Identify if a response is an antibot challenge from CloudFlare, Akamai, DataDome, Vercel, and more.
- CloudFlare - Bot management and challenge pages
- Vercel - Attack mode protection
- Akamai - Bot Manager and Web Application Protector
- DataDome - Bot protection with CAPTCHA challenges
- PerimeterX - Behavioral bot detection
- Shape Security - Enterprise bot management
- Kasada - Advanced bot mitigation
- Imperva/Incapsula - Web application firewall
- AWS WAF - Amazon Web Services Web Application Firewall
- Reblaze - Cloud-based web security platform
- Cheq - Bot detection and prevention
- Sucuri - Website security platform and WAF
- ThreatMetrix - LexisNexis fraud prevention and device fingerprinting
- Meetrics - User authenticity verification
- Ocule - Bot detection with advanced obfuscation
- YouTube - BotGuard attestation and abuse detection
- LinkedIn - Bot filter protection
- Reddit - Network security challenge-page detection
- reCAPTCHA - Google's CAPTCHA service (v2 and v3)
- hCaptcha - Privacy-focused CAPTCHA alternative
- FunCaptcha - Arkose Labs interactive challenges
- GeeTest - AI-powered CAPTCHA
- Cloudflare Turnstile - Privacy-preserving CAPTCHA alternative
- Friendly Captcha - GDPR-compliant privacy-first CAPTCHA
- Captcha.eu - European GDPR-compliant CAPTCHA service
- QCloud Captcha - Tencent Cloud CAPTCHA service
- AliExpress CAPTCHA - AliExpress x5sec security challenge
Websites receiving massive quantities of traffic throughout the day, like LinkedIn, Reddit, Instagram, or YouTube, have sophisticated antibot systems to prevent automated access.
When you try to fetch the HTML of these sites without the right tools, you often hit a 403 Forbidden, 429 Too Many Requests, or a "Please prove you're human" challenge, leaving you with a response that contains no useful data.
is-antibot is a lightweight, vendor-agnostic JavaScript library that identifies when a response is actually an antibot challenge, helping you understand when and why your request was blocked.
$ npm install is-antibot --saveJust pass headers, html, and url from any HTTP response:
const isAntibot = require('is-antibot')
const response = await fetch('https://www.linkedin.com/in/kikobeats/')
const html = await response.text()
const { detected, provider, detection } = isAntibot({
headers: response.headers,
html,
url: response.url
})
if (detected) {
console.log(`Antibot detected: ${provider} via ${detection}`)
}It also works with got or any library where body is a string:
const response = await got('https://www.linkedin.com/in/kikobeats/')
.catch(error => errorresponse)
const { detected, provider, detection } = isAntibot(response)
if (detected) {
console.log(`Antibot detected: ${provider} via ${detection}`)
}The library returns an object with the following properties:
detected(boolean): Whether an antibot challenge was detectedprovider(string|null): The name of the detected provider (e.g., 'cloudflare', 'recaptcha')detection(string|null): Where the signal came from:'headers','cookies','html', or'url'
is-antibot © microlink.io, released under the MIT License.
Authored and maintained by microlink.io with help from contributors.
microlink.io · GitHub microlink.io · X @microlinkhq