Last update:2026-03-25 18:14:10
Intelligently identify and manage stealth automated programs that mimic human behavior and are intended for business abuse, such as fake transactions, coupon hoarding, and scalping, or for data theft, such as scraping pricing, content, or user information. It supports one-click blocking, continuous monitoring, and secondary challenge verification, including JavaScript challenges and interactive challenges, to help strengthen business security while preserving the access experience for legitimate users.
When the Likely Bots policy is enabled (Log, Deny, JavaScript Challenge, Interactive Challenge), the system utilizes a heuristics + machine learning engine to perform multi-dimensional inspection on access requests. Based on a comprehensive scoring system weighted across different dimensions, it outputs a Bot Score and Bot Tags.
Requests with a score in the range of 80-99 are classified as Liekly Bots, indicating highly suspicious automated traffic.
Note: For this category of confirmed suspicious traffic (validated through extensive analysis across global traffic), the system supports Automated Protection policies. For example, it can automatically apply verification measures, such as interactive human verification challenges, or block the request directly. This helps defend against automated threats while reducing operational burden.
Traffic with scores below this range is more likely to come from legitimate human users. To avoid unnecessary impact on normal business operations and user experience, the system does not currently apply aggressive actions, such as automatic blocking, to this traffic, but continues to monitor it.
You can continuously Log, instantly Deny, or apply secondary challenge verification to Likely Bots, including JavaScript challenges and interactive challenges.
| Action | Description |
|---|---|
| Not Used | This policy will not be used for traffic inspection, and traffic will still flow into other inspection modules. |
| Log | Only log this type of request; the request will be forwarded as normal. |
| Deny | Deny the request and respond with 403. |
| JavaScript Challenge | Returns a JavaScript challenge page. The system will automatically detect whether the client is a real browser environment rather than an automated tool. The user is required to wait a few seconds to complete the challenge, and upon success, will be automatically redirected to the target request. |
| Interactive Challenge | Returns an interactive CAPTCHA page. The client must check a checkbox to complete verification. Upon successful validation, the policy restriction will be lifted. |
to enter the Security Policy editing page.