
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 18:06:30 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Announcing Friendly Bots]]></title>
            <link>https://blog.cloudflare.com/friendly-bots/</link>
            <pubDate>Wed, 16 Mar 2022 12:58:57 GMT</pubDate>
            <description><![CDATA[ Our customers can choose to allowlist any bot that is verified. Unfortunately, new bots are popping up faster than we can verify them. So today we’re announcing a solution: Friendly Bots ]]></description>
            <content:encoded><![CDATA[ <p></p><p>When someone mentions bots on the Internet, what’s your first reaction?</p><p>It’s probably negative. Most of us conjure up memories of CAPTCHAs, stolen passwords, or some other pain caused by bad bots.</p><p>But the truth is, there are plenty of <a href="https://www.cloudflare.com/learning/bots/how-to-manage-good-bots/">well-behaved bots</a> on the Internet. These include Google’s search crawler and Stripe’s payment bot. At Cloudflare, we manually “verify” good bots, so they don’t get blocked. Our customers can choose to allowlist any bot that is verified. Unfortunately, new bots are popping up faster than we can verify them. So today we’re announcing a solution: <b>Friendly Bots.</b></p><p>Let’s begin with some background.</p>
    <div>
      <h2>How does a bot get verified?</h2>
      <a href="#how-does-a-bot-get-verified">
        
      </a>
    </div>
    <p>We often find good bots via our <a href="https://forms.gle/pWVxfCj6cQgWGxDp9">public form</a>. Anyone can submit a bot, but we prefer that bot operators complete the form to provide us with the information we need. We ask for some standard bits of information: your bot’s name, its public documentation, and its user agent (or regex). Then, we ask for information that will help us validate your bot. There are four common methods:</p><p><b>IP list</b>Send us a list of IP addresses used by your bot. This doesn’t have to be a static list — you can give us a dynamic page that changes — just provide us with the URL, and we’ll fetch updates every day. These IPs must be publicly documented and exclusive to your bot. If you provide a shared IP address (like one used by a proxy service), our systems will detect risk and refuse to cooperate. We want to avoid accidentally allowing other traffic.</p><p><b>rDNS</b>This one is fun. You’ve heard of <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>: the phone book of the Internet, which helps map <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> to IP addresses. <a href="https://www.blumira.com/glossary/reverse-dns-rdns/">rDNS</a> works in the reverse, allowing us to take an IP address and deduce the domain name associated with it.</p><p>In other words: give us a hostname suffix, and in many cases we’ll be able to validate your bot’s identity!</p><p><b>User agent + ASN validation</b>In some cases, we can verify bots that consistently come from the same network (known as an “ASN”) with the same user agent. Note that we can’t always do this — traffic becomes easier to spoof — but we’re often confident enough to use this as a validation method.</p><p><b>Machine learning</b>This is the most flashy method. Cloudflare sees 32+ million requests every second, and we’ve been able to feed those requests into a model that can accurately profile good bots. If the previous validation methods don’t work for you, there’s a good chance we can use <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">ML</a> to spot your bot. But we need enough traffic (thousands of requests) to detect a usable pattern.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PYeN6Vt00Z2Ck8m70XjNk/d38e8658a5c47120685a087a74b461de/image1-52.png" />
            
            </figure><p>We usually approve Verified Bot requests within a few weeks, after taking some time to quality test and ensure everything is safe. But as mentioned before, we often have to reserve this process for trusted partners and larger bots, even though plenty of our users still need their bots allowlisted.</p>
    <div>
      <h2>What if my bot isn’t a huge global service?</h2>
      <a href="#what-if-my-bot-isnt-a-huge-global-service">
        
      </a>
    </div>
    <p>We keep our ears open (and our eyes on Twitter), so we know that folks want their own “personal” version of Verified Bots.</p><p>For example: let’s say you built your own monitoring service that crawls a few of your personal websites. It doesn’t make sense for us to verify this bot, because it doesn’t meet any of our criteria:</p><ol><li><p>Serve the broader Internet.</p></li><li><p>Objectively demonstrate good behavior.</p></li><li><p>Comply with Internet standards like <a href="https://moz.com/learn/seo/robotstxt">robots.txt</a>.</p></li></ol><p>It’s your bot (and to you, it might be good!), but our other users might feel differently. Imagine if someone else’s bot could waltz into your infrastructure at any time!</p><p>Here’s another case. Perhaps Cloudflare has labeled a particular proxy as automated, possibly because a mix of humans and bots use the proxy to access the Internet. You may want to allow this traffic on your site without affecting other Cloudflare customers.</p><p>Lastly, if you work at a startup, your company may run automated services that haven’t reached the scale we require. But you still need a way to allowlist these services.</p>
    <div>
      <h2>Announcing Friendly Bots</h2>
      <a href="#announcing-friendly-bots">
        
      </a>
    </div>
    <p>The bots described above, especially common services, are not bad. They deserve to sit in a state between <i>bad</i> and <i>verified</i>. They’re <b>friendly</b>.</p><p>And we’ve come up with a really cool way to help you manage them.</p><p>Our new feature, Friendly Bots, allows you to instantly auto-validate any traffic with the help of IP lists, rDNS, and more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3zbCA00JgYDez9Gd4XPNJb/7833d01c6556e9164e93eda0b703425c/image4-5.png" />
            
            </figure><p>Here’s how it works: in the <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/bots">Cloudflare dashboard</a>, tell us about your bot. You can point us toward a public IP list, give us a hostname suffix, or even select other methods like machine learning. Cloudflare’s anycast network allows us to run all of these mechanisms at <i>each</i> one of our data centers. This means you’ll have performant, secure, and scalable bot verification.</p><p>Build a collection of Friendly Bots and share them between your sites, creating custom policies that allow, rate limit, or log this type of traffic. You may just want to keep tabs on a particular bot; that’s fine. The response options are flexible and directly integrate with our <a href="https://workers.cloudflare.com/">Workers platform</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/54QpeToZFleHLchzTmKCxQ/dcf07542c262e13e809c12eaf05390a1/image5-6.png" />
            
            </figure><p>In the past, we’ve struggled to verify bots that did not crawl the web at a large scale. Why? Our system relies on a cache of verified traffic, ensuring that certain IPs or other data have widely shown good behavior on the Internet. This means that bots were sometimes difficult to verify if they did not make thousands of requests to Cloudflare. With Friendly Bots, we’ve eliminated that requirement, introducing a new, dynamic cache that optimizes for fun-sized projects.</p>
    <div>
      <h2>The downstream benefits</h2>
      <a href="#the-downstream-benefits">
        
      </a>
    </div>
    <p>Friendly Bots will streamline your dashboard experience. But there are a few hidden, downstream benefits we want to highlight:</p><p><b>Easier verification</b>Admittedly, it’s challenging to keep up with all the good bots on the Internet. In order to verify a bot, we’ve relied on <a href="https://forms.gle/dT9muX2aYRqFokkc8">manual submissions</a> that may come weeks, or even months after a good bot is created. Friendly Bots will change all of that. If we notice many of our customers allowlisting a particular bot — say, a certain IP address or hostname suffix, our systems will automatically queue that bot for verification. We can intelligently use your Friendly Bots to help the rest of Cloudflare’s customers.</p><p><b>Instant feedback</b>In the past, users have been confused by the verification process. <i>Do I need to provide documentation for my IPs? What about my user agent: can it change over time?</i> If any piece of the validation data was broken, it could take us weeks to identify and fix.</p><p>That’s no longer the case. With Friendly Bots, we perform validation almost instantly. So if something isn’t right — perhaps your rDNS validation uses the wrong hostname — you’ll know immediately because the bot won’t be allowlisted. No more waiting to hear from our support team.</p><p><b>Better sourcing</b>Previously, we required bot operators (e.g., Google) to submit verification data themselves. If there was a bot you wanted to verify, but did not own, you were out of luck.</p><p>Friendly Bots eliminates this dependency on bot operators. Anyone who can find identifying information can register a bot on their site.</p><p><b>No arbitration</b>If a scraper shows up to your site, is that a good thing? To some, yes, because it’s exposure. To others, no, because that scraper may take data. This is a question we’ve carefully considered with every Verified Bots submission to date.</p><p>Now: it’s your choice to make. Friendly Bots puts the control in your hands, allowing you to categorize bots at a domain level. We’ll continue to verify bots at a global level (when behavior is objectively good).</p>
    <div>
      <h2>Cloudflare Radar</h2>
      <a href="#cloudflare-radar">
        
      </a>
    </div>
    <p>Here’s a fun bonus: in addition to today’s Friendly Bots announcement, we’re also making some changes to <a href="https://radar.cloudflare.com">Cloudflare Radar</a>.</p><p>Beginning immediately, you can see a list of many <a href="https://radar.cloudflare.com/verified-bots">Verified Bots in Radar</a>. This is exciting; we’ve never published a detailed list like this before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4C2SFqOIE3jCOpPDaP4EQv/fea3b84650ae284d0da13c69ab97ec68/image3-20.png" />
            
            </figure><p>All data is updated in real time. As we verify new bots, they will appear here in the Radar module.</p><p>We’re also beginning to add specific Verified Bots to our Logs product. You’ll see them as <a href="https://developers.cloudflare.com/bots/concepts/cloudflare-bot-tags">Bot Tags</a>, so a request might include the string “pinterest” if it came from Pinterest’s bot.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Our team is excited to launch Friendly Bots soon. We anticipate the impact will radiate throughout <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a>, reducing false positives, improving crawl-ability, and generally stabilizing sites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qdZSvU4sRH4ImTRfBowzg/0b6f05bce83fe99396a3a90f1d461201/image2-42.png" />
            
            </figure><p>If you have Bot Management and want to give this new feature a try, please tell your account team (and we’ll be sure to include you in the early access period). You can also continue to <a href="https://forms.gle/dT9muX2aYRqFokkc8">tell us about bots</a> that should be verified.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">67jeypO2yZNFU5OIrK3T8R</guid>
            <dc:creator>Ben Solomon</dc:creator>
            <dc:creator>Abraham Adberstein</dc:creator>
            <dc:creator>Ricardo Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Bot Attack trends for Jan-Jul 2020]]></title>
            <link>https://blog.cloudflare.com/bot-attack-trends-for-jan-jul-2020/</link>
            <pubDate>Tue, 20 Oct 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ Automated traffic makes up almost 40% of total Internet traffic. Let’s take a look at how bots behaved over 2020 so far. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1cszDcfthjiqxTSjL0K2Q0/b640f031300bff80abc9c123360d8545/Bots-Trends-header.png" />
            
            </figure><p>Now that we’re a long way through 2020, let’s take a look at automated traffic, which makes up almost <a href="http://radar.cloudflare.com">40% of total Internet traffic</a>.</p><p>This blog post is a high-level overview of bot traffic on Cloudflare’s network. Cloudflare offers a comprehensive <a href="https://www.cloudflare.com/products/bot-management/">Bot Management tool</a> for Enterprise customers, along with an effective free tool called Bot Fight Mode. Because of the tremendous amount of traffic that flows through our network each day, Cloudflare is in a unique position to analyze global bot trends.</p><p>In this post, we will cover the basics of bot traffic and distinguish between automated requests and other human requests (<b>What Is A Bot?)</b>. Then, we’ll move on to a global overview of bot traffic around the world (<b>A RoboBird’s Eye View, A Bot Day</b> and <b>Bots All Over The World</b>), and dive into North American traffic (<b>A Look into North American Traffic)</b>.  Lastly, we’ll finish with an overview of how the coronavirus pandemic affected global traffic, and we’ll take a deeper look at European traffic (<b>Bots During COVID-19 In Europe)</b>.</p><p>On average, Cloudflare processes 18 million HTTP requests every second. This is a great opportunity to understand how bots shape the Internet, how much infrastructure is dedicated to these automated requests, and why our customers need a great bot management solution.</p>
    <div>
      <h3>What Is A Bot?</h3>
      <a href="#what-is-a-bot">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WDMsOvCcXwNaDjyPyDA4P/7cc3cda63d10b7ca72e608d3bd60bcbc/image3-19.png" />
            
            </figure><p>Cloudflare groups traffic into four bot-related categories:</p><p>1. Verified2. Definitely automated3. Likely automated4. Likely human</p><p>Our goal is to stop malicious and unwanted bots from harming our customers, while giving customers the opportunity to control how other automated traffic is managed.</p><p>We label each request that comes into Cloudflare with a “bot score” 1 through 99, where a lower score means that a request probably came from a bot. A higher score means that a request probably came from a human. This score is available in our Firewall, logs, and Workers, giving customers the flexibility to act on any score.</p><p>Cloudflare also maintains a challenge platform that customers can choose to deploy on suspected bots. You’ll recognize these as CAPTCHA challenges or JavaScript challenges. In fact, having the score available in Firewall Rules means that customers can take any action they choose. This platform can be used for mitigation, ensuring that unwanted traffic is stopped in its tracks.</p><p>To learn more about how Bot Management interacts with our firewall, check out our <a href="https://support.cloudflare.com/hc/en-us/articles/360027519452-Understanding-Cloudflare-Bot-Management">support page</a>.</p><p>We track successes and failures during these challenges, which ultimately allows us to improve our detection systems. Assuming that our challenges are solvable by humans, effective detections should have low solve rates, given that they are usually presented to bots.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3n79MsY5KEtsHVDMrKUAIc/c98fbe756b008f48c283006d65bb178a/image15-2.png" />
            
            </figure><p><b>Verified</b> bots are registered in an internal verified bot directory. These good bots power search engines and monitoring tools. Good bots enable our customers’ web pages to be found by search engines, for example.</p><p>For known non-verified bots (such as a scraper using a simple curl library), we keep a similar directory that is managed by our heuristics engine. If not otherwise verified, we consider requests caught by this engine to be <b>definitely automated</b>.</p><p>Our machine learning engine provides another way to identify potential bots. This engine identifies requests with a high probability of automation and marks them as <b>likely automated</b>. This detection mechanism benefits from models built on data from our global network.</p><p>If a request is not marked as automated, we mark it as <b>likely human</b> and pass along the bot score from our machine learning system.</p><p>We also have a behavioral analysis engine and a JavaScript detections engine. You can learn more about these systems by checking out <a href="/cloudflare-bot-management-machine-learning-and-more/">Alex Bocharov’s previous post</a> on Cloudflare Bot Management.</p><p>The two bot definitions for automated traffic are somewhat complementary. Requests caught by heuristic detections will not count towards machine learning detections. Requests that are reliably caught by our machine learning detections won’t need to be registered in our known heuristics bot directory. Because of this, we combine these two together when we discuss “automated traffic” in general.</p>
    <div>
      <h3>A RoboBird’s Eye View</h3>
      <a href="#a-robobirds-eye-view">
        
      </a>
    </div>
    <p>Data from this piece comes from information about Cloudflare’s customers, analyzed between January 15, 2020 and July 31, 2020.</p><p>First, let’s get a basic understanding of the traffic on our network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZbothlOCfZiBnRIJuRhg1/6a5a48f9e51c4a7a9220668e3cc821b8/image6-9.png" />
            
            </figure><p><b>Figure 1.1</b> Traffic type on Cloudflare’s network.</p><p>Figure 1.1 has a global breakdown regarding classification; 60.6% of traffic is likely human, 19.3% is likely automated, 18.1% is definitely automated and only 2.1% is from verified bots. In total, 39.5% of requests we score come from some kind of bot.</p>
    <div>
      <h3>A Bot Day</h3>
      <a href="#a-bot-day">
        
      </a>
    </div>
    <p>Regular traffic fluctuates throughout the day. Do bots follow suit? Let’s check. Figure 2.1 represents traffic deviation from the average hourly traffic. An increase of 10% would mean that the hour is 10% busier than the average hour (measuring requests per hour). We include the total overall traffic in this chart to serve as a comparison to other types of traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Ce2GsyZWSptrwxEvizyLI/d5460319c397f6173c95d01ce6e18d58/image19-1.png" />
            
            </figure><p><b>Figure 2.1</b> Hourly traffic as a deviation from the average hour.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7UoVmHAH5keWrT4ol6kUg/b0fdd70f9dbe9a0d41c4c24b1e98094a/image4-14.png" />
            
            </figure><p><b>Figure 2.2</b> Bot classification over an average day. </p><p>We can clearly see a difference between human traffic and bot traffic. Human traffic varies heavily, but predictably, throughout the day. We can see a 15% decrease in human traffic early in the day, between midnight and 05:00 UTC, corresponding to the end of business hours in the Americas, and up to a 25% increase during business hours, 14:00 to 17:00 UTC, where traffic is highest. Conversely, bot traffic is more consistent. Slow hours still see a smaller drop than overall traffic, and busy hours are less busy. The difference between good and bad bots is also apparent: good bots are even more consistent, with small fluctuations in hourly traffic.</p><p>But why would this happen? A large portion of bots, good and bad, perform the same task across the Internet. <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">Bad bots may be scraping websites</a> or looking to infect unprotected machines, and they will do this with little intervention from human operators. Good bots could be doing some of these operations, but less frequently and in a more targeted fashion. A good bot scraping a website may be doing so to add it to a search engine, while a bad bot will do the same thing at a much higher rate, for other reasons.</p><p>A lot of bots follow business hours. For example, sneaker bots—focused on nabbing exclusive items from sneaker stores—will naturally be active when new products launch.</p><p>This difference in volume does not mean that our classifications are affected: our scores remain consistent throughout the day, as Figure 2.1 shows.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2FGicO2LIu6u59W0x6SJOD/16329cc40a575612e187923fbc51f681/image14-1.png" />
            
            </figure><p><b><i>Figure 2.3</i></b><i> Daily traffic as a deviation from the average day. Grouped by day of week.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uY9kPFzYg5cIpDgrOYQSC/d7de8e37290d551f5a7056aa8203a860/image20.png" />
            
            </figure><p><b><i>Figure 2.4</i></b><i> Bot classification over an average week.</i></p><p>We can also see that good bots don’t take weekends off. Weekdays and weekends have fairly marked differences for most traffic, but good bots keep a consistent schedule. Whereas a typical weekday is slightly above average, we can see a drop of about 4% in overall traffic. This does not fully apply to verified bots, which only see a small 1% drop in traffic.</p>
    <div>
      <h3>Bots All Over The World</h3>
      <a href="#bots-all-over-the-world">
        
      </a>
    </div>
    <p>Now that we’ve taken a look at global traffic, let’s dig a little deeper.</p><p>Different regions have distinct traffic landscapes regarding automated traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3UEGzJ3XAHef2PX9QPk2qK/f0ea848dd3dcd85af59de5f65dc25f59/image18-2.png" />
            
            </figure><p><i>**</i><b>Figure 3.1</b><i>** Traffic type by region.</i></p><p>Figure 3.1 breaks down traffic by region, letting us peek into where each type of traffic comes from. North America stands out as a major automated traffic source; over 50% of definitely automated traffic comes from there, and they also contribute almost 80% of all verified bot traffic. Europe makes up the second largest chunk of traffic, followed by Asia.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DJj8W8fOl12fNCdfkFsc7/4c9e6710028f68f23ca1994c923b9249/image11-2.png" />
            
            </figure><p><b><i>Figure 3.2</i></b><i> Traffic classification within each region.</i></p><p>Looking at regional breakdown of traffic in Figure 3.2, we can see just how much North American traffic is automated, well above the global average.</p>
    <div>
      <h3>A Look into North American Traffic</h3>
      <a href="#a-look-into-north-american-traffic">
        
      </a>
    </div>
    <p>As the largest source of automated traffic, North America deserves a closer look.</p><p>First, we’ll start with a breakdown of each country.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/apqoRsJwg86CoGP6qjLnK/74558d80a030a352a068377f5a36e7d8/image12-1.png" />
            
            </figure><p><b><i>Figure 3.3</i></b><i> Percentage of traffic within North America.</i></p><p>Most of our requests in North America come from just three countries—the United States, Canada and Mexico. These account for 98% of all requests from North America, 97% of all requests from likely human sources and 100% of requests from verified bots. The United States alone accounts for 88% of total requests, 82% of requests from likely human sources, 96% of requests from definitely automated sources, 88% of requests from likely automated traffic sources and  98% of requests from verified bot.</p><p>However, this alone does not mean that the United States has an unusual amount of activity. These countries have a combined population of roughly 497 million people. The United States accounts for 66.5% of that, Mexico 25.9% and Canada 7.6%. With this context, we can see that the United States is overrepresented in terms of raw requests, but underrepresented in terms of how much of that traffic is likely to be human. Conversely, Canadian traffic is more likely to be human.</p><p>Let's take another look at each country.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WoxVVla9ULSUap7HvYvZj/9d18a927e8dce75842593caa314d0c57/image5-9.png" />
            
            </figure><p><b><i>Figure 3.4</i></b><i> Percentage of traffic within each country.</i></p><p>Over half of the traffic from the United States is automated in some way, which is a clear departure from trends in Mexico and Canada.</p>
    <div>
      <h3>American Bots</h3>
      <a href="#american-bots">
        
      </a>
    </div>
    <p>So far, we’ve seen how much the United States contributes to automated traffic. If we want to go deeper, a good place to start is by understanding how these bots get online. We can do this by examining the networks from which the traffic originates. Networks are identified by Autonomous System Numbers, or ASNs. These form the backbone of the Internet infrastructure.</p><p>Think of these as Internet Service Providers, but facing inward towards the network instead of outward towards end consumers. ISPs like Comcast and Verizon are examples of residential ASNs, where we expect mostly human traffic. Cloud providers such as Google and Amazon are also ASNs, but targeted towards cloud services. We expect most of these requests to be automated in some way.</p><p>Looking at traffic on the ASN level is important because we can identify cloud-based traffic, or traffic using residential proxies, among others.</p><p>Let's take a look at which ASNs are associated with visitors in the United States. We’ll restrict ourselves to “eyeball” traffic, which is the term we use for requests coming from site visitors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vfhm7SZ899H8ancIgAVq1/5e9d99cd234cfa1d767478364daaa958/image21.png" />
            
            </figure><p><b><i>Figure 4.1</i></b><i> Top ASN in the United States.</i></p><p>From figure 4.1 we can clearly see the impact that cloud services have on traffic; 11.5% of all eyeball traffic comes from Amazon and Google.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42Vx0NeK5gy4izAtyuHtXq/fb6c4372cac1cf0baac681763bccb3c8/image22.png" />
            
            </figure><p><b><i>Figure 4.2</i></b><i> Top ASN in the United States for verified bot traffic.</i></p><p>Verified bots operate in a different landscape, coming from cloud providers such as Amazon, Google, Microsoft, Advanced Hosting and Wowrack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3hX8AfhmPJkiAINQjXzlyx/d7ca84aa40a84840b3c19676ceab6034/image8-4.png" />
            
            </figure><p><b><i>Figure 4.3</i></b><i> Top ASN in the United States for likely and definitely automated traffic.</i></p><p>Automated traffic has a variety of ASNs. Cloud providers such as Amazon, Google and Microsoft make up the 30% of automated traffic. Comcast also makes up a significant portion of traffic at 4.8%, indicating that some bots come from residential services.</p>
    <div>
      <h3>Bots During COVID-19 In Europe</h3>
      <a href="#bots-during-covid-19-in-europe">
        
      </a>
    </div>
    <p>Lockdowns and limits on public events came as a consequence of the ongoing coronavirus pandemic. Many people have been working from home, and even those who do not have this option are using the Internet in new ways. Overall, this has meant that Cloudflare’s network has grown tremendously.</p><p>But how does this impact bot traffic? First let’s get an idea of how it impacted traffic in general. Countries were impacted by the virus at different times, so we expect to see differences, right?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3rzZx17XrGONvWYx1OjhQO/bf0c3001fd9248f17d64294ec9e9342c/image1-30.png" />
            
            </figure><p><b>Figure 5.1</b> <i>Total traffic across all regions.</i></p><p>Figure 5.1 has just the traffic increase. Globally, we are seeing an average increase of 10%, while North America saw an increase of over 40% compared to the beginning of the year. Some regions did not change much, such as Africa and Asia, while others, such as Europe saw an increased period, but has since normalized to previous levels.</p><p>Let's look at a few countries, so we can understand what this looks like.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Gm3p9tTCf5ciaAG2CGpsF/e27c2951de22d352cf59dc7bcdad8a1a/image7-6.png" />
            
            </figure><p><b><i>Figure 5.2</i></b><i> Daily traffic evolution for Italy, the United Kingdom and Portugal, overlaid with Europe.</i></p><p>Figure 5.2 shows daily traffic relative to January 15, when data collection started. For comparison, we have overall European traffic, and three selected countries: Italy, the United Kingdom and Portugal. Italy was picked because it was one of the first countries in Europe to face the worst of the coronavirus and enact lockdown measures. The United Kingdom took another strategy, with an initial focus on herd immunity, and enacted measures later than the others. Portugal is somewhere in between, locking down later than Italy, in slightly different circumstances.</p><p>At the beginning of the year, traffic kept stable and fluctuations kept in line with the European average. As lockdown measures began, traffic increased. Italy was first out of these countries, rising a few weeks before the others, and keeping well above average. Eventually, all countries saw a growth in traffic, followed by a stabilization. Italy seems to have adjusted to a normal, with its growth in line with the European average. Portugal has also stabilized, but with busier weekdays. Conversely, the United Kingdom showed no signs of stopping, exceeding a growth of 40% compared to the beginning of the year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KcqhhSQl2Yyw6djCq0q3C/eac537624b912058a7522e8e7fa28f95/image17-1.png" />
            
            </figure><p><b><i>Figure 5.3</i></b><i> Daily definitely automated traffic evolution for Italy, the United Kingdom and Portugal, overlaid with Europe.</i></p><p>Definitely automated traffic did not have that much of a pronounced variation. Italian traffic kept steady throughout, and Portugal had a rather large increase. The biggest one, however, was the United Kingdom, which tripled its initial count.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5P8ZyuojJzPGmcl3efgcqJ/dc4526d462b916ee19885717f3420194/image10-3.png" />
            
            </figure><p><b><i>Figure 5.4</i></b><i> Verified bot traffic evolution for Italy, the United Kingdom and Portugal, overlaid with Europe.</i> </p><p>Verified bot traffic is steady, except in Italy, with a massive increase between March and May. What could be the cause of this? Are these a few zones, getting a massive number of requests?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Q57OIbJokvrpiBS5cxaw/27b5f9e756b1c67f154e62633d777e8f/image9-6.png" />
            
            </figure><p><b><i>Figure 5.5</i></b><i> Verified bot traffic in Italy for the top 10 000 zones, relative to January 15th 2020.</i></p><p>Well, no. If we only examine the top 10,000 zones (by total verified bot requests), we can still see a massive increase in traffic for other zones. So, what’s happening?</p><p>Let's look at user agents. We can separate the top 10 user agents during the bump, and see how they evolve over time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5xY9yvU7ivvHGwyLVMa8G6/0e43073783b8baaee30e5985804235aa/image13-1.png" />
            
            </figure><p><b><i>Figure 5.6</i></b><i> Verified bot traffic in Italy for the top 10 user agents, relative to January 15th 2020.</i></p><p>We can see that these 10 user agents are responsible for the majority of verified traffic coming from Italy.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EnCrxpZgLfmyyyWLeEF31/b75b3af0b363f712b3edc75348ddf1a6/image2-19.png" />
            
            </figure><p><b><i>Figure 5.7</i></b><i> Verified bot traffic in Italy for the top user agent, relative to January 15 2020.</i></p><p>In fact, most of this increase is from a single user agent. This instance of Google image proxy anonymizes image requests from Gmail, which explains its popularity.</p><p>Where does this increase come from? Did this bot suddenly appear and disappear?</p><p>Not quite. One thing to keep in mind when dealing with bots is that they cross borders easily. As a proxy service, this bot is making calls on behalf of the end user – people opening emails. These requests will originate from a data center, which can be anywhere in the world. To see this in action, let's take a look at traffic for this bot in a few select countries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cZ5OxCnVyzzvzqoQ4WIYP/a0d2061e6cda7970ebfe54e31b744764/image23.png" />
            
            </figure><p><b><i>Figure 5.8.</i></b><i> Countries of origin for GoogleImageProxy.</i></p><p>We can see that the global average barely budges. It appears that Google may be moving image proxy traffic between data centers and during the period we observed above that traffic was coming from Italy.</p>
    <div>
      <h3>Summary</h3>
      <a href="#summary">
        
      </a>
    </div>
    <p>With Cloudflare’s global reach, we’re in a position to understand how bots behave.</p><p>The first half of 2020 saw a massive increase in web traffic of around 35% since the beginning of the year, driven by the ongoing coronavirus pandemic, and some bots have taken advantage of it.</p><p>We explained how bot management works for our customers, and how we distinguish between likely automated and human traffic.</p><p>We showed an overview of how much of our global traffic is automated, and how bots change their behavior throughout the day and the week. Notably, 39.4% of all traffic Cloudflare processes comes from a suspected automated source.</p><p>A regional overview of automated traffic lets us know which regions were the source of traffic from likely automated agents. North America, Europe and Asia were the primary sources of traffic, and also of automated traffic in particular.</p><p>We then focused on North America, where the majority of automated traffic originates. The United States alone accounted for the majority of requests, over half of which come from automated sources.</p><p>To explore this further, we briefly dived into ASN traffic in the United States, so we could see where these requests were coming from. ASNs like Comcast and AT&amp;T were the top ASNs for overall traffic, but unsurprisingly, data centers like Google and Amazon AWS were the main drivers of automated traffic.</p><p>Finally, we examined how the coronavirus has impacted traffic in Europe, with a deeper dive on Italian traffic. This led to some interesting insights on verified bot traffic, which saw a massive increase in Italy for a few months.</p><p>This post is a small peek into bot management at Cloudflare. In the future, we hope to expand this series of blog posts on bot management, exposing even more insights about bots on the Internet.</p> ]]></content:encoded>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[COVID-19]]></category>
            <guid isPermaLink="false">3uvcEdbNy5FZ0Fu4hT888</guid>
            <dc:creator>Ricardo Pacheco</dc:creator>
        </item>
    </channel>
</rss>