## Country block
39
38
@@ -59,14 +58,14 @@ A /24 IP range that was blocked based on the [user configuration](/waf/tools/ip-
59
58
60
59
Requests made by a bot that failed to pass the challenge.
61
60
62
-
*Note: An interactive challenge page is a difficult to read word or set of numbers that only a human can translate. If entered incorrectly or not answered in a timely fashion, the request is blocked.*
61
+
_Note: An interactive challenge page is a difficult to read word or set of numbers that only a human can translate. If entered incorrectly or not answered in a timely fashion, the request is blocked._
63
62
64
63
## Bot Request
65
64
66
65
Request that came from a bot.
67
66
68
67
## Unclassified
69
68
70
-
Unclassified threats comprises a number of automatic blocks that are not related to the Browser Integrity Challenge (Bad Browser).These threats usually relate to Hotlink Protection, and other actions that happen on Cloudflare's global network based on the composition of the request (and not its content).
69
+
Unclassified threats comprises a number of automatic blocks that are not related to the Browser Integrity Challenge (Bad Browser).These threats usually relate to Hotlink Protection, and other actions that happen on Cloudflare's global network based on the composition of the request (and not its content).
71
70
72
71
Unclassified means a number of conditions under which we group common threats related to Hotlink Protection as well as certain cases of IP reputation and specific requests that are blocked at Cloudflare's global network before reaching your servers.
Total Threats Stopped measures the number of “suspicious” and “bad” requests that were aimed at your site. Requests receive these labels by our IP Reputation Database as they enter Cloudflare’s network:
9
8
10
-
***Legitimate:** request pass directly to your site
11
-
***Suspicious:** request has been challenged with a [Cloudflare challenge](/waf/reference/cloudflare-challenges/)
12
-
***Bad:** request has been blocked because our Browser Integrity Check, or because of user configured settings like WAF rules or IP range block.
9
+
-**Legitimate:** Request passed directly to your site.
10
+
-**Suspicious:** Request has been challenged with a [Cloudflare challenge](/waf/reference/cloudflare-challenges/).
11
+
-**Bad:** Request has been blocked because our Browser Integrity Check, or because of user configured settings like WAF rules or IP range block.
13
12
14
-
Cloudflare uses Threat Scores gathered from sources such as Project Honeypot, as well as our own communities' traffic to determine whether a visitor is legitimate or malicious. When a legitimate visitor passes a challenge, that helps offset the Threat Score against the previous negative behavior seen from that IP address. Our system learns who is a threat from this activity.
13
+
Cloudflare uses threat scores gathered from sources such as Project Honeypot, as well as our own communities' traffic to determine whether a visitor is legitimate or malicious. When a legitimate visitor passes a challenge, that helps offset the threat score against the previous negative behavior seen from that IP address. Our system learns who is a threat from this activity.
15
14
16
15
In addition to threat analytics you can also monitor search engine crawlers going to your websites. For most websites, threats and crawlers make up 20% to 50% of traffic.
Bot scores are available to be used in rule expressions and with Workers to customize application behavior. For more details, refer to [Bot Management variables](/bots/reference/bot-management-variables/).
14
13
15
14
:::note
16
15
17
-
Granular bot scores are only available to Enterprise customers who have purchased Bot Management. All other customers can only access this information through [bot groupings](#bot-groupings) in Bot Analytics.
16
+
Granular bot scores are only available to Enterprise customers who have purchased Bot Management. All other customers can only access this information through [bot groupings](#bot-groupings) in Bot Analytics.
18
17
:::
19
18
20
19
## Bot groupings
@@ -32,7 +31,7 @@ Bot scores are not computed for requests to paths that are handled by Cloudflare
32
31
33
32
:::note
34
33
35
-
The following detection engines only apply to Enterprise Bot Management. For specific details about the engines included in your plan, refer to [Plans](/bots/plans/).
34
+
The following detection engines only apply to Enterprise Bot Management. For specific details about the engines included in your plan, refer to [Plans](/bots/plans/).
36
35
:::
37
36
38
37
<Renderfile="bm-bot-detection-engines" />
@@ -48,7 +47,3 @@ The following detection engines only apply to Enterprise Bot Management. For spe
48
47
### Notes on detection
49
48
50
49
<Renderfile="bots-cookie" />
51
-
52
-
## Comparison to Threat Score
53
-
54
-
Bot Score is different from <GlossaryTooltipterm="threat score">Threat Score</GlossaryTooltip>. Bot Score identifies bots and Threat Score measures IP reputation across our services. Most customers achieve the best results by relying on bot scores and avoiding IP reputation entirely.
Copy file name to clipboardExpand all lines: src/content/docs/bots/troubleshooting.mdx
-11Lines changed: 0 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,17 +71,6 @@ Yes. WAF rules are executed before Super Bot Fight Mode. If a WAF custom rule pe
71
71
72
72
---
73
73
74
-
## What is the difference between the threat score and bot management score?
75
-
76
-
The difference is significant:
77
-
78
-
- Threat score (_cf.threat_score_) is what Cloudflare uses to determine IP Reputation. It goes from 0 (good) to 100 (bad).
79
-
- Bot management score (_cf.bot_management.score_) is what Cloudflare uses in Bot Management to measure if the request is from a human or a script. The scores range from 1 (bot) to 99 (human). Lower scores indicate the request came from a script, API service, or an automated agent. Higher scores indicate that the request came from a human using a standard desktop or mobile web browser.
80
-
81
-
These fields are available via [WAF custom rules](/waf/custom-rules/) and other products based on the Ruleset Engine.
82
-
83
-
---
84
-
85
74
## What is cf.bot_management.verified_bot?
86
75
87
76
A request's _cf.bot_management.verified_bot_ value is a boolean indicating whether such request comes from a Cloudflare allowed bot.
Copy file name to clipboardExpand all lines: src/content/docs/fundamentals/trace-request/how-to.mdx
+15-16Lines changed: 15 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,10 +9,9 @@ head:
9
9
- tag: title
10
10
content: How to - Cloudflare Trace (beta)
11
11
description: Learn how to use Cloudflare Trace in the dashboard and with the API.
12
-
13
12
---
14
13
15
-
import { GlossaryTooltip } from"~/components"
14
+
import { GlossaryTooltip } from"~/components";
16
15
17
16
## Use Trace in the dashboard
18
17
@@ -27,18 +26,18 @@ import { GlossaryTooltip } from "~/components"
27
26
28
27
2. Enter a URL to trace. The URL must include a hostname that belongs to your account.
29
28
30
-
3. Select an HTTP method. If you select *POST*, *PUT*, or *PATCH*, you should enter a value in **Request body**.
29
+
3. Select an HTTP method. If you select _POST_, _PUT_, or _PATCH_, you should enter a value in **Request body**.
31
30
32
31
4. (Optional) Define any custom request properties to simulate the conditions of a specific HTTP/S request. You can customize the following request properties:
33
32
34
-
***Protocol** (HTTP protocol version)
35
-
***Request headers**
36
-
***Cookies**
37
-
***Geolocation** (request source [country](/ruleset-engine/rules-language/fields/reference/ip.src.country/), [region](/ruleset-engine/rules-language/fields/reference/ip.src.region/), and [city](/ruleset-engine/rules-language/fields/reference/ip.src.city/))
***Request body** (for `POST`, `PUT`, and `PATCH` requests)
41
-
***Skip challenge** (skips a Cloudflare-issued [challenge](/waf/reference/cloudflare-challenges/), if any, allowing the trace to continue)
33
+
-**Protocol** (HTTP protocol version)
34
+
-**Request headers**
35
+
-**Cookies**
36
+
-**Geolocation** (request source [country](/ruleset-engine/rules-language/fields/reference/ip.src.country/), [region](/ruleset-engine/rules-language/fields/reference/ip.src.region/), and [city](/ruleset-engine/rules-language/fields/reference/ip.src.city/))
37
+
-[**Bot score**](/bots/concepts/bot-score/)
38
+
-**Threat score**
39
+
-**Request body** (for `POST`, `PUT`, and `PATCH` requests)
40
+
-**Skip challenge** (skips a Cloudflare-issued [challenge](/waf/reference/cloudflare-challenges/), if any, allowing the trace to continue)
42
41
43
42
5. Select **Send trace**.
44
43
@@ -48,7 +47,7 @@ The **Trace results** page shows all evaluated and executed configurations from
48
47
49
48
1. Analyze the different [steps](#steps-in-trace-results) with evaluated and executed configurations for the current trace. Trace results include matches for all active rules and configurations, whether configured at the account level or for a specific domain or subdomain.
50
49
51
-
To show all configurations, including the ones that did not match the request, select *All configurations* in the **Results shown** dropdown.
50
+
To show all configurations, including the ones that did not match the request, select _All configurations_ in the **Results shown** dropdown.
52
51
53
52
2. (Optional) Update your Cloudflare configuration (at the account or at the domain/subdomain level) and create a new trace to check the impact of your changes.
54
53
@@ -63,10 +62,10 @@ To run a trace later with the same configuration:
63
62
64
63
Use the [Request Trace](/api/resources/request_tracers/subresources/traces/methods/create/) operation to perform a trace using the Cloudflare API.
65
64
66
-
***
65
+
---
67
66
68
67
## Steps in trace results
69
68
70
-
* Execution of one or more rules of Cloudflare products built on the [Ruleset Engine](/ruleset-engine/). Refer to the Ruleset Engine's [Phases list](/ruleset-engine/reference/phases-list/) for a list of such products.
71
-
*[Page Rules](/rules/page-rules/): Execution of one or more rules.
72
-
*[Workers](/workers/): Execution of one or more scripts.
69
+
- Execution of one or more rules of Cloudflare products built on the [Ruleset Engine](/ruleset-engine/). Refer to the Ruleset Engine's [Phases list](/ruleset-engine/reference/phases-list/) for a list of such products.
70
+
-[Page Rules](/rules/page-rules/): Execution of one or more rules.
71
+
-[Workers](/workers/): Execution of one or more scripts.
Another way of reducing origin traffic is customizing the Cloudflare WAF and other security features. The fewer malicious requests that reach your application, the fewer that could reach (and overwhelm) your origin.
10
9
11
10
To reduce incoming malicious requests, you could:
12
11
13
-
* Create [WAF custom rules](/waf/custom-rules/) for protection based on specific aspects of incoming requests.
14
-
* Adjust DDoS rules to handle [false negatives and false positives](/ddos-protection/managed-rulesets/adjust-rules/).
15
-
* Build [rate limiting rules](/waf/rate-limiting-rules/) to protect against specific patterns of requests.
16
-
* Enable [bot protection](/bots/get-started/) or set up [Bot Management for Enterprise](/bots/get-started/bm-subscription/) to protect against automated abuse.
* Configure your zone's [Security Level](/waf/tools/security-level/) globally or selectively (depending on your needs).
19
-
* Review the rest of Cloudflare's [security options](/learning-paths/application-security/account-security/).
12
+
- Create [WAF custom rules](/waf/custom-rules/) for protection based on specific aspects of incoming requests.
13
+
- Adjust DDoS rules to handle [false negatives and false positives](/ddos-protection/managed-rulesets/adjust-rules/).
14
+
- Build [rate limiting rules](/waf/rate-limiting-rules/) to protect against specific patterns of requests.
15
+
- Enable [bot protection](/bots/get-started/) or set up [Bot Management for Enterprise](/bots/get-started/bm-subscription/) to protect against automated abuse.
Copy file name to clipboardExpand all lines: src/content/docs/network/onion-routing.mdx
+5-11Lines changed: 5 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,30 +14,24 @@ Improve the Tor user experience by enabling Onion Routing, which enables Cloudfl
14
14
15
15
## How it works
16
16
17
-
Due to the behavior of some individuals using the Tor network (spammers, distributors of malware, attackers), the IP addresses of Tor exit nodes may earn a bad reputation, elevating their Cloudflare threat score.
18
-
19
-
Our [basic protection level](/waf/tools/security-level/) issues challenges to visitors whose IP address has a high threat score, depending on the level chosen by the Cloudflare customer.
20
-
21
-
One way to address this threat score is to create [custom WAF rules](/waf/custom-rules/). Cloudflare assigns the two-letter code `T1` for Tor. There's no geographical country associated with these IPs, but this approach lets Cloudflare customers override the default Cloudflare threat score to define the experience for their Tor visitors. Cloudflare updates its list of Tor exit node IP addresses every hour.
22
-
23
-
The other way to improve the Tor user experience is through Onion Routing. This improves Tor browsing as follows:
17
+
Onion Routing helps improve Tor browsing as follows:
24
18
25
19
- Tor users no longer access your site via exit nodes, which can sometimes be compromised, and may snoop on user traffic.
26
20
- Human Tor users and bots can be distinguished by our Onion services, such that interactive challenges are only served to malicious bot traffic.
27
21
28
22
[Tor Browser](https://tb-manual.torproject.org/about/) users receive an [alt-svc header](https://httpwg.org/specs/rfc7838.html#alt-svc) as part of the response to the first request to your website. The browser then creates a Tor Circuit to access this website using the `.onion` TLD service provided by this header.
29
23
30
-
You should note that the visible domain in the UI remains unchanged, as the host header and the SNI are preserved. However, the underlying connection changes to be routed through Tor, as the [UI denotes on the left of the address bar](https://tb-manual.torproject.org/managing-identities/#managing-identities) with a Tor Circuit. Cloudflare does not provide a certificate for the `.onion` domain provided as part of alt-svc flow, which therefore cannot be accessed via HTTPS.
24
+
You should note that the visible domain in the user interface remains unchanged, as the host header and the SNI are preserved. However, the underlying connection changes to be routed through Tor, as the [UI denotes on the left of the address bar](https://tb-manual.torproject.org/managing-identities/#managing-identities) with a Tor Circuit. Cloudflare does not provide a certificate for the `.onion` domain provided as part of alt-svc flow, which therefore cannot be accessed via HTTPS.
Copy file name to clipboardExpand all lines: src/content/docs/rules/configuration-rules/settings.mdx
+5-10Lines changed: 5 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -262,26 +262,21 @@ API configuration property name: `"rocket_loader"` (boolean).
262
262
263
263
</Details>
264
264
265
-
## Security Level
265
+
## I'm Under Attack
266
266
267
-
[Security Level](/waf/tools/security-level/)controls Managed Challenges for requests from low reputation IP addresses.
267
+
When enabled, [Under Attack mode](/fundamentals/reference/under-attack-mode/)performs additional security checks to help mitigate layer 7 DDoS attacks. Validated users access your website and suspicious traffic is blocked.
268
268
269
-
On the Cloudflare dashboard, you can turn Under Attack mode on or off.
270
-
271
-
- Off
272
-
- I'm Under Attack
273
-
274
-
Refer to [Under Attack mode](/fundamentals/reference/under-attack-mode/) for more information.
269
+
Use this setting to turn on or off Under Attack mode for matching requests.
275
270
276
271
<Detailsheader="API information">
277
272
278
273
API configuration property name: `"security_level"` (string).
279
274
280
-
API values: `"off"`, `"essentially_off"`, `"low"`, `"medium"`, `"high"`, `"under_attack"`.
275
+
API values: `"off"`, `"essentially_off"`, `"under_attack"`.
0 commit comments